Skip to content

Commit 95da530

Browse files
committed
feat(rules): Add Potential shellcode injection via Windows Debugging API rule
Identifies shellcode injection using the Windows Debugging API and shared memory section. Attackers avoid writing and reading remote memory directly, instead employ context manipulation to force the target process to load and execute the payload itself via shared file mapping.
1 parent ff55dbc commit 95da530

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
name: Potential shellcode injection via Windows Debugging API
2+
id: 0100c5ce-3cdf-4701-8253-6c33bb48eabf
3+
version: 1.0.0
4+
description: |
5+
Identifies shellcode injection using the Windows Debugging API and shared memory section.
6+
Attackers avoid writing and reading remote memory directly, instead employ context manipulation
7+
to force the target process to load and execute the payload itself via shared file mapping.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1055
13+
technique.name: Process Injection
14+
technique.ref: https://attack.mitre.org/techniques/T1055/
15+
references:
16+
- https://github.com/dis0rder0x00/DbgNexum
17+
18+
condition: >
19+
sequence
20+
maxspan 1m
21+
|create_remote_thread and
22+
thread.callstack.symbols imatches ('ntdll.dll!DbgUiDebugActiveProcess', 'ntdll.dll!DbgUiIssueRemoteBreakin', 'KernelBase.dll!DebugActiveProcess') and
23+
ps.exe not imatches
24+
(
25+
'?:\\Program Files\\*.exe',
26+
'?:\\Program Files(x86)\\*.exe',
27+
'?:\\Windows\\System32\\wermgr.exe',
28+
'?:\\Windows\\System32\\WerFault.exe'
29+
)
30+
| by thread.pid
31+
|map_view_of_section and
32+
file.view.protection = 'READONLY|EXECUTE' and file.view.size >= 4096
33+
| by ps.pid
34+
action:
35+
- name: kill
36+
37+
severity: high
38+
39+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)