MITRE ATT&CK Technique
Defense Evasion T1036.011
Description

Adversaries may modify a process's in-memory arguments to change its name in order to appear as a legitimate or benign process. On Linux, the operating system stores command-line arguments in the process’s stack and passes them to the `main()` function as the `argv` array. The first element, `argv[0]`, typically contains the process name or path - by default, the command used to actually start the process (e.g., `cat /etc/passwd`). By default, the Linux `/proc` filesystem uses this value to represent the process name. The `/proc/<PID>/cmdline` file reflects the contents of this memory, and tools like `ps` use it to display process information. Since arguments are stored in user-space memory at launch, this modification can be performed without elevated privileges. During runtime, adversaries can erase the memory used by all command-line arguments for a process, overwriting each argument string with null bytes. This removes evidence of how the process was originally launched. They can then write a spoofed string into the memory region previously occupied by `argv[0]` to mimic a benign command, such as `cat resolv.conf`. The new command-line string is reflected in `/proc/<PID>/cmdline` and displayed by tools like `ps`.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft XorDdos Linux Stealth 2022)

Supported Platforms
Linux
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2025-03-27T20:37:52.269Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': "Adversaries may modify a process's in-memory arguments to "
                'change its name in order to appear as a legitimate or benign '
                'process. On Linux, the operating system stores command-line '
                'arguments in the process’s stack and passes them to the '
                '`main()` function as the `argv` array. The first element, '
                '`argv[0]`, typically contains the process name or path - by '
                'default, the command used to actually start the process '
                '(e.g., `cat /etc/passwd`). By default, the Linux `/proc` '
                'filesystem uses this value to represent the process name. The '
                '`/proc/<PID>/cmdline` file reflects the contents of this '
                'memory, and tools like `ps` use it to display process '
                'information. Since arguments are stored in user-space memory '
                'at launch, this modification can be performed without '
                'elevated privileges. \n'
                '\n'
                'During runtime, adversaries can erase the memory used by all '
                'command-line arguments for a process, overwriting each '
                'argument string with null bytes. This removes evidence of how '
                'the process was originally launched. They can then write a '
                'spoofed string into the memory region previously occupied by '
                '`argv[0]` to mimic a benign command, such as `cat '
                'resolv.conf`. The new command-line string is reflected in '
                '`/proc/<PID>/cmdline` and displayed by tools like '
                '`ps`.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft '
                'XorDdos Linux Stealth 2022) ',
 'external_references': [{'external_id': 'T1036.011',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1036/011'},
                         {'description': 'Ratnesh Pandey, Yevgeny Kulakov, and '
                                         'Jonathan Bar Or with Saurabh '
                                         'Swaroop. (2022, May 19). Rise in '
                                         'XorDdos: A deeper look at the '
                                         'stealthy DDoS malware targeting '
                                         'Linux devices. Retrieved September '
                                         '27, 2023.',
                          'source_name': 'Microsoft XorDdos Linux Stealth 2022',
                          'url': 'https://www.microsoft.com/en-us/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/'},
                         {'description': 'The Sandfly Security Team. (2022, '
                                         'May 11). BPFDoor - An Evasive Linux '
                                         'Backdoor Technical Analysis. '
                                         'Retrieved September 29, 2023.',
                          'source_name': 'Sandfly BPFDoor 2022',
                          'url': 'https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/'}],
 'id': 'attack-pattern--514dc7b3-0b80-4382-80a9-2e2d294f5019',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-04-15T19:58:30.391Z',
 'name': 'Overwrite Process Arguments',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Linux'],
 'x_mitre_version': '1.0'}
Quick Actions