Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

SANS Internet Storm Center, InfoCON: green 2026-01-09

Summary:

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I'll show you how a malware can hide suspicious information related to created processes.

Link:

https://isc.sans.edu/diary/rss/32614

From feeds:

Intel Hub ยป T01 - SANS Internet Storm Center, InfoCON: green

Tags:

Date tagged:

01/09/2026, 17:32

Date published:

01/09/2026, 03:11