Process Manipulating

Technique Name Technique ID's Snippet(s) Rules(s) OS
Breaking BaDDEr U1201
DNS API Injection U1202
CLIPBRDWNDCLASS U1203
WordWarping U1204
FIleless Mechanisms U1205 B0027.001
OLEUM U1206
Listplanting U1207
Treepoline U1208
ConsoleWindowClass U1209
Process Reimaging U1210
Inline Hooking U1211 F0015.002
COM Hijacking U1212
Ctrl+Inject U1213
Propagate U1214
Process Doppelgänging U1215
PE Injection U1216 E1055.002
IAT Hooking U1217 F0015.003
Injection using Shims U1218 E1055.m03
Extra Window Memory Injection U1219 E1055.011
Atom Bombing U1220
APC injection U1221 E1055.004
Image File Execution Options Injection U1222
Thread Execution Hijacking U1223 E1055.003
Reflective DLL injection U1224
Process Hollowing, RunPE U1225 E1055.012
DLL Injection via CreateRemoteThread and LoadLibrary U1226 E1055.001
Hook Injection U1227 E1055.m01
Entry Point Modification U1228
EditWordBreakProc U1229
Process Camouflage, Masquerading U1230 F0005
Process Herpaderping U1231
Process Ghosting U1232
Access Token Manipulation: Parent PID Spoofing U1234 T1134.004
ProcEnvInjection - Remote code injection by abusing process environment strings U1235
Shellcode Injection via CreateThreadpoolWait U1236
NLS Code Injection Through Registry U1237
Change Module Name at Runtime U1238
Change Module Base Address at Runtime U1239
DLL Proxying U1240
Tamper DLL Export Names & GetProcAddress Spoofing U1241
Dirty Vanity U1242
Process Argument Spoofing U1243
AppInit DLL Injection U1244 T1546
Event Triggered Execution: Linux Inotify U1245 T1546