2019-10-29 05:12:57 +00:00
title : Suspicious Remote Thread Created
2019-12-19 22:56:36 +00:00
id : 66d31e5f-52d6-40a4-9615-002d3789a119
description : Offensive tradecraft is switching away from using APIs like "CreateRemoteThread", however, this is still largely observed in the wild. This rule aims
to detect suspicious processes (those we would not expect to behave in this way like word.exe or outlook.exe) creating remote threads on other processes. It is
a generalistic rule, but it should have a low FP ratio due to the selected range of processes.
notes :
2019-10-29 05:12:57 +00:00
- MonitoringHost.exe is a process that loads .NET CLR by default and thus a favorite for process injection for .NET in-memory offensive tools.
status : experimental
2020-04-02 08:00:00 +00:00
date : 2019 /10/27
2020-08-29 00:03:28 +00:00
modified : 2020 /08/28
2019-10-29 05:12:57 +00:00
author : Perez Diego (@darkquassar), oscd.community
references :
- Personal research, statistical analysis
- https://lolbas-project.github.io
logsource :
product : windows
service : sysmon
tags :
- attack.privilege_escalation
2020-08-29 00:03:28 +00:00
- attack.defense_evasion
2019-12-14 23:17:22 +00:00
- attack.t1055
2019-10-29 05:12:57 +00:00
detection :
selection :
EventID : 8
2019-11-13 21:34:09 +00:00
SourceImage|endswith :
- '\bash.exe'
- '\cvtres.exe'
2020-01-17 14:46:28 +00:00
- '\defrag.exe'
- '\dnx.exe'
2019-11-13 21:34:09 +00:00
- '\esentutl.exe'
2020-01-17 14:46:28 +00:00
- '\excel.exe'
2019-11-13 21:34:09 +00:00
- '\expand.exe'
2020-01-17 14:46:28 +00:00
- '\explorer.exe'
- '\find.exe'
- '\findstr.exe'
2019-11-13 21:34:09 +00:00
- '\forfiles.exe'
2020-01-17 14:46:28 +00:00
- '\git.exe'
- '\gpupdate.exe'
2019-11-13 21:34:09 +00:00
- '\hh.exe'
2020-01-17 14:46:28 +00:00
- '\iexplore.exe'
2019-11-13 21:34:09 +00:00
- '\installutil.exe'
2020-01-17 14:46:28 +00:00
- '\lync.exe'
2019-11-13 21:34:09 +00:00
- '\makecab.exe'
2020-01-17 14:46:28 +00:00
- '\mDNSResponder.exe'
- '\monitoringhost.exe'
- '\msbuild.exe'
2019-11-13 21:34:09 +00:00
- '\mshta.exe'
2020-01-17 14:46:28 +00:00
- '\msiexec.exe'
- '\mspaint.exe'
- '\outlook.exe'
- '\ping.exe'
- '\powerpnt.exe'
- '\powershell.exe'
- '\provtool.exe'
- '\python.exe'
2019-11-13 21:34:09 +00:00
- '\regsvr32.exe'
2020-01-17 14:46:28 +00:00
- '\robocopy.exe'
- '\runonce.exe'
- '\sapcimc.exe'
2019-11-13 21:34:09 +00:00
- '\schtasks.exe'
2020-01-17 14:46:28 +00:00
- '\smartscreen.exe'
- '\spoolsv.exe'
2020-02-26 08:33:55 +00:00
# - '\taskhost.exe' # disabled due to false positives
2019-11-13 21:34:09 +00:00
- '\tstheme.exe'
2020-01-17 14:46:28 +00:00
- '\userinit.exe'
- '\vssadmin.exe'
- '\vssvc.exe'
- '\w3wp.exe*'
- '\winlogon.exe'
- '\winscp.exe'
- '\wmic.exe'
- '\word.exe'
- '\wscript.exe'
2019-10-29 05:12:57 +00:00
filter :
2019-11-13 21:34:09 +00:00
SourceImage|contains : 'Visual Studio'
2019-10-29 05:12:57 +00:00
condition : selection AND NOT filter
2020-01-10 23:11:27 +00:00
fields :
- ComputerName
- User
- SourceImage
- TargetImage
2019-10-29 05:12:57 +00:00
level : high
falsepositives :
- Unknown