Tactic | Technique ID | Technique Name | Sub-Technique Name | Platforms | Permissions Required |
---|---|---|---|---|---|
Defense Evasion | T1055 | Process Injection | Linux, Windows, macOS |
(P) Preparation
1. Patch asset vulnerabilities
2. Perform routine inspections of controls/weapons
3. Ensure antivirus/endpoint protection software is installed on workstations and laptops
4. Secure local administrator accounts
5. Ensure that servers and workstations are logging to a central location
6. Configure endpoint security solutions to detect and block process injection behaviors
7. On Unix-based operating systems, restrict the use of ptrace to privileged users
8. Utilize Yama or other Linux security modules to configure advanced access control and process restrictions
Assign steps to individuals or teams to work concurrently, when possible; this playbook is not purely sequential. Use your best judgment.
- Monitor for the following Windows API calls:
CreateRemoteThread
SuspendThread
SetThreadContext
ResumeThread
QueueUserAPC
NtQueueApcThread
VirtualAllocEx
WriteProcessMemory
- On Linux systems, monitor the ptrace system call
- Detect named pipe creation and connection events
- Collect DLL/PE file events
- Analyze process behavior and compare to expected activity
- Investigate and clear ALL alerts associated with impacted assets
- Plan remediation events where these steps are launched together (or in coordinated fashion), with appropriate teams ready to respond to any disruption.
- Consider the timing and tradeoffs of remediation actions: your response has consequences.
- Inventory (enumerate & assess)
- Detect | Deny | Disrupt | Degrade | Deceive | Destroy
- Observe -> Orient -> Decide -> Act
- Utilize EDR hunter/killer agents to terminate offending processes
- Remove the affected system from the network
- Determine the source and pathway of the attack
- Issue a perimeter enforcement for known threat actor locations
- Close the attack vector
- Create forensic backups of affected systems
- Perform endpoint/AV scans on affected systems
- Reset any compromised passwords
- Review the logs of all impacted assets
- Patch asset vulnerabilities
In addition to the general steps and guidance in the incident response plan:
In addition to the general steps and guidance in the incident response plan:
- Restore to the RPO within the RTO
- Assess and address collateral damage
- Determine the root cause of the incident
- Resolve any related security incidents
- Restore affected systems to their last clean backup
- Perform routine cyber hygiene due diligence
- Engage external cybersecurity-as-a-service providers and response professionals
- Implement policy changes to reduce future risk
- Conduct employee security awareness training
- "Title", Author Last Name (Date)