security analyst security skill risk: medium
Process Injection Techniques Hunter
Provides steps to detect process injection techniques (T1055) via Sysmon Event IDs 1, 8, and 10, including parsing events, detecting CreateRemoteThread, analyzing ProcessAccess rig…
SKILL 4 files · 2 folders
SKILL.md
--- name: hunting-for-process-injection-techniques description: "Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection" --- # Hunting for Process Injection Techniques ## Overview Process injection (MITRE ATT&CK T1055) allows adversaries to execute code in the address space of another process, enabling defense evasion and privilege escalation. This skill detects injection techniques via Sysmon Event ID 8 (CreateRemoteThread), Event ID 10 (ProcessAccess with suspicious access rights), and analysis of source-target process relationships to distinguish legitimate from malicious injection. ## When to Use - When investigating security incidents that require hunting for process injection techniques - When building detection rules or threat hunting queries for this domain - When SOC analysts need structured procedures for this analysis type - When validating security monitoring coverage for related attack techniques ## Prerequisites - Sysmon installed with Event IDs 8 and 10 enabled - Process creation logs (Sysmon Event ID 1 or Windows 4688) - Python 3.8+ with standard library - JSON-formatted Sysmon event logs ## Steps 1. **Parse Sysmon Events** — Ingest Event IDs 1, 8, and 10 from JSON log files 2. **Detect CreateRemoteThread** — Flag Event ID 8 with suspicious source-target process pairs 3. **Analyze ProcessAccess Rights** — Identify Event ID 10 with dangerous access masks (PROCESS_VM_WRITE, PROCESS_CREATE_THREAD) 4. **Build Process Relationship Graph** — Map source-to-target injection relationships 5. **Filter Known Legitimate Pairs** — Exclude known benign injection patterns (AV, debuggers, system processes) 6. **Score Injection Severity** — Apply risk scoring based on source process, target process, and access rights 7. **Generate Hunt Report** — Produce structured report with MITRE sub-technique mapping ## Expected Output - JSON report of detected injection events with severity scores - Process injection relationship graph - MITRE ATT&CK sub-technique mapping (T1055.001-T1055.012) - False positive exclusion recommendations
REQUIRED CONTEXT
- Sysmon Event IDs 1, 8, 10 in JSON format
- process creation logs
EXPECTED OUTPUT
- Format
- json
- Schema
- json_report · detected injection events with severity scores, Process injection relationship graph, MITRE ATT&CK sub-technique mapping (T1055.001-T1055.012), False positive exclusion recommendations
- Constraints
- include severity scores
- map to MITRE sub-techniques T1055.001-T1055.012
- provide false positive exclusion recommendations
CAVEATS
- Dependencies
- Sysmon installed with Event IDs 8 and 10 enabled
- Process creation logs (Sysmon Event ID 1 or Windows 4688)
- Python 3.8+ with standard library
- JSON-formatted Sysmon event logs
QUALITY
- OVERALL
- 0.60
- CLARITY
- 0.90
- SPECIFICITY
- 0.85
- REUSABILITY
- 0.25
- COMPLETENESS
- 0.75
IMPROVEMENT SUGGESTIONS
- Add template placeholders (e.g., {{log_path}}, {{time_range}}) to raise reusability_score
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR SECURITY ANALYST
- Ransomware Network Indicators Analyzersecurity analystsecurity
- APT TTP Mapping with MITRE Navigatorsecurity analystsecurity
- Linux Persistence Mechanisms Analyzersecurity analystsecurity
- Azure AD Lateral Movement KQL Detectorsecurity analystsecurity
- Kerberos Golden Ticket Forgery Detectorsecurity analystsecurity
- LOLBAS Abuse Detection with Sigma Rulessecurity analystsecurity
- Shadow IT Cloud Usage Detectorsecurity analystsecurity
- Registry Run Key Persistence Detection Guidesecurity analystsecurity
- Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- Windows Service Installation Threat Huntersecurity analystsecurity
- Web Server Log Intrusion Analyzersecurity analystsecurity
- RDP Brute Force Event Log Analyzersecurity analystsecurity
- Rekall Memory Forensics Artifact Extractorsecurity analystsecurity
- Azure Activity Logs Threat Analyzersecurity analystsecurity
- Scapy Network Packet Analysis Guidesecurity analystsecurity
- TLS Certificate Transparency Log Analyzersecurity analystsecurity
- Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- Email Account Compromise Detection Proceduressecurity analystsecurity
- Credential Stuffing Auth Log Analyzersecurity analystsecurity
- MISP Threat Intelligence Sharing with PyMISPsecurity analystsecurity
- MISP Threat Landscape Analysis Guidesecurity analystsecurity
- Malicious Scheduled Task Sysmon Detectorsecurity analystsecurity
- Kerberos Pass-the-Ticket Attack Detectorsecurity analystsecurity
- NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- Linux Memory Forensics with LiME and Volatilitysecurity analystsecurity