Skip to content

Commit 30ac2bf

Browse files
committed
feat(rules): Add Suspicious virtual path redirection rule
Detects attempts to create files in user-writable or system-temporary locations where the thread call stack shows use of APIs commonly involved in virtual-path redirection / bind filter registration. Attackers sometimes abuse virtual-path redirection, filter drivers, or cloud-sync registration to place malicious payloads in locations that are later resolved or served via trusted paths to evade detection or gain persistence.
1 parent 1da9ed2 commit 30ac2bf

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: Suspicious virtual path redirection
2+
id: 71a7ba01-a7a9-428a-8704-72b200f9b43c
3+
version: 1.0.0
4+
description: |
5+
Detects attempts to create files in user-writable or system-temporary locations
6+
where the thread call stack shows use of APIs commonly involved in virtual-path
7+
redirection / bind filter registration.
8+
Attackers sometimes abuse virtual-path redirection, filter drivers, or cloud-sync
9+
registration to place malicious payloads in locations that are later resolved or
10+
served via trusted paths to evade detection or gain persistence.
11+
labels:
12+
tactic.id: TA0005
13+
tactic.name: Defense Evasion
14+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
15+
technique.id: T1562
16+
technique.name: Impair Defenses
17+
technique.ref: https://attack.mitre.org/techniques/T1562/
18+
subtechnique.id: T1562.001
19+
subtechnique.name: Disable or Modify Tools
20+
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
21+
references:
22+
- https://github.com/TwoSevenOneT/EDR-Redir
23+
- https://www.zerosalarium.com/2025/10/DR-Redir-Break-EDR-Via-BindLink-Cloud-Filter.html
24+
25+
condition: >
26+
create_file and
27+
evt.pid != 4 and thread.callstack.symbols imatches ('ntdll.dll!*DeviceIoControlFile') and
28+
thread.callstack.symbols imatches ('bindfltapi.dll!BfSetupFilter', 'cldapi.dll!CfRegisterSyncRoot') and
29+
file.path imatches
30+
(
31+
'?:\\Users\\*\\AppData\\Local\\Temp\\*',
32+
'?:\\Users\\*\\AppData\\Local\\VirtualStore\\*',
33+
'?:\\Users\\*\\AppData\\Roaming\\*',
34+
'?:\\Users\\Public\\*',
35+
'?:\\Users\\*\\Pictures\\*',
36+
'?:\\Users\\*\\Music\\*',
37+
'?:\\ProgramData\\*',
38+
'?:\\Windows\\Tasks\\*',
39+
'?:\\Windows\\System32\\Tasks\\*',
40+
'?:\\Windows\\Temp\\*',
41+
'?:\\Windows\\tracing\\*',
42+
'?:\\Temp\\*',
43+
'?:\\Tmp\\*',
44+
'?:\\PerfLogs\\*',
45+
'?:\\$Recycle.Bin\\*',
46+
'?:\\Intel\\*',
47+
'?:\\AMD\\Temp\\*'
48+
)
49+
50+
output: >
51+
Suspicious virtual path redirection mapped to %file.path by process %ps.exe
52+
severity: high
53+
54+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)