Malicious Process Environment Block Manipulation, (Fri, Jan 9th)
SANS Internet Storm Center, InfoCON: green 2026-01-09
Summary:
Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I'll show you how a malware can hide suspicious information related to created processes.