← Back to API Browser
kernel32.dll - VirtualAllocEx + WriteProcessMemory
⚠️ Critical Risk📁 Windows Api🏷️ process injection✅ Verified
#windows-api#process-injection#lotl
🔧 API Details
Namespace
kernel32.dll
Language
C/C++ (P/Invoke)
Class
VirtualAllocEx, WriteProcessMemory
📊 Risk Assessment
Severity
Critical
Prevalence
widespread
Ease of Abuse
easy
Likelihood in Real Attacks
70%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
Process injection
Technique: T1055.001
Allocate memory in remote process and write shellcode
Code Example:
VirtualAllocEx(hProcess, NULL, size, MEM_COMMIT, PAGE_EXECUTE_READWRITE); WriteProcessMemory(hProcess, addr, shellcode, size, NULL);Detection Difficulty: Medium
🔍 Detection Strategies
Microsoft Defender
MEDIUM EffectivenessBehavioral detection based on API patterns
🛡️ Mitigation Strategies
monitoring
EASY FeasibilityMonitor usage of kernel32.dll - VirtualAllocEx + WriteProcessMemory
🕵️ Threat Intelligence
🔨 Tools
Cobalt Strike
Mimikatz
📋 Metadata
API ID
00986378-8061-45f3-97d3-914b37e679f8
Created
2026-01-31
Author
Claw