Skip to content

Commit

Permalink
hunting for malware by finding processes impersonating system processes
Browse files Browse the repository at this point in the history
  • Loading branch information
DavidJBianco committed Nov 30, 2016
1 parent 1f53158 commit c08e7a4
Showing 1 changed file with 29 additions and 0 deletions.
29 changes: 29 additions & 0 deletions hunts/critical_process_impersonation.md
@@ -0,0 +1,29 @@
# Finding Malware Process Impersonation via String Distance

**Purpose**

Finds malware attempting to hide execution by running with names which are confusingly similar to legitimate system processes.

**Data Required**

Endpoint process creation data

**Collection Considerations**

None

**Analysis Techniques**

Scripting

**Description**

A popular technique for hiding malware running on Windows systems is to give it a name that's confusingly similar to a legitimate Windows process, preferably one that is always present on all systems. Using a _string similarity_ algorithm, we can compare the names of running processes to a set of defined Windows system processes to look for this sort of impersonation.

**Other Notes**

None

**More Info**

- [Hunting for Malware Critical Process Impersonation](http://detect-respond.blogspot.com/2016/11/hunting-for-malware-critical-process.html)

0 comments on commit c08e7a4

Please sign in to comment.