Process hierarchy

Both Windows and Unix/Linux systems have a hierarchy of processes

  • Every process but the root process is the child of some other process

Looking for irregularities in this hierrchy can help detect impersonators

  • Any svchost.exe that isn't a direct child of services.exe is malicious

Knowledge of the hierarchy for common processes on Windows and Linux is a valuable tool for a threat hunter

Process hijacking

Some malware will take over an existing process and execute with its memory space and permissions

This can be accomplished in a variety of ways:

  • Function hooks

  • Inline modifications/patching

  • DLL injection

These malicious processes will have different copies running in memory than are saved on disk

  • They may also have unusual dependencies/imports

Checking process info

Windows

Microsoft provides a couple of tools for monitoring processes in Windows:

  • Task Manager

  • Process Monitor

Process Hacker is another great choice for Windows process analysis

Linux/Unix

On Linux and Unix, the built-in ps command provides information on currently-running processes

  • Multiple different flags provide a variety of information

  • Can be executed by or have output piped to scripts for analysis

To view the hierarchy of processes on Linux, use pstree

Last updated