T1055.003

Thread Execution Hijacking

Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is commonly performed by suspending an existing process then unmapping/hollowing its memory, which can then be replaced with malicious code or the path to a DLL. A handle to an existing victim process is first created with native Windows API calls such as OpenThread. At this point the process can be suspended then written to, realigned to the injected code, and resumed via SuspendThread, VirtualAllocEx, WriteProcessMemory, SetThreadContext, then ResumeThread respectively. This is very similar to Process Hollowing but targets an existing process rather than creating a process in a suspended state.

Microsoft Sentinel / Defender
kusto
// Detect Thread Execution Hijacking via SetThreadContext API usage
// Key indicator: SuspendThread + SetThreadContext + ResumeThread on a remote process
DeviceEvents
| where Timestamp > ago(24h)
| where ActionType in ("SetThreadContextApiCall", "CreateRemoteThreadApiCall")
| where InitiatingProcessFileName !in~ ("MsMpEng.exe", "csrss.exe", "services.exe", "WerFault.exe", "taskmgr.exe")
| where InitiatingProcessId != ProcessId
| extend IsSuspiciousTarget = FileName in~ ("svchost.exe", "explorer.exe", "ctfmon.exe", "RuntimeBroker.exe", "sihost.exe")
| project Timestamp, DeviceName, AccountName, ActionType,
         InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessId,
         FileName, ProcessId, IsSuspiciousTarget
| sort by Timestamp desc
critical severity high confidence

Data Sources

Process: OS API Execution Process: Process Access Microsoft Defender for Endpoint

Required Tables

DeviceEvents

False Positives

  • Debuggers (WinDbg, x64dbg, Visual Studio) using SetThreadContext to modify debuggee thread state
  • Windows Error Reporting (WerFault.exe) suspending and inspecting crashed process threads
  • Anti-cheat software suspending and scanning game process threads for integrity
  • Application crash handlers that suspend threads to generate crash dumps

Unlock Pro Content

Get the full detection package for T1055.003 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections