Skip to content

Parent Process PID Spoofing to Evade Detection

Main Function

The module generates an exe file with a payload. After execution, it automatically migrates to the ie process and spoofs the parent process (PPID) to be explorer.exe (Windows Explorer).

Operation Method

  • Open the module, select listen, and run.
  • Generate the cpp source code and download it.

  • Download the source code and compile it using Visual Studio.

The compiler built into Viper is Mingw64. When compiling this module, the anti - detection effect is poor. Therefore, the source code is provided for users to compile by themselves.

  • Upload and run it on the target host.

  • When using a webshell to run the exe generated by this module for connection, the effect is as follows:

It can be seen that the process of the payload is ie, and the parent process is explorer.exe. This can effectively defend against AV detection and blue - team tracing.

  • Comparative test: When using a webshell to run the exe generated by other anti - detection modules for connection, the effect is as follows:

It can be seen that the parent process of the payload is cmd.exe (Behinder).