Esc
Process Analysis
Definition
Process Analysis consists of observing a running application process and analyzing it to watch for certain behaviors or conditions which may indicate adversary activity. Analysis can occur inside of the process or through a third-party monitoring application. Examples include monitoring system and privileged calls, monitoring process initiation chains, and memory boundary allocations.
loading...
Technique Subclasses
There are 12 techniques in this category, Process Analysis.
Name | ID | Definition | Synonyms |
---|---|---|---|
Process Analysis | D3-PA | Process Analysis consists of observing a running application process and analyzing it to watch for certain behaviors or conditions which may indicate adversary activity. Analysis can occur inside of the process or through a third-party monitoring application. Examples include monitoring system and privileged calls, monitoring process initiation chains, and memory boundary allocations. | |
- Database Query String Analysis | D3-DQSA | Analyzing database queries to detect [SQL Injection](https://capec.mitre.org/data/definitions/66.html). | |
- File Access Pattern Analysis | D3-FAPA | Analyzing the files accessed by a process to identify unauthorized activity. | |
- Process Self-Modification Detection | D3-PSMD | Detects processes that modify, change, or replace their own code at runtime. | |
- Process Spawn Analysis | D3-PSA | Analyzing spawn arguments or attributes of a process to detect processes that are unauthorized. | |
- Script Execution Analysis | D3-SEA | Analyzing the execution of a script to detect unauthorized user activity. | |
- Shadow Stack Comparisons | D3-SSC | Comparing a call stack in system memory with a shadow call stack maintained by the processor to determine unauthorized shellcode activity. | |
- System Call Analysis | D3-SCA | Analyzing system calls to determine whether a process is exhibiting unauthorized behavior. | |
- Indirect Branch Call Analysis | D3-IBCA | Analyzing vendor specific branch call recording in order to detect ROP style attacks. | |
- File Creation Analysis | D3-FCA | Analyzing the properties of file create system call invocations. | |
- Process Code Segment Verification | D3-PCSV | Comparing the "text" or "code" memory segments to a source of truth. | |
- Process Lineage Analysis | D3-PLA | Identification of suspicious processes executing on an end-point device by examining the ancestry and siblings of a process, and the associated metadata of each node on the tree, such as process execution, duration, and order relative to siblings and ancestors. | Process Tree Analysis |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures