Skip to content

Commit e014ea1

Browse files
committed
feat(rules): New Potential process creation via shellcode rule
Identifies the creation of a process with stack frames originating from floating memory area while invoking commonly used Windows API functions like WinExec. This behavior is a typical indicator of code injection employing offensive shellcode maneuvering.
1 parent 0a08b8c commit e014ea1

1 file changed

Lines changed: 27 additions & 0 deletions

File tree

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
name: Potential process creation via shellcode
2+
id: 7a918532-12d1-4aa2-8c46-8769c67cac07
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of a process with stack frames originating from floating memory area while
6+
invoking commonly used Windows API functions like WinExec. This behavior is a typical indicator of
7+
code injection employing offensive shellcode maneuvering.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1055
13+
technique.name: Process Injection
14+
technique.ref: https://attack.mitre.org/techniques/T1055/
15+
references:
16+
- https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-winexec
17+
18+
condition: >
19+
spawn_process and thread.callstack.is_unbacked = true and thread.callstack.summary imatches '*kernel32.dll|unbacked*'
20+
and
21+
thread.callstack.symbols imatches ('kernel32.dll!WinExec*')
22+
23+
output: >
24+
Process %ps.child.exe created via potential shellcode injection by process %ps.exe
25+
severity: high
26+
27+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)