Skip to content

Commit d80bafc

Browse files
committed
feat(rules): Add Fake system root directory creation rule
Detects attempts to create a fake or malformed Windows system root directory by a unprivileged process, which may indicate exploitation of path confusion vulnerabilities for privilege escalation.
1 parent fceb431 commit d80bafc

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
name: Fake system root directory creation
2+
id: c70c41e2-fd43-466d-9cb6-20b259380960
3+
version: 1.0.0
4+
description: |
5+
Detects attempts to create a fake or malformed Windows system root
6+
directory by a unprivileged process, which may indicate exploitation
7+
of path confusion vulnerabilities for privilege escalation.
8+
labels:
9+
tactic.id: TA0004
10+
tactic.name: Privilege Escalation
11+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
12+
technique.id: T1068
13+
technique.name: Exploitation for Privilege Escalation
14+
technique.ref: https://attack.mitre.org/techniques/T1068/
15+
references:
16+
- https://github.com/hfiref0x/UACME
17+
18+
condition: >
19+
create_file and
20+
ps.sid != 'S-1-5-18' and file.path imatches
21+
(
22+
'?:\\Windows ',
23+
'?:\\ Windows*'
24+
)
25+
action:
26+
- name: kill
27+
28+
severity: high
29+
30+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)