Skip to content

Commit 00fd9ed

Browse files
committed
feat(rules): Add Potential NTDLL unhooking via file mapping rule
Identifies processes that map a fresh image view of NTDLL.dll from disk, a behavior commonly associated with user-mode API unhooking. Malware often remaps the original NTDLL image to restore pristine code sections and bypass user-mode security hooks placed by EDRs or AMSI.
1 parent 9647c2e commit 00fd9ed

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
name: Potential NTDLL unhooking via file mapping
2+
id: b000955d-90df-44eb-8e32-8269d395f0ef
3+
version: 1.0.0
4+
description: |
5+
Identifies processes that map a fresh image view of NTDLL.dll
6+
from disk, a behavior commonly associated with user-mode API
7+
unhooking. Malware often remaps the original NTDLL image to
8+
restore pristine code sections and bypass user-mode security
9+
hooks placed by EDRs or AMSI.
10+
labels:
11+
tactic.id: TA0005
12+
tactic.name: Defense Evasion
13+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
14+
technique.id: T1055
15+
technique.name: Process Injection
16+
technique.ref: https://attack.mitre.org/techniques/T1055/
17+
references:
18+
- https://github.com/hwbp/NTDLL-Unhook
19+
20+
condition: >
21+
map_view_file and
22+
file.view.type = 'IMAGE' and evt.pid not in (0, 4) and
23+
file.path imatches
24+
(
25+
'?:\\Windows\\System32\\ntdll.dll',
26+
'?:\\Windows\\SysWOW64\\ntdll.dll'
27+
) and
28+
ps.exe not imatches
29+
(
30+
'?:\\Windows\\System32\\WerFault.exe',
31+
'?:\\Windows\\SysWOW64\\WerFault.exe',
32+
'?:\\Windows\\System32\\wermgr.exe',
33+
'?:\\Windows\\SysWOW64\\wermgr.exe'
34+
)
35+
36+
severity: high
37+
38+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)