DET0295 Behavioral Detection of Thread Execution Hijacking via Thread Suspension and Context Switching
| Item |
Value |
| ID |
DET0295 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1055.003 (Thread Execution Hijacking)
Analytics
Windows
AN0822
Detects hijacking of an existing thread (OpenThread) through a behavioral chain involving thread suspension (SuspendThread), memory modification (VirtualAllocEx + WriteProcessMemory), context manipulation (SetThreadContext), and thread resumption—all within another live process’s address space (ResumeThread).
Log Sources
Mutable Elements
| Field |
Description |
| TargetProcessList |
Sensitive processes that should never be targeted for thread hijack attempts |
| TimeWindow |
Expected delay between SuspendThread and ResumeThread events; tight thresholds reduce evasion |
| SuspiciousThreadContextRegions |
Memory regions or offsets that should not be targeted for SetThreadContext |
| ParentProcessAnomalyThreshold |
Score deviation of the parent/child relationship in a thread injection chain |