|
| 1 | +name: Process creation from a stomped module |
| 2 | +id: f85d1e80-49ec-4bbe-9bf5-7e2a3a8a7319 |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Identifies the creation of the process from the parent where the call stack |
| 6 | + exhibits suspicious memory properties. The pattern is typical of stomped module |
| 7 | + techniques such as DLL-hollowing or other forms of in-memory code injection where |
| 8 | + an attacker overwrites or maps shellcode into legitimate system modules to hide |
| 9 | + malicious payloads. |
| 10 | +labels: |
| 11 | + tactic.id: TA0005 |
| 12 | + tactic.name: Defense Evasion |
| 13 | + tactic.ref: https://attack.mitre.org/tactics/TA0005/ |
| 14 | + technique.id: T1055 |
| 15 | + technique.name: Process Injection |
| 16 | + technique.ref: https://attack.mitre.org/techniques/T1055/ |
| 17 | +references: |
| 18 | + - https://www.forrest-orr.net/post/malicious-memory-artifacts-part-i-dll-hollowing |
| 19 | + |
| 20 | +condition: > |
| 21 | + spawn_process and |
| 22 | + foreach(thread._callstack, $frame, $frame.module imatches ('?:\\Windows\\System32\\*.dll', '?:\\Windows\\SysWOW64\\*.dll') and $frame.allocation_size >= 10000) and |
| 23 | + not foreach(thread._callstack, $frame, $frame.module imatches |
| 24 | + ( |
| 25 | + '?:\\Program Files\\*.dll', |
| 26 | + '?:\\Program Files (x86)\\*.dll', |
| 27 | + '?:\\Windows\\System32\\umppc*.dll' |
| 28 | + ) or |
| 29 | + ( |
| 30 | + $frame.allocation_size >= 10000 and $frame.module imatches |
| 31 | + ( |
| 32 | + '?:\\Windows\\System32\\ntdll.dll', |
| 33 | + '?:\\Windows\\System32\\rpcrt4.dll', |
| 34 | + '?:\\Windows\\SysWOW64\\rpcrt4.dll', |
| 35 | + '?:\\Windows\\System32\\KernelBase.dll', |
| 36 | + '?:\\Windows\\SysWOW64\\KernelBase.dll', |
| 37 | + '?:\\Windows\\System32\\combase.dll', |
| 38 | + '?:\\Windows\\SysWOW64\\combase.dll', |
| 39 | + '?:\\Windows\\System32\\user32.dll', |
| 40 | + '?:\\Windows\\SysWOW64\\user32.dll', |
| 41 | + '?:\\Windows\\System32\\ws2_32.dll', |
| 42 | + '?:\\Windows\\SysWOW64\\ws2_32.dll', |
| 43 | + '?:\\Windows\\System32\\spool\\drivers\\*', |
| 44 | + '?:\\Windows\\assembly\\NativeImages_*', |
| 45 | + '?:\\Windows\\System32\\DriverStore\\FileRepository\\*' |
| 46 | + ) |
| 47 | + )) |
| 48 | +action: |
| 49 | + - name: kill |
| 50 | + |
| 51 | +severity: high |
| 52 | + |
| 53 | +min-engine-version: 3.0.0 |
0 commit comments