ESET Online Help

Search English
Select the topic

Working with compromised flag

Sometimes, adversary can inject malicious code into a legitimate running process. Unfortunately, similar code injection techniques are also used by a lot of legitimate software, e.g. screen readers for the visually impaired.

Creating detections for every CodeInjection event would generate too many false positives. To solve this issue, we can use Compromised flag in ESET Inspect.

Rule

First, we create a rule that contains the action MarkAsCompromised without the TriggerDetection action. The MarkAsCompromised will add a flag to the process that is on the receiving end of code injection.

Now with the compromised flag set, we can reference it in another rule when additional suspicious operation, such as accessing the LSASS process will occur.