Skip to content

Commit dde0f06

Browse files
committed
typos and clarification
1 parent 2d0ca29 commit dde0f06

2 files changed

Lines changed: 5 additions & 6 deletions

File tree

process-tampering.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
Process Tampering
22
-----------------
33

4-
Sysmon will log **EventID 25** when a process original image is replaced in memory or on disk. This covers the technique of [Process Hollowing](https://attack.mitre.org/techniques/T1055/012/), this is when a process is launched, then suspended and the memory for the image is unmapped and realigned to another image injected in to memory and then resumed to execute the injected image. [Process Herpaderping](https://jxy-s.github.io/herpaderping/) is another technique that is caught by this event type, this technique works by modifying the content on disk after the image has been mapped. This capability was added in version 13.0 of Sysmon with schema 4.50.
4+
Sysmon will log **EventID 25** when a process original image is replaced in memory or on disk. This covers the technique of [Process Hollowing] (https://attack.mitre.org/techniques/T1055/012/), this is when a process is launched, then suspended and the memory for the image is unmapped and realigned to another image injected in to memory and then resumed to execute the injected image. [Process Herpaderping](https://jxy-s.github.io/herpaderping/) is another technique that is caught by this event type, this technique works by modifying the content on disk after the image has been mapped. This capability was added in version 13.0 of Sysmon with schema 4.50.
55

66
The fields for the event are:
77

88
* **ProcessGuid** -- Unique process GUID generated by Sysmon.
99

10-
* **ProcessId** -- Process ID represented as a integer number.
10+
* **ProcessId** -- Process ID represented as an integer number.
1111

1212
* **Image** -- Full path of the executable image that was tampered with.
1313

1414
* **Type** -- Type of process tampering (Image is locked for access, Image is replaced)
1515

16-
There are several programs like browsers and code development programs that trigger this event type. Since a attacker can select any process as their target it is reocmended to capture all events and create a exclusion list of known programs. There is a risk that attacker will select this programs for their actions but it limits greatly their capability by norrowly directing them to programs that can then be monitor for other behaviours to detect abuse on the.
16+
There are several programs like browsers and code development programs that trigger this event type. Since an attacker can select any process as their target it is recommended to capture all events and create an exclusion list of known programs. There is a risk that attacker will select this program for their actions but it limits greatly their capability by narrowly directing them to programs that can then be monitor for other behaviors to detect abuse on the.
1717

1818
Example:
1919

@@ -48,5 +48,4 @@ RuleGroup name=“” groupRelation=“or”>
4848
</RuleGroup>
4949
```
5050

51-
Seems like Electron based apps like Slack, Mattermost and others also create false positives.
52-
51+
Seems like Electron based apps like Slack, Mattermost and others also create false positives. Another thing to be awarded of that not all process hollowing techniques are detected. Some variations based on the original technique by changing some API calls and amount of the image altered are not detected. This is a perfect example as to why it is important to have additional detection controls for other action and have a layered approach to detection.

the-sysmon-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,6 @@ Sysmon sets multiple callbacks on kernel objects in addition to using telemetry
2121

2222
When the tool is downloaded from the Microsoft Sysinternals website <https://docs.microsoft.com/en-us/sysinternals/> it is important to save and identify previous versions since Microsoft does not provide older versions and the release notes do not detail what has been fixed. Microsoft has a fast release cycle, forcing users to test very carefully and to keep track of versions.
2323

24-
You can take a look at recent changes across versions in the community guide [Sysmon Changelog](https://link)
24+
You can take a look at recent changes across versions in the community guide [Sysmon Changelog](https://github.com/trustedsec/SysmonCommunityGuide/blob/master/sysmon-changelog.md)
2525

2626
Another important piece of information is that there is no support from Microsoft on the Sysinternal tools—they are free and provided as is. This means that a testing plan for the environment it is deployed on should be formulated, tested, implemented, and improved upon as new versions of Sysmon are released.

0 commit comments

Comments
 (0)