Esc
There are no digital artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND.
KernelCallbackTable - T1574.013
(ATT&CK® Technique)
Definition
Adversaries may abuse the KernelCallbackTable
of a process to hijack its execution flow in order to run their own payloads. The KernelCallbackTable
can be found in the Process Environment Block (PEB) and is initialized to an array of graphic functions available to a GUI process once user32.dll
is loaded.
D3FEND Inferred Relationships
There are no digital artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND.