-
This is a simple method to bypass malicious behavior detections based on parent-child process relationship. Usually when an application starts another executable, the new process has a parent PID assigned which indicates the process that created it. This allows to detect and possibly block malicious intents like for example
Word/Excelapplication startingPowershell. This technique may be combined with for example process hollowing to achieve more stealth. -
The great thing is that
CreateProcessAPI lets you provide additional information for process creation, including the one calledPROC_THREAD_ATTRIBUTE_PARENT_PROCESS. Let’s see how to use it - we will create aNotepadprocess in a way that it will look like it was spawned byexplorer.exe
This project is licensed under the MIT License. See the LICENSE file for details.