Skip to main content
NEW · APP STORE Now on iOS · macOS · iPad Android & Windows soon GET IT
Prompts Process Injection Techniques Hunter

security analyst security skill risk: medium

Process Injection Techniques Hunter

Provides steps to detect process injection techniques (T1055) via Sysmon Event IDs 1, 8, and 10, including parsing events, detecting CreateRemoteThread, analyzing ProcessAccess rig…

SKILL 4 files · 2 folders

SKILL.md
---
name: hunting-for-process-injection-techniques
description: "Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection"
---
# Hunting for Process Injection Techniques

## Overview

Process injection (MITRE ATT&CK T1055) allows adversaries to execute code in the address space of another process, enabling defense evasion and privilege escalation. This skill detects injection techniques via Sysmon Event ID 8 (CreateRemoteThread), Event ID 10 (ProcessAccess with suspicious access rights), and analysis of source-target process relationships to distinguish legitimate from malicious injection.


## When to Use

- When investigating security incidents that require hunting for process injection techniques
- When building detection rules or threat hunting queries for this domain
- When SOC analysts need structured procedures for this analysis type
- When validating security monitoring coverage for related attack techniques

## Prerequisites

- Sysmon installed with Event IDs 8 and 10 enabled
- Process creation logs (Sysmon Event ID 1 or Windows 4688)
- Python 3.8+ with standard library
- JSON-formatted Sysmon event logs

## Steps

1. **Parse Sysmon Events** — Ingest Event IDs 1, 8, and 10 from JSON log files
2. **Detect CreateRemoteThread** — Flag Event ID 8 with suspicious source-target process pairs
3. **Analyze ProcessAccess Rights** — Identify Event ID 10 with dangerous access masks (PROCESS_VM_WRITE, PROCESS_CREATE_THREAD)
4. **Build Process Relationship Graph** — Map source-to-target injection relationships
5. **Filter Known Legitimate Pairs** — Exclude known benign injection patterns (AV, debuggers, system processes)
6. **Score Injection Severity** — Apply risk scoring based on source process, target process, and access rights
7. **Generate Hunt Report** — Produce structured report with MITRE sub-technique mapping

## Expected Output

- JSON report of detected injection events with severity scores
- Process injection relationship graph
- MITRE ATT&CK sub-technique mapping (T1055.001-T1055.012)
- False positive exclusion recommendations

REQUIRED CONTEXT

  • Sysmon Event IDs 1, 8, 10 in JSON format
  • process creation logs

EXPECTED OUTPUT

Format
json
Schema
json_report · detected injection events with severity scores, Process injection relationship graph, MITRE ATT&CK sub-technique mapping (T1055.001-T1055.012), False positive exclusion recommendations
Constraints
  • include severity scores
  • map to MITRE sub-techniques T1055.001-T1055.012
  • provide false positive exclusion recommendations

CAVEATS

Dependencies
  • Sysmon installed with Event IDs 8 and 10 enabled
  • Process creation logs (Sysmon Event ID 1 or Windows 4688)
  • Python 3.8+ with standard library
  • JSON-formatted Sysmon event logs

QUALITY

OVERALL
0.60
CLARITY
0.90
SPECIFICITY
0.85
REUSABILITY
0.25
COMPLETENESS
0.75

IMPROVEMENT SUGGESTIONS

  • Add template placeholders (e.g., {{log_path}}, {{time_range}}) to raise reusability_score

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR SECURITY ANALYST