fix: prevent possible FPs with the respective command only used as the last parameter

This commit is contained in:
phantinuss 2021-09-01 14:33:27 +02:00
parent 434c3891ff
commit deefcaa8ac
No known key found for this signature in database
GPG Key ID: 10E5D3C9141CC9FF
2 changed files with 10 additions and 0 deletions

View File

@ -4,6 +4,7 @@ status: experimental
description: 'Detects attackers using tooling with bad opsec defaults e.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run, one trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.'
author: 'Oleg Kolesnikov @securonix invrep_de, oscd.community'
date: 2020/10/23
modified: 2021/09/01
references:
- https://blog.malwarebytes.com/malwarebytes-news/2020/10/kraken-attack-abuses-wer-service/
- https://www.cobaltstrike.com/help-opsec
@ -16,6 +17,9 @@ logsource:
product: windows
detection:
selection:
Image|endswith:
- '\WerFault.exe'
- '\rundll32.exe'
CommandLine|endswith:
- '\WerFault.exe'
- '\rundll32.exe'

View File

@ -10,11 +10,17 @@ references:
- https://docs.microsoft.com/en-us/dotnet/framework/tools/regsvcs-exe-net-services-installation-tool#feedback
author: Florian Roth
date: 2021/05/27
modified: 2021/09/01
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\rundll32.exe'
- '\regsvcs.exe'
- '\regasm.exe'
- '\regsvr32.exe'
CommandLine|endswith:
- '\rundll32.exe'
- '\regsvcs.exe'