← Back to API Browser
kernel32.dll - CreateRemoteThread
⚠️ Critical Risk📁 Windows Native Api🏷️ process injection✅ Verified
#windows-native-api#process-injection#rce#widely-abused
🔧 API Details
Namespace
kernel32.dll
Language
C/C++ (P/Invoke)
Function
CreateRemoteThread
📊 Risk Assessment
Severity
Critical
Prevalence
widespread
Ease of Abuse
medium
Likelihood in Real Attacks
85%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
Remote code injection
Technique: T1055.001
Execute shellcode in remote process by creating a thread in another process
Code Example:
HANDLE hThread = CreateRemoteThread(hProcess, NULL, 0, (LPTHREAD_START_ROUTINE)addr, NULL, 0, NULL);Detection Difficulty: Medium
🔍 Detection Strategies
Microsoft Defender
HIGH EffectivenessSuspicious CreateRemoteThread + VirtualAllocEx pattern detection
Splunk/Sysmon
HIGH EffectivenessMonitor for CreateRemoteThread call followed by thread creation from suspicious memory
🛡️ Mitigation Strategies
policy
HIGH FeasibilityEnable Code Integrity (HVCI) to prevent injection
monitoring
EASY FeasibilityMonitor Sysmon Event ID 8 for CreateRemoteThread
🕵️ Threat Intelligence
👥 APT Groups / Threat Actors
APT28
Lazarus
APT33
🦠 Malware Families
Emotet
IcedID
AsyncRAT
🔨 Tools
Cobalt Strike
Metasploit
Empire
📋 Metadata
API ID
d4f7b037-613f-4778-9ade-408ed11e1466
Created
2026-02-02
Author
Claw