{"id":3333,"date":"2017-11-02T00:00:00","date_gmt":"2017-11-02T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center"},"modified":"2025-06-26T07:43:06","modified_gmt":"2025-06-26T14:43:06","slug":"detecting-in-memory-attacks-with-sysmon-and-azure-security-center","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/","title":{"rendered":"Detecting in-memory attacks with Sysmon and Azure Security Center"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts,&nbsp;<a href=\"https:\/\/www.scmagazineuk.com\/sentinelone-in-memory-attacks-loom-large-leave-little-trace\/article\/652960\/\" target=\"_blank\" rel=\"noreferrer noopener\">SentinelOne: In memory attacks loom large, leave little trace<\/a>,&nbsp;<a href=\"https:\/\/www.endgame.com\/blog\/technical-blog\/hunting-memory\" target=\"_blank\" rel=\"noreferrer noopener\">Hunting in memory<\/a>, and&nbsp;<a href=\"https:\/\/www.endgame.com\/blog\/technical-blog\/hunting-memory-net-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">Hunting for in-memory .NET attacks<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk \u2013 as is common with more traditional Trojans or implants found in many malware infections. The CSO article titled \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3227046\/malware\/what-is-a-fileless-attack-how-hackers-invade-systems-without-installing-software.html\" target=\"_blank\" rel=\"noreferrer noopener\">How hackers invade systems without installing software<\/a>\u201d provides a good overview.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Detection can be challenging because in-memory attacks often leave little to no footprint in many of the standard operating system event logs. Although many anti-virus solutions support some level of in-memory protection, they are often most-effective at detecting threats in malicious files on disk \u2013 and there are none in the in-memory scenario.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-attack\">The attack<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The attacker strategy in this example is as follows:<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp\" alt=\"graphical user interface, text, application, chat or text message\" class=\"wp-image-11234 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The first two stages of this attack chain involve in-memory techniques:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"initial-compromise-process-injection\">Initial compromise \u2013 process injection<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/40cd871f-93ad-4bca-bf3f-de76613cb080.webp\" alt=\"graphical user interface, application, Word\" class=\"wp-image-11236 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/40cd871f-93ad-4bca-bf3f-de76613cb080.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The victim is tricked into enabling macros in a Microsoft Office Word document delivered via email.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">#Hancitor is such an example threat \u2013 it uses a macro to inject into verclsid.exe. The malicious code is copied directly into the verclsid.exe process space so never touches the disk. Because verclsid.exe is a trusted Windows process, its activity is unlikely to be blocked by intrusion detection products.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"evade-future-detection-process-interference\">Evade future detection \u2013 process interference<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/65a3cbbb-4127-4416-9b35-908648860282.webp\" alt=\"text\" class=\"wp-image-11238 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/65a3cbbb-4127-4416-9b35-908648860282.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">After gaining a foothold on the victim machine, the attacker quickly takes steps to limit the likelihood of future detection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><code><a href=\"https:\/\/artofpwn.com\/phant0m-killing-windows-event-log.html\" target=\"_blank\" rel=\"noreferrer noopener\">Invoke-Phant0m<\/a><\/code>&nbsp;uses inter-process Windows API calls to find and terminate the threads associated with the Windows Event Log service. The service will still appear to be running \u2013 but it will no longer be writing events to the event log.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The attacker is now free to carry out other actions, safe in the knowledge that most of that activity won\u2019t get logged.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"detect-in-memory-attacks-using-sysmon-and-azure-security-center\">Detect in-memory attacks using Sysmon and Azure Security Center<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">By collecting and analyzing Sysmon events in Security Center, you can detect attacks like the ones above. To enable these detections, you must:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Install Sysmon on cloud and on-premises machines<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Collect Sysmon event data in your Log Analytics workspace<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Define custom alerts in Security Center to detect suspicious Sysmon events<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"sysmon-installation-and-configuration\">Sysmon installation and configuration<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Both the attack techniques discussed involve one process accessing another process\u2019 memory. This basic operation happens all the time as part of normal OS operations, but the kinds of access involved here are unusual (write privilege, rather than the more typical read privilege) as are the target processes whose memory is being modified (verclsid.exe and svchost.exe).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Sysmon can log such process accesses in a highly configurable way. It can be downloaded and installed from&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon\" target=\"_blank\" rel=\"noreferrer noopener\">documentation<\/a>. The Sysmon configuration is key as it determines the level and volume of logging.