Skip to content

Latest commit

 

History

History
52 lines (41 loc) · 1.54 KB

change-memory-protection.md

File metadata and controls

52 lines (41 loc) · 1.54 KB
ID C0008
Objective(s) Memory
Related ATT&CK Techniques None
Version 2.0
Created 2 August 2022
Last Modified 21 November 2022

Change Memory Protection

Malware may change memory protection. For example, read-write memory may be changed to read-execute. Changing memory protection may exploits (e.g., bypass Data Execution Prevention).

Methods

Name ID Description
Executable Heap C0008.002 The heap is made executable.
Executable Stack C0008.001 The stack is made executable.

Use in Malware

Name Date Method Description
Ursnif 2016 -- Changes the PE header of the child process to enable write access to that page, writes 18 bytes of buffer at offset 0x40 from the start of svchost.exe process executable in the target child process. Then changes the region protection back to "read only" to avoid suspicion [1]
SYNfulKnock 2015 -- Modifies the translation lookaside buffer (TLB) Read/Write attributes [2]

References

[1] https://www.fireeye.com/blog/threat-research/2017/11/ursnif-variant-malicious-tls-callback-technique.html

[2] https://www.mandiant.com/resources/synful-knock-acis