SigmaHQ/rules/windows/process_creation/win_susp_rundll32_setupapi_installhinfsection.yml
grikos 9df6608239
Remove asterisk from condition
Change 
        ParentCommandLine:
            - 'setupapi.dll*InstallHinfSection'
to
        ParentCommandLine|contains|all:
            - 'setupapi.dll'
            - 'InstallHinfSection'

because some LM/SIEM systems don't process '*' as Splunk or Elasticsearch
2020-10-07 14:54:13 +03:00

36 lines
1.6 KiB
YAML

title: Suspicious Rundll32 Setupapi.dll Activity
id: 285b85b1-a555-4095-8652-a8a4106af63f
description: setupapi.dll library provide InstallHinfSection function for processing INF files. INF file may contain instructions allowing to create values in the registry, modify files and install drivers.
This technique could be used to obtain persistence via modifying one of Run or RunOnce registry keys, run process or use other DLLs chain calls (see references)
InstallHinfSection function in setupapi.dll calls runonce.exe executable regardless of actual content of INF file.
status: experimental
author: Konstantin Grishchenko, oscd.community
date: 2020/10/07
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSLibraries/Setupapi.yml
- https://gist.githubusercontent.com/bohops/0cc6586f205f3691e04a1ebf1806aabd/raw/baf7b29891bb91e76198e30889fbf7d6642e8974/calc_exe.inf
- https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf
- https://twitter.com/Z3Jpa29z/status/1313742350292746241?s=20
tags:
- attack.defense_evasion
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\runonce.exe'
ParentImage|endswith: '\rundll32.exe'
ParentCommandLine|contains|all:
- 'setupapi.dll'
- 'InstallHinfSection'
condition: selection
fields:
- ComputerName
- User
- CommandLine
- ParentCommandLine
falsepositives:
- Scripts and administrative tools that use INF files for driver installation with setupapi.dll
level: medium