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The precise configuration desired will be highly customer dependent \u2013 indeed part of the rationale for Sysmon is to provide customers the flexibility to choose a very granular level of logging that goes beyond the OS defaults. There are online resources with suggested default Sysmon configurations \u2013&nbsp;<a href=\"https:\/\/twitter.com\/SwiftOnSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@SwiftOnSecurity<\/a>&nbsp;has published a good example on&nbsp;<a href=\"https:\/\/github.com\/SwiftOnSecurity\/sysmon-config\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The following configuration logs only privileged levels of memory access to specific processes. This will typically be very low volume, with Sysmon events only being logged in the event of attacker activity:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nexampleSysmonConfig.xml:\n\n\n  \n  \n    verclsid.exe\n    svchost.exe\n  \n  \n     \n         0x1F0FFF\n         0x1F1FFF\n         0x1F2FFF\n         0x1F3FFF\n             ...\n         0x1FFFFF\n         unknown\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">Installation is then performed via:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nsysmon.exe -i exampleSysmonConfig.xml\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">or <\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nsysmon64.exe -i exampleSysmonConfig.xml ((for the 64-bit version))\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">When the attacks above are executed, Sysmon logs a type 10 \u2018ProcessAccess\u2019 event like:<br><\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/a5b0a193-08b8-42cd-9681-d4758b41cb26.webp\" alt=\"graphical user interface, text, application, email\" class=\"wp-image-11242 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/a5b0a193-08b8-42cd-9681-d4758b41cb26.webp\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"enable-collection-of-sysmon-event-data\">Enable collection of Sysmon event data<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/5551b135-60a8-484d-887d-9f75a18e27c0.webp\" alt=\"graphical user interface, text, application\" class=\"wp-image-11244 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/5551b135-60a8-484d-887d-9f75a18e27c0.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-enable-data-collection\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Security Center collects a specific set of events to monitor for threats<\/a>. Collection of additional data sources \u2013 such as Sysmon events \u2013 can be configured from the Azure portal: open the Log Analytics workspace, and select Advanced Settings.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/log-analytics\/log-analytics-data-sources\" target=\"_blank\" rel=\"noreferrer noopener\">Data sources in log analytics<\/a>&nbsp;provide details on how to import many types of data for analytics. In the case of Windows event data, simply specify the path to the event log as shown below. For Sysmon event collection, you simply add:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nMicrosoft-Windows-Sysmon\/Operational:\n<\/pre><\/div>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/cc977dc5-dd55-473d-8c29-203aa6ed58c3.webp\" alt=\"graphical user interface, application\" class=\"wp-image-11246 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/cc977dc5-dd55-473d-8c29-203aa6ed58c3.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The Microsoft Monitoring Agent will now collect Sysmon events for all machines connected to this workspace. It just remains to put in place some alerting based on this data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"define-a-custom-alert-in-azure-security-center\">Define a custom alert in Azure Security Center<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/296c893e-a35a-449a-9a04-e52ae566b87a.webp\" alt=\"graphical user interface, text, application, email\" class=\"wp-image-11248 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/296c893e-a35a-449a-9a04-e52ae566b87a.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In the example Sysmon configuration above, the only events logged are very likely malicious. Therefore, we can alert on any ProcessAccess events that are collected.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Open Security Center in the Azure portal, select Customer Alerts and New Custom Alert Rule, specify the alert details, and use the following query for any type 10 Sysmon events:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nsearch \"Microsoft-Windows-Sysmon\/Operational\" | where EventID==10\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"view-alerts-in-security-center\">View alerts in Security Center<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The attacks from the first section are now detected, with the resulting alerts raised in Azure Security Center along with other built-in alerts:<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/45cf5cb0-0e63-469c-b8ff-bddec9d181d0.webp\" alt=\"graphical user interface\" class=\"wp-image-11250 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/45cf5cb0-0e63-469c-b8ff-bddec9d181d0.webp\"><\/figure>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/e0c0aaf6-cb95-4ffe-8612-4305b9e8a14f.webp\" alt=\"graphical user interface, text, application\" class=\"wp-image-11252 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/e0c0aaf6-cb95-4ffe-8612-4305b9e8a14f.webp\"><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"refinement-more-granular-alert-queries\">Refinement \u2013 more granular alert queries<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">You may want to create alerts based on specific criteria in the Sysmon event rather alerting on all events that are collected. This can be achieved by creating\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/log-analytics\/log-analytics-custom-fields\" target=\"_blank\" rel=\"noreferrer noopener\">custom fields<\/a>\u00a0and then defining alert rules based on a query of these fields.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"summary\">Summary<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In this post, we described how Sysmon can be used to detect several in-memory attacks and shown how alerting based on this data can be put in place and surfaced in Azure Security Center \u2013 whether for an Azure virtual machine or an on-premises machine.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Happy hunting!