Malware and Memory Execution

How Software Runs on a Computer

Memory Structure and Processes

A variety of components exist in memory, such as:

Malware Execution Strategies

Two Main Approaches:

  1. Run as a separate process
    Malware creates its own identifiable process in memory.
  2. Process Injection
    Malware injects itself into an existing process.
    Benefits:

Understanding Process Memory

DLL Injection (A Common Technique)

Steps for DLL Injection:

  1. Attacker places a malicious DLL on a storage device accessible to the system.
  2. Attacker modifies the target process to include a path to the DLL.
  3. During execution, the process loads the DLL from disk into memory.
  4. The malicious code is now active, operating as part of the legitimate process.

Why it's effective: