Skip to content

Commit 8365869

Browse files
committed
feat(rules): Add Suspicious process execution from archive via shortcut file rule
Detects suspicious process execution triggered by a shortcut (.lnk) file extracted from an archive. Adversaries can employ in user-execution attacks where malicious payloads are hidden inside archives and launched via decoy shortcut files to evade detection.
1 parent 4806fda commit 8365869

1 file changed

Lines changed: 52 additions & 0 deletions

File tree

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
name: Suspicious process execution from archive via shortcut file
2+
id: 74062a54-b886-4b90-bf33-24f2c1732f2c
3+
version: 1.0.0
4+
description: |
5+
Detects suspicious process execution triggered by a shortcut (.lnk) file
6+
extracted from an archive. Adversaries can employ in user-execution attacks
7+
where malicious payloads are hidden inside archives and launched via decoy
8+
shortcut files to evade detection.
9+
labels:
10+
tactic.id: TA0002
11+
tactic.name: Execution
12+
tactic.ref: https://attack.mitre.org/tactics/TA0002/
13+
technique.id: T1204
14+
technique.name: User Execution
15+
technique.ref: https://attack.mitre.org/techniques/T1204/
16+
subtechnique.id: T1204.002
17+
subtechnique.name: Malicious File
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1204/002/
19+
references:
20+
- https://www.crowdstrike.com/en-us/blog/self-extracting-archives-decoy-files-and-their-hidden-payloads/
21+
22+
condition: >
23+
sequence
24+
maxspan 1m30s
25+
by ps.uuid
26+
|create_file and
27+
((ps.name ~= 'explorer.exe' and thread.callstack.summary imatches '*|zipfldr.dll|*') or
28+
ps.name iin ('WinRAR.exe', '7z.exe', '7zFM.exe')) and
29+
file.path imatches '?:\\Users\\*\\AppData\\Local\\Temp\\*\\*.lnk'
30+
|
31+
|spawn_process and
32+
ps.name iin
33+
(
34+
'cmd.exe',
35+
'powershell.exe',
36+
'pwsh.exe',
37+
'mshta.exe',
38+
'wscript.exe',
39+
'rundll32.exe',
40+
'regsvr32.exe',
41+
'wmic.exe'
42+
) and
43+
thread.callstack.summary imatches 'ntdll.dll|KernelBase.dll|kernel32.dll|windows.storage.dll|shell32.dll|windows.storage.dll|shell32.dll|*'
44+
|
45+
action:
46+
- name: kill
47+
48+
output: >
49+
Execution of suspicious process %2.ps.exe from shortcut file %1.file.path
50+
severity: high
51+
52+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)