Skip to content

Commit 3d1006a

Browse files
rabbitstackrabbitstack
authored andcommitted
fix(rules): Exclusion for OneDrive to tune false positives in Potential process hollowing rule
1 parent 122e4b1 commit 3d1006a

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

rules/defense_evasion_potential_process_hollowing_injection.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Potential Process Hollowing
22
id: 2a3fbae8-5e8c-4b71-b9da-56c3958c0d53
3-
version: 1.1.2
3+
version: 1.1.3
44
description: |
55
Adversaries may inject malicious code into suspended and hollowed processes in order to
66
evade process-based defenses. Process hollowing is a method of executing arbitrary code
@@ -32,7 +32,8 @@ condition: >
3232
|spawn_process and ps.sid not in ('S-1-5-18', 'S-1-5-19', 'S-1-5-20') and not ps.exe imatches
3333
(
3434
'?:\\Program Files\\*.exe',
35-
'?:\\Program Files (x86)\\*.exe'
35+
'?:\\Program Files (x86)\\*.exe',
36+
'?:\\Users\\*\\AppData\\Local\\Programs\\Common\\OneDriveCloud\\taskhostw.exe'
3637
)
3738
| by ps.child.uuid
3839
|unmap_view_of_section and file.view.size > 20000 and file.view.protection != 'READONLY' and (length(file.name) = 0 or not ext(file.name) = '.dll')| by ps.uuid

0 commit comments

Comments
 (0)