Skip to content

Commit 6c09deb

Browse files
committed
feat(rules): Add Suspicious activity from a reflected process rule
Detects the execution of a process clone via RtlCreateProcessReflection followed by network activity or loading of common networking DLLs. This behaviour may indicate that an attacker is abusing process reflection for shellcode injection.
1 parent 30ac2bf commit 6c09deb

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
name: Suspicious activity from a reflected process
2+
id: 2c5d3663-3e76-4cba-bd72-178757112f2c
3+
version: 1.0.0
4+
description: |
5+
Detects the execution of a process clone via RtlCreateProcessReflection
6+
followed by network activity or loading of common networking DLLs.
7+
This behaviour may indicate that an attacker is abusing process reflection
8+
for shellcode injection.
9+
labels:
10+
tactic.id: TA0005
11+
tactic.name: Defense Evasion
12+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
13+
technique.id: T1055
14+
technique.name: Process Injection
15+
technique.ref: https://attack.mitre.org/techniques/T1055/
16+
references:
17+
- https://unprotect.it/technique/dirty-vanity/
18+
- https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Dirty_Vanity
19+
- https://www.deepinstinct.com/blog/dirty-vanity-a-new-approach-to-code-injection-edr-bypass
20+
21+
condition: >
22+
sequence
23+
maxspan 2m
24+
by ps.uuid
25+
|spawn_process and
26+
thread.callstack.symbols imatches ('ntdll.dll!RtlCreateProcessReflection*', 'ntdll.dll!RtlCloneUserProcess*')
27+
|
28+
|(connect_socket and
29+
net.dip != 0.0.0.0 and net.dip not in ('0:0:0:0:0:0:0:1', '::1') and
30+
not cidr_contains(net.dip, '127.0.0.0/8', '10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16')) or
31+
(load_dll and dll.name iin
32+
(
33+
'dnsapi.dll',
34+
'ws2_32.dll',
35+
'winhttp.dll',
36+
'bitsproxy.dll',
37+
'wininet.dll',
38+
'mswsock.dll',
39+
'iphlpapi.dll',
40+
'httpapi.dll'
41+
))
42+
|
43+
action:
44+
- name: kill
45+
46+
severity: high
47+
48+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)