Skip to content

Commit 2532132

Browse files
committed
feat(rules): Add Potential privilege escalation via DeadPotato exploit rule
Detects potential privilege escalation activity consistent with the DeadPotato exploit. Attackers can abuse the DCOM RPCSS service flaw to start an elevated process allowing unrestricted access over the machine for critical operations to be freely performed.
1 parent b86b9ca commit 2532132

1 file changed

Lines changed: 33 additions & 0 deletions

File tree

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: Potential privilege escalation via DeadPotato exploit
2+
id: 3911130a-b71c-4994-a7c3-5ae07dc0abe0
3+
version: 1.0.0
4+
description: |
5+
Detects potential privilege escalation activity consistent with the DeadPotato
6+
exploit. Attackers can abuse the DCOM RPCSS service flaw to start an elevated
7+
process allowing unrestricted access over the machine for critical operations to
8+
be freely performed.
9+
labels:
10+
tactic.id: TA0004
11+
tactic.name: Privilege Escalation
12+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
13+
technique.id: T1068
14+
technique.name: Exploitation for Privilege Escalation
15+
technique.ref: https://attack.mitre.org/techniques/T1068/
16+
references:
17+
- https://github.com/lypd0/DeadPotato
18+
19+
condition: >
20+
sequence
21+
maxspan 1m
22+
|connect_socket and
23+
ps.name = 'svchost.exe' and ps.args intersects ('-k', 'RPCSS') and
24+
net.dport = 135 and (net.dip = 127.0.0.1 or net.dip = '::1')
25+
|
26+
|spawn_process and
27+
ps.token.integrity_level = 'SYSTEM' and
28+
ps.exe not imatches '?:\\WINDOWS\\system32\\conhost.exe'
29+
|
30+
31+
severity: high
32+
33+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)