|
| 1 | +name: Suspicious virtual path redirection |
| 2 | +id: 71a7ba01-a7a9-428a-8704-72b200f9b43c |
| 3 | +version: 1.0.0 |
| 4 | +description: | |
| 5 | + Detects attempts to create files in user-writable or system-temporary locations |
| 6 | + where the thread call stack shows use of APIs commonly involved in virtual-path |
| 7 | + redirection / bind filter registration. |
| 8 | + Attackers sometimes abuse virtual-path redirection, filter drivers, or cloud-sync |
| 9 | + registration to place malicious payloads in locations that are later resolved or |
| 10 | + served via trusted paths to evade detection or gain persistence. |
| 11 | +labels: |
| 12 | + tactic.id: TA0005 |
| 13 | + tactic.name: Defense Evasion |
| 14 | + tactic.ref: https://attack.mitre.org/tactics/TA0005/ |
| 15 | + technique.id: T1562 |
| 16 | + technique.name: Impair Defenses |
| 17 | + technique.ref: https://attack.mitre.org/techniques/T1562/ |
| 18 | + subtechnique.id: T1562.001 |
| 19 | + subtechnique.name: Disable or Modify Tools |
| 20 | + subtechnique.ref: https://attack.mitre.org/techniques/T1562/001 |
| 21 | +references: |
| 22 | + - https://github.com/TwoSevenOneT/EDR-Redir |
| 23 | + - https://www.zerosalarium.com/2025/10/DR-Redir-Break-EDR-Via-BindLink-Cloud-Filter.html |
| 24 | + |
| 25 | +condition: > |
| 26 | + create_file and |
| 27 | + evt.pid != 4 and thread.callstack.symbols imatches ('ntdll.dll!*DeviceIoControlFile') and |
| 28 | + thread.callstack.symbols imatches ('bindfltapi.dll!BfSetupFilter', 'cldapi.dll!CfRegisterSyncRoot') and |
| 29 | + file.path imatches |
| 30 | + ( |
| 31 | + '?:\\Users\\*\\AppData\\Local\\Temp\\*', |
| 32 | + '?:\\Users\\*\\AppData\\Local\\VirtualStore\\*', |
| 33 | + '?:\\Users\\*\\AppData\\Roaming\\*', |
| 34 | + '?:\\Users\\Public\\*', |
| 35 | + '?:\\Users\\*\\Pictures\\*', |
| 36 | + '?:\\Users\\*\\Music\\*', |
| 37 | + '?:\\ProgramData\\*', |
| 38 | + '?:\\Windows\\Tasks\\*', |
| 39 | + '?:\\Windows\\System32\\Tasks\\*', |
| 40 | + '?:\\Windows\\Temp\\*', |
| 41 | + '?:\\Windows\\tracing\\*', |
| 42 | + '?:\\Temp\\*', |
| 43 | + '?:\\Tmp\\*', |
| 44 | + '?:\\PerfLogs\\*', |
| 45 | + '?:\\$Recycle.Bin\\*', |
| 46 | + '?:\\Intel\\*', |
| 47 | + '?:\\AMD\\Temp\\*' |
| 48 | + ) |
| 49 | +
|
| 50 | +output: > |
| 51 | + Suspicious virtual path redirection mapped to %file.path by process %ps.exe |
| 52 | +severity: high |
| 53 | + |
| 54 | +min-engine-version: 3.0.0 |
0 commit comments