Proc Memory
Process memory manipulation enables attackers to deepen control over a compromised application by injecting, modifying, or reading process memory to evade defensive mechanisms. Following initial application compromise, attackers manipulate process memory to avoid disk-based detection tools, bypass application security controls, and execute unauthorized code within trusted processes. This technique involves leveraging memory-resident malicious code, direct memory manipulation via API calls like WriteProcessMemory/VirtualAllocEx, in-memory code injection, and memory patching of security functions. By operating directly within process memory space, attackers can bypass application whitelisting, disable runtime protection mechanisms, patch security checks in memory, and hide malicious activities from traditional file-based scanning tools. These memory manipulation techniques are particularly effective against security solutions that primarily monitor filesystem changes rather than runtime memory activities.