Skip to content

Commit 3d2d769

Browse files
committed
feat(rules): Add Embedded executable file run via shortcut rule
Identifies execution of an embedded executable extracted from a shortcut (.lnk) file via script or command interpreters, a technique commonly used to deliver and launch payloads through malicious links.
1 parent 13e4b21 commit 3d2d769

1 file changed

Lines changed: 38 additions & 0 deletions

File tree

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
name: Embedded executable file run via shortcut
2+
id: a0e3db54-41e5-4ece-bcd4-4b45eae868cb
3+
version: 1.0.0
4+
description: |
5+
Identifies execution of an embedded executable extracted from a shortcut
6+
(.lnk) file via script or command interpreters, a technique commonly used
7+
to deliver and launch payloads through malicious links.
8+
labels:
9+
tactic.id: TA0002
10+
tactic.name: Execution
11+
tactic.ref: https://attack.mitre.org/tactics/TA0002/
12+
technique.id: T1204
13+
technique.name: User Execution
14+
technique.ref: https://attack.mitre.org/techniques/T1204/
15+
subtechnique.id: T1204.002
16+
subtechnique.name: Malicious File
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1204/002/
18+
references:
19+
- https://github.com/d4rkiZ/EmbedExeLnk-
20+
21+
condition: >
22+
sequence
23+
maxspan 5m
24+
by ps.uuid
25+
|open_file and
26+
ps.name iin ('powershell.exe', 'pwsh.exe', 'cmd.exe') and
27+
file.path imatches '?:\\*.lnk'
28+
|
29+
|create_file and
30+
(file.extension iin ('.exe', '.bat', '.com',
31+
'.scr', '.pif', '.dll') or file.is_exec or file.is_dll)|
32+
|spawn_process and ps.name iin ('powershell.exe', 'pwsh.exe', 'cmd.exe', 'rundll32.exe', 'msbuild.exe', 'certutil.exe', 'certreq.exe', 'msiexec.exe')|
33+
action:
34+
- name: kill
35+
36+
severity: high
37+
38+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)