Skip to content

feat(rules): New Process execution from remote memory section rule#580

Merged
rabbitstack merged 1 commit intomasterfrom
process-execution-from-remote-memory-section
Mar 6, 2026
Merged

feat(rules): New Process execution from remote memory section rule#580
rabbitstack merged 1 commit intomasterfrom
process-execution-from-remote-memory-section

Conversation

@rabbitstack
Copy link
Owner

What is the purpose of this PR / why it is needed?

Detects execution of a process image originating from a memory section mapped without a backing file, a strong indicator of advanced process injection techniques such as ghostly hollowing. In this pattern, a malicious image is mapped directly into memory, loaded into a remote process, and subsequently executed without ever being written to disk. This allows attackers to evade file-based detection and forensic recovery.

What type of change does this PR introduce?


Uncomment one or more /kind <> lines:

/kind feature (non-breaking change which adds functionality)

/kind bug-fix (non-breaking change which fixes an issue)

/kind refactor (non-breaking change that restructures the code, while not changing the original functionality)

/kind breaking (fix or feature that would cause existing functionality to not work as expected

/kind cleanup

/kind improvement

/kind design

/kind documentation

/kind other (change that doesn't pertain to any of the above categories)

Any specific area of the project related to this PR?


Uncomment one or more /area <> lines:

/area instrumentation

/area telemetry

/area rule-engine

/area filters

/area yara

/area event

/area captures

/area alertsenders

/area outputs

/area rules

/area filaments

/area config

/area cli

/area tests

/area ci

/area build

/area docs

/area deps

/area evasion

/area other

Special notes for the reviewer


Does this PR introduce a user-facing change?


@rabbitstack rabbitstack added the rules Anything related to detection rules label Jan 28, 2026
@rabbitstack rabbitstack force-pushed the process-execution-from-remote-memory-section branch 2 times, most recently from 446c2db to 219a2cb Compare February 1, 2026 15:03
@rabbitstack rabbitstack force-pushed the process-execution-from-remote-memory-section branch from 219a2cb to c0bd362 Compare March 6, 2026 10:03
Detects execution of a process image originating from a memory section
mapped without a backing file, a strong indicator of advanced process injection techniques such as ghostly hollowing. In this pattern, a malicious image is mapped directly into memory, loaded into a remote process, and subsequently executed without ever being written to disk.
This allows attackers to evade file-based detection and forensic recovery.
@rabbitstack rabbitstack merged commit a2a16a0 into master Mar 6, 2026
11 checks passed
@rabbitstack rabbitstack deleted the process-execution-from-remote-memory-section branch March 6, 2026 10:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

rules Anything related to detection rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant