The cybersecurity researchers at Security Joes recently discovered a new injection technique that is dubbed “Mockingjay.”
The threat actors could actively exploit this newly discovered injection technique to run and execute malicious code on compromised systems by evading the EDR (Endpoint Detection and Response) and other security solutions.
Utilizing DLLs with RWX sections, this technique easily bypasses the EDR hooks and injects code into remote operations.
By injecting code into trusted running processes, the process injection enables threat actors to execute undetected malicious code.
Attackers employ Windows APIs, system calls, process/thread creation, and process memory writing in these techniques.
Security tools can detect and intervene in suspicious incidents by monitoring specific actions mentioned above.
The following things differentiate the Mockingjay from others that enable it to evade several detection possibilities:-
Commonly abused Windows API calls are not used
Here below, we have mentioned all the process injection methods:-
Researchers aimed to locate a vulnerable DLL with a default RWX section, enabling effortless modification of its contents for loading harmful code.
This bypasses the need for extra steps like obtaining more permissions, which may alert security software.
Security Joe’s analysts, on their DLL search, stumbled upon Visual Studio 2022 Community’s msys-2.0.dll, sporting a 16 KB default RWX section.
Following that, the team devised two injection techniques, and here they are mentioned below:-
For the initial scenario, “nightmare.exe,” a custom application that directly loads the vulnerable DLL using two Windows API calls into its memory.
This bypasses the memory allocation or permission settings and provides direct entry to the RWX section.
While at this point, EDR gets informed about the creation of a new process and promptly adds its own dynamic library to it after the application is launched.
After execution, the EDR alters byte code to modify targeted functions within the in-memory NTDLL.DLL copy.
Following that, the “Hell’s Gate EDR unhooking” technique exploits NTDLL.DLL, a new system module, to extract syscall numbers.
These numbers bypass EDR hooks, enabling undetected execution of the injected shellcode.
Exploiting msys-2.0.dll’s TWX section, the second approach injects a payload into the “ssh.exe” process remotely.
In this scenario, the injected shellcode loads the DLL file “MyLibrary.dll” to initiate a reverse shell connection with the attacker’s machine.
Here below, we have mentioned the PoC video:-
Here below, we have mentioned all the APIs that are commonly monitored by EDR solutions and gathered in process injection attacks:-
That’s why the Mockingjay minimizes the likelihood of triggering alerts. Rather than relying solely on EDR solutions, Security Joes’ ‘Mockingjay’ development highlights the need for robust and sophisticated security approaches.
“AI-based email security measures Protect your business From Email Threats!” – .
A significant vulnerability in the Linux kernel's Virtual Socket (vsock) implementation, designated as CVE-2025-21756, has…
Cybersecurity researchers have uncovered a concerning cache of hacking tools, including SuperShell payloads and Cobalt…
The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow…
The Cybersecurity and Infrastructure Security Agency (CISA) has added the Commvault Web Server vulnerability (CVE-2025-3928)…
Kali Linux users worldwide are facing an imminent disruption as the security-focused distribution has announced…
In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented…