Skip to content

Commit 4806fda

Browse files
committed
feat(rules): Add Process execution from compressed file via Explorer rule
Detects child processes commonly used for code execution that are spawned from compressed files when initiated from Windows Explorer. Adversaries can leverage archives to deliver malicious executables and scripts for execution.
1 parent 742a5f8 commit 4806fda

1 file changed

Lines changed: 73 additions & 0 deletions

File tree

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
name: Process execution from compressed file via Explorer
2+
id: e4f373a0-1fe3-42a5-bca6-b465e930713f
3+
version: 1.0.0
4+
description: |
5+
Detects child processes commonly used for code execution that are spawned
6+
from compressed files when initiated from Windows Explorer. Adversaries can
7+
leverage archives to deliver malicious executables and scripts for execution.
8+
labels:
9+
tactic.id: TA0002
10+
tactic.name: Execution
11+
tactic.ref: https://attack.mitre.org/tactics/TA0002/
12+
technique.id: T1204
13+
technique.name: User Execution
14+
technique.ref: https://attack.mitre.org/techniques/T1204/
15+
subtechnique.id: T1204.002
16+
subtechnique.name: Malicious File
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1204/002/
18+
19+
condition: >
20+
spawn_process and (ps.parent.name ~= 'explorer.exe' or ps.ancestor iin ('explorer.exe')) and
21+
thread.callstack.summary imatches
22+
(
23+
'*zipfldr.dll*',
24+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|7z*.exe|*',
25+
'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|WinRar.exe|*'
26+
) and
27+
(ps.name iin
28+
(
29+
'rundll32.exe',
30+
'regsvr32.exe',
31+
'wscript.exe',
32+
'cscript.exe',
33+
'certutil.exe',
34+
'cmstp.exe',
35+
'mshta.exe',
36+
'msxsl.exe',
37+
'RegAsm.exe',
38+
'installutil.exe',
39+
'powershell.exe',
40+
'cmd.exe',
41+
'msbuild.exe',
42+
'AppLaunch.exe',
43+
'AddInUtil.exe',
44+
'AddInProcess.exe'
45+
) or
46+
ps.pe.file.name iin
47+
(
48+
'rundll32.exe',
49+
'regsvr32.exe',
50+
'wscript.exe',
51+
'cscript.exe',
52+
'certutil.exe',
53+
'cmstp.exe',
54+
'mshta.exe',
55+
'msxsl.exe',
56+
'RegAsm.exe',
57+
'installutil.exe',
58+
'powershell.exe',
59+
'cmd.exe',
60+
'msbuild.exe',
61+
'AppLaunch.exe',
62+
'AddInUtil.exe',
63+
'AddInProcess.exe'
64+
)
65+
)
66+
action:
67+
- name: kill
68+
69+
output: >
70+
Suspicious process %ps.exe executed from compressed file via Windows Explorer
71+
severity: high
72+
73+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)