mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 02:08:54 +00:00
rule: svchost dll search order hijack
This commit is contained in:
parent
1a3444d0ef
commit
8ff85499c8
@ -0,0 +1,35 @@
|
||||
title: Svchost DLL Search Order Hijack
|
||||
status: experimental
|
||||
description: IKEEXT and SessionEnv service, as they call LoadLibrary on files that do not exist within C:\Windows\System32\ by default. An attacker can place their malicious logic within the PROCESS_ATTACH block of their library and restart the aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote machine.
|
||||
references:
|
||||
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
|
||||
author: SBousseaden
|
||||
date: 2019/10/28
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1038
|
||||
- attack.t1112
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 7
|
||||
Image:
|
||||
- '*\svchost.exe'
|
||||
ImageLoaded:
|
||||
- '*\tsmsisrv.dll'
|
||||
- '*\tsvipsrv.dll'
|
||||
- '*\wlbsctrl.dll'
|
||||
filter:
|
||||
EventID: 7
|
||||
Image:
|
||||
- '*\svchost.exe'
|
||||
ImageLoaded:
|
||||
- 'C:\Windows\WinSxS\*'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Pentest
|
||||
level: high
|
Loading…
Reference in New Issue
Block a user