Simple malware samples developed as a proof-of-concept using C and the Win32API utilising process injection techniques which involve injecting malicious shellcode into benign processes.
- Get a handle on a process by attaching to, or creating one.
- Allocate a buffer in the process memory with the necessary permissions.
- Write the contents of your shellcode to that buffer in the process memory.
- Create a thread that will run what you've surgically allocated and written into the process!
- Get a handle on a process by attaching to, or creating one.
- Allocate a buffer in the process memory with the necessary permissions.
- Load a custom DLL to that buffer in the process memory.
- Create a thread that will run what you've surgically allocated and written into the process!