Skip to content

Commit db33bba

Browse files
committed
feat(rules): Add Process creation from a stomped module rule
Identifies the creation of the process from the parent where the call stack exhibits suspicious memory properties. The pattern is typical of stomped module techniques such as DLL-hollowing or other forms of in-memory code injection where an attacker overwrites or maps shellcode into legitimate system modules to hide malicious payloads.
1 parent 2eab2d5 commit db33bba

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
name: Process creation from a stomped module
2+
id: f85d1e80-49ec-4bbe-9bf5-7e2a3a8a7319
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of the process from the parent where the call stack
6+
exhibits suspicious memory properties. The pattern is typical of stomped module
7+
techniques such as DLL-hollowing or other forms of in-memory code injection where
8+
an attacker overwrites or maps shellcode into legitimate system modules to hide
9+
malicious payloads.
10+
labels:
11+
tactic.id: TA0005
12+
tactic.name: Defense Evasion
13+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
14+
technique.id: T1055
15+
technique.name: Process Injection
16+
technique.ref: https://attack.mitre.org/techniques/T1055/
17+
references:
18+
- https://www.forrest-orr.net/post/malicious-memory-artifacts-part-i-dll-hollowing
19+
20+
condition: >
21+
spawn_process and
22+
foreach(thread._callstack, $frame, $frame.module imatches ('?:\\Windows\\System32\\*.dll', '?:\\Windows\\SysWOW64\\*.dll') and $frame.allocation_size >= 10000) and
23+
not foreach(thread._callstack, $frame, $frame.module imatches
24+
(
25+
'?:\\Program Files\\*.dll',
26+
'?:\\Program Files (x86)\\*.dll',
27+
'?:\\Windows\\System32\\umppc*.dll'
28+
) or
29+
(
30+
$frame.allocation_size >= 10000 and $frame.module imatches
31+
(
32+
'?:\\Windows\\System32\\ntdll.dll',
33+
'?:\\Windows\\System32\\rpcrt4.dll',
34+
'?:\\Windows\\SysWOW64\\rpcrt4.dll',
35+
'?:\\Windows\\System32\\KernelBase.dll',
36+
'?:\\Windows\\SysWOW64\\KernelBase.dll',
37+
'?:\\Windows\\System32\\combase.dll',
38+
'?:\\Windows\\SysWOW64\\combase.dll',
39+
'?:\\Windows\\System32\\user32.dll',
40+
'?:\\Windows\\SysWOW64\\user32.dll',
41+
'?:\\Windows\\System32\\ws2_32.dll',
42+
'?:\\Windows\\SysWOW64\\ws2_32.dll',
43+
'?:\\Windows\\System32\\spool\\drivers\\*',
44+
'?:\\Windows\\assembly\\NativeImages_*',
45+
'?:\\Windows\\System32\\DriverStore\\FileRepository\\*'
46+
)
47+
))
48+
action:
49+
- name: kill
50+
51+
severity: high
52+
53+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)