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"further-reading\">Further reading<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/artofpwn.com\/phant0m-killing-windows-event-log.html\" target=\"_blank\" rel=\"noreferrer noopener\">Phant0m: Killing Windows Event Log<\/a>\u00a0\u2013 May 6th 2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-enable-data-collection\" target=\"_blank\" rel=\"noreferrer noopener\">Data collection in Azure Security Center<\/a>\u00a0\u2013\u00a0 Microsoft Azure documentation, September 11th 2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/log-analytics\/log-analytics-data-sources\" target=\"_blank\" rel=\"noreferrer noopener\">Data sources in log analytics<\/a>\u00a0\u2013 Microsoft Azure documentation, May 23rd 2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-custom-alert\" target=\"_blank\" rel=\"noreferrer noopener\">Custom alert rules in Azure Security Center (Preview)<\/a>\u00a0\u2013 Microsoft Azure documentation, Sept 18th 2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/Microsoft-Ignite-Orlando-2017\/BRK3201\" target=\"_blank\" rel=\"noreferrer noopener\">Simplify hybrid cloud protection with Microsoft Azure Security Center<\/a>\u00a0\u2013 Sarah Fender, Meital Taran-Gutman \u2013 Ignite 2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon\" target=\"_blank\" rel=\"noreferrer noopener\">System Monitor (Sysmon)<\/a>\u00a0\u2013 Mark Russinovich and Thomas Garnier<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) \u2013 Tom Ueltschi, Swiss Post CERT, Presented at FIRST2017<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.crypsisgroup.com\/wp-content\/uploads\/2017\/07\/CG_WhitePaper_Splunkmon_1216-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Splunkmon \u2013 taking Sysmon to the Next Level<\/a>\u00a0\u2013 Alec Randazzo, Thomas Aneiro and James Espinosa, Crypsis<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.eideon.com\/2017-09-09-THL01-Mimikatz\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tales of a threat Hunter 1<\/a>\u00a0\u2013 Eideon, 9th September 2017<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1459],"tags":[],"audience":[3053,3056],"content-type":[1511],"product":[1515],"tech-community":[],"topic":[],"coauthors":[997],"class_list":["post-3333","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-security","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-microsoft-defender-for-cloud","review-flag-1680286581-295","review-flag-1-1680286581-825","review-flag-free-1680286579-836","review-flag-never-1680286580-606","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-02T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T14:43:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png\" \/>\n<meta name=\"author\" content=\"Tim Burrell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Burrell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/tim-burrell\/\",\"@type\":\"Person\",\"@name\":\"Tim Burrell\"}],\"headline\":\"Detecting in-memory attacks with Sysmon and Azure Security Center\",\"datePublished\":\"2017-11-02T00:00:00+00:00\",\"dateModified\":\"2025-06-26T14:43:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\"},\"wordCount\":1018,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png\",\"articleSection\":[\"Hybrid + multicloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\",\"name\":\"Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png\",\"datePublished\":\"2017-11-02T00:00:00+00:00\",\"dateModified\":\"2025-06-26T14:43:06+00:00\",\"description\":\"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp\",\"width\":640,\"height\":186,\"caption\":\"graphical user interface, text, application, chat or text message\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Detecting in-memory attacks with Sysmon and Azure Security Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog","description":"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/","og_locale":"en_US","og_type":"article","og_title":"Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog","og_description":"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2017-11-02T00:00:00+00:00","article_modified_time":"2025-06-26T14:43:06+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png","type":"","width":"","height":""}],"author":"Tim Burrell","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Tim Burrell","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/tim-burrell\/","@type":"Person","@name":"Tim Burrell"}],"headline":"Detecting in-memory attacks with Sysmon and Azure Security Center","datePublished":"2017-11-02T00:00:00+00:00","dateModified":"2025-06-26T14:43:06+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/"},"wordCount":1018,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png","articleSection":["Hybrid + multicloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/","name":"Detecting in-memory attacks with Sysmon and Azure Security Center | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.png","datePublished":"2017-11-02T00:00:00+00:00","dateModified":"2025-06-26T14:43:06+00:00","description":"In-memory attacks are on the rise and attracting increasing attention. In this post, we will describe two in-memory attack techniques and show how these can be detected using Sysmon and Azure Security Center.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/11\/c942b6b6-3c40-4e82-9315-3f97824e201d.webp","width":640,"height":186,"caption":"graphical user interface, text, application, chat or text message"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/detecting-in-memory-attacks-with-sysmon-and-azure-security-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Detecting in-memory attacks with Sysmon and Azure Security Center"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/3333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=3333"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/3333\/revisions"}],"predecessor-version":[{"id":43794,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/3333\/revisions\/43794"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=3333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=3333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=3333"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=3333"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=3333"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=3333"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=3333"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=3333"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=3333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}