-
Notifications
You must be signed in to change notification settings - Fork 234
PPID spoofing via PROC_THREAD_ATTRIBUTE_PARENT_PROCESS not detected #1145
Copy link
Copy link
Open
Labels
false negativerule expected to match but doesntrule expected to match but doesnt
Description
What should have matched?
A capability for spawning a process with a spoofed parent process (PPID spoofing).
What happened?
No relevant capability was detected.
Why this looks like a miss
The sample uses the classic PPID spoofing flow:
InitializeProcThreadAttributeListUpdateProcThreadAttributewithPROC_THREAD_ATTRIBUTE_PARENT_PROCESSCreateProcess*with extended startup attributes
This is a common defense-evasion behavior and should be a strong candidate for rule coverage.
Suggested detection direction
Conservative initial rule requiring co-occurrence of:
- attribute-list initialization APIs, and
- parent-process attribute update, and
- process creation API usage within the same function/scope.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
false negativerule expected to match but doesntrule expected to match but doesnt