Skip to main content

Mimikatz Process Doppleganging

This post is just about running a tool created by hasherezade to perform process doppleganging.
All credit goes to the researchers Tal Liberman  and Eugene Kogan from enSilo and also hasherezade

I just wanted to simulate the same process doppleganging and detect with pe-sieve, it is recommended to walk through author's blackhat presentation Lost in transaction - Process Doppelgänging and tool creator's write up Process Doppelgänging – a new way to impersonate a process

Process doppelganing is a code injection technique ( can be a substitute to traditional process hollowing code injection technique) that leverages NTFS transacations related Windows API calls which are less used with malicious intent and hence "less known" to AV vendors, hence this code injection technique is more likely to go undetected.

The Doppelgänging objective is to load and execute aribitrary code in the context of a legitimate process, none of the process hollowing API calls like NtUnmapViewOfSection, VirtualProtectEx and SetThreatContext  can be identified 

Download and compile code from hasherezade git repo

Process Doppleganging - running mimikatz 

Detecting Process Doppleganging using PE-sieve


  1. Easy guide, thank you! Videos are also very useful.

  2. Wonderful article, Which you have shared, your article is very important and I was really interested to read it. If anyone looking for Google Search Api then visit SERP House, It’s the best choice.


Post a comment

Popular posts from this blog

Memory Analysis of WannaCry Ransomware

This post explains the memory dump analysis of WannaCry infected system using volatility (An open source memory forensics framework) and other open source tools. It doesn't cover the analysis of initial infection vector, propagation and recovery of infected system. The objective is to leverage memory forensic analysis to uncover and extract Indicators of Compromise (IoC) 

WannaCry (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) is a ransomware program targeting the Microsoft Windows operating system. On Friday, 12 May 2017, a large cyber-attack using it was launched, infecting more than 230,000 computers in 150 countries, demanding ransom payments in the cryptocurrency bitcoin in 28 languages.The attack has been described by Europol as unprecedented in scale.

You are dealing with real malware samples Don’t expose them to internal networks or internet Analyze them in a controlled environme…

Memory dump analysis of Donny's System


This post solves the mystery of Donny's System  and outlines how to utilize memory forensics methodology to uncover artifacts from memory dumps

Tools: Volatility, Yara  & Windows Powershell


Six-step investigative methodology by SANS

Identify rogue processes Analyze process DLLs and handles  Review network artifacts Look for evidence of code injection Check for signs of rootkitDump suspicious processes and drivers  Run volatility imageinfo plugin  to identify profile  PS C:\volatility> .\vol.exe -f .\unknown.vmem imageinfo
Run Volatility pslist plugin to see active running processes
PS C:\volatility> .\vol.exe -f .\unknown.vmem --profile=WinXPSP3x86 pslist
Just to remind that all process creation and termination timings are specified in UTC. Ensure to change them to system timezone while correlating the events with other sources of evidence
game.exe clearly looks suspicious as it ran and exit in a short span of time. The most interesting part was explor…

Decoding Metasploit and CobaltStrike shells

This post is about how to decode one type of shellcode generated by Metasploit framework and CobaltStrike to get the C2 domain/IP address so that the incident responder can able to identify and block the further adversary activity. FYI this post doesn't cover the initial infection vector (like phishing thorough office maldoc) or how the shellcode will get generated (like from Metasploit framework or Cobaltstrike).

It leverages CyberChef to fully decode and get the shellcode from an encoded powershell command and further it will be fed into scdbg emulator to get the IP address of C2 or an adversary

Here we have the encoded powershell command