MITRE ATT&CK Technique
Description
Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-based defenses as well as possibly elevate privileges. TLS callback injection is a method of executing arbitrary code in the address space of a separate live process. TLS callback injection involves manipulating pointers inside a portable executable (PE) to redirect a process to malicious code before reaching the code's legitimate entry point. TLS callbacks are normally used by the OS to setup and/or cleanup data used by threads. Manipulating TLS callbacks may be performed by allocating and writing to specific offsets within a process’ memory space using other [Process Injection](https://attack.mitre.org/techniques/T1055) techniques such as [Process Hollowing](https://attack.mitre.org/techniques/T1055/012).(Citation: FireEye TLS Nov 2017) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via TLS callback injection may also evade detection from security products since the execution is masked under a legitimate process.
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2020-01-14T01:30:41.092Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Adversaries may inject malicious code into processes via '
'thread local storage (TLS) callbacks in order to evade '
'process-based defenses as well as possibly elevate '
'privileges. TLS callback injection is a method of executing '
'arbitrary code in the address space of a separate live '
'process. \n'
'\n'
'TLS callback injection involves manipulating pointers inside '
'a portable executable (PE) to redirect a process to malicious '
"code before reaching the code's legitimate entry point. TLS "
'callbacks are normally used by the OS to setup and/or cleanup '
'data used by threads. Manipulating TLS callbacks may be '
'performed by allocating and writing to specific offsets '
'within a process’ memory space using other [Process '
'Injection](https://attack.mitre.org/techniques/T1055) '
'techniques such as [Process '
'Hollowing](https://attack.mitre.org/techniques/T1055/012).(Citation: '
'FireEye TLS Nov 2017)\n'
'\n'
'Running code in the context of another process may allow '
"access to the process's memory, system/network resources, and "
'possibly elevated privileges. Execution via TLS callback '
'injection may also evade detection from security products '
'since the execution is masked under a legitimate process. ',
'external_references': [{'external_id': 'T1055.005',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1055/005'},
{'description': 'Hosseini, A. (2017, July 18). Ten '
'Process Injection Techniques: A '
'Technical Survey Of Common And '
'Trending Process Injection '
'Techniques. Retrieved December 7, '
'2017.',
'source_name': 'Elastic Process Injection July 2017',
'url': 'https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process'},
{'description': 'Vaish, A. & Nemes, S. (2017, '
'November 28). Newly Observed Ursnif '
'Variant Employs Malicious TLS '
'Callback Technique to Achieve '
'Process Injection. Retrieved '
'December 18, 2017.',
'source_name': 'FireEye TLS Nov 2017',
'url': 'https://www.fireeye.com/blog/threat-research/2017/11/ursnif-variant-malicious-tls-callback-technique.html'}],
'id': 'attack-pattern--e49ee9d2-0d98-44ef-85e5-5d3100065744',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'defense-evasion'},
{'kill_chain_name': 'mitre-attack',
'phase_name': 'privilege-escalation'}],
'modified': '2025-10-24T17:49:32.111Z',
'name': 'Thread Local Storage',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': True,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['Windows'],
'x_mitre_version': '1.2'}