1 / 8

Understanding DLL Injection Techniques in Malicious Internet Explorer Processes

This overview explores the DLL injection techniques utilized in malicious Internet Explorer processes, focusing on the use of kernel32.dll's LoadLibrary function. It discusses the steps involved in injecting a DLL into a process, including acquiring process handles with OpenProcess, allocating memory within the target process using VirtualAllocEx, and writing data to the process's memory with WriteProcessMem. The process culminates in the execution of the injected code via CreateRemoteThread. This information aims to raise awareness of security vulnerabilities in applications.

quynh
Télécharger la présentation

Understanding DLL Injection Techniques in Malicious Internet Explorer Processes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { } malicious process Internet Explorer process

  2. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { h=OpenProcess(,,proc_id) } malicious process Internet Explorer process

  3. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) } malicious process Internet Explorer process

  4. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) } malicious process Internet Explorer process

  5. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) } malicious process Internet Explorer process

  6. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) } “evil.dll” malicious process Internet Explorer process

  7. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) CreateRemoteThread(h,,,start,param,…) } “evil.dll” malicious process Internet Explorer process

  8. kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) CreateRemoteThread(h,,,start,param,…) } “evil.dll” LoadLibrary(“evil.dll”) malicious process Internet Explorer process

More Related