pe-sieve
pe-sieve copied to clipboard
Failed to detect injection(OpenThread-> QueueUserAPC-> ResumeThread) by MSBuildAPICaller
Hello, maybe I'm doing something wrong, but I'm sure pe-sieve can detect that standard injection by this tool - https://github.com/rvrsh3ll/MSBuildAPICaller
Here s screenshot:
Thank you for reporting, I will check it!
What was the shellcode injected? PE-sieve detects the payload, not the method of injection (it does a passive scan and no API hooking). If the shellcode was small and obfuscated, it would possibly not detect it.
Shellcode was simple meterpreter reverse_tcp shell.
PE-sieve detects the payload, not the method of injection (it does a passive scan and no API hooking). If the shellcode was small and obfuscated, it would possibly not detect it.
Thanks, it makes sense.
@duzvik - please check if the recent commit solved the problem. You can get the latest builds from the build server: 64bit and 32bit
I think it should work fine in the latest release, but please check and let me know: https://github.com/hasherezade/pe-sieve/releases