T1055.002 - Portable Executable Injection

Sub-technique
Tattiche:
Privilege Escalation Defense Evasion
Piattaforme:
Windows
Rilevamento:
Not specified
Description:
Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process.

PE injection is commonly performed by copying code (perhaps without a file on disk) into the virtual address space of the target process before invoking it via a new thread. The write can be performed with native Windows API calls such as <code>VirtualAllocEx</code> and <code>WriteProcessMemory</code>, then invoked with <code>CreateRemoteThread</code> or additional code (ex: shellcode). The displacement of the injected code does introduce the additional requirement for functionality to remap memory references. (Citation: Elastic Process Injection July 2017)

Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via PE injection may also evade detection from security products since the execution is masked under a legitimate process.
Metadata
MITRE ID: T1055.002
STIX ID: attack-pattern--806a49c4-970d-...
Piattaforme: Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00