Chapter 13 Notes

to accompany Sikorski and Honig, Practical Malware Analysis, no starch press

Chapter 12 in the printed edition

Covert Malware Launching

How does malware avoid detection?

Launchers

Process Injection

Process Replacement

Hook Injection

Detours

APC Injection