Skip to content

Commit 4473838

Browse files
committed
chore(rules): Improve Unsigned DLL injection via remote thread rule
To make the rule more resistant to false positives, add the condition to evaluate the symbol pertaining to the thread start address.
1 parent 3355c0e commit 4473838

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

rules/defense_evasion_unsigned_dll_injection_via_remote_thread.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Unsigned DLL injection via remote thread
22
id: 21bdd944-3bda-464b-9a72-58fd37ba9163
3-
version: 1.0.2
3+
version: 1.1.0
44
description: |
55
Identifies unsigned DLL injection via remote thread creation.
66
Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses
@@ -22,15 +22,15 @@ references:
2222
condition: >
2323
sequence
2424
maxspan 1m
25-
|create_remote_thread and not (ps.exe imatches
25+
|create_remote_thread and thread.start_address.symbol imatches ('LoadLibrary*', 'LdrLoadDLL*') and not (ps.exe imatches
2626
(
2727
'?:\\Program Files\\*.exe',
2828
'?:\\Program Files (x86)\\*.exe'
2929
)
3030
or
31-
(ps.exe imatches 'C:\\Windows\\System32\\svchost.exe' and ps.args intersects ('-k', 'DcomLaunch'))
31+
(ps.exe imatches '?:\\Windows\\System32\\svchost.exe' and ps.args intersects ('-k', 'DcomLaunch'))
3232
or
33-
(ps.cmdline imatches '?:\\Windows\\Microsoft.NET\\Framework\\*\\ngen.exe ExecuteQueuedItems /LegacyServiceBehavior')
33+
(ps.cmdline imatches '"?:\\Windows\\Microsoft.NET\\Framework\\*\\ngen.exe" ExecuteQueuedItems /LegacyServiceBehavior')
3434
)
3535
| by thread.pid
3636
|(load_unsigned_or_untrusted_dll)

0 commit comments

Comments
 (0)