Skip to content

Commit 6659103

Browse files
committed
feat(rules): Suspicious access to the hosts file
Identifies suspicious process accessing the Windows hosts file for potential tampering. Adversaries can hijack the hosts files to block traffic to download/update servers or redirect the traffic to arbitrary servers under their control.
1 parent 34c72bb commit 6659103

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: Suspicious access to the hosts file
2+
id: f7b2c9d3-99e7-41d5-bb4a-6ea1a5f7f9e2
3+
version: 1.0.0
4+
description: >
5+
Identifies suspicious process accessing the Windows hosts file for potential tampering.
6+
Adversaries can hijack the hosts files to block traffic to download/update servers or redirect the
7+
traffic to arbitrary servers under their control.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1562.001
13+
technique.name: Impair Defenses - Disable or Modify Tools
14+
technique.ref: https://attack.mitre.org/techniques/T1562/001/
15+
references:
16+
- https://www.malwarebytes.com/blog/news/2016/09/hosts-file-hijacks
17+
18+
condition: >
19+
sequence
20+
maxspan 5m
21+
|spawn_process and not ps.child.exe imatches
22+
(
23+
'?:\\Windows\\servicing\\TrustedInstaller.exe',
24+
'?:\\Windows\\System32\\svchost.exe',
25+
'?:\\Windows\\System32\\MicrosoftEdgeUpdate.exe',
26+
'?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe'
27+
)
28+
| by ps.child.uuid
29+
|open_file and file.path imatches '?:\\Windows\\System32\\drivers\\etc\\hosts'| by ps.uuid
30+
action:
31+
- name: kill
32+
33+
output: >
34+
Suspicious process %1.ps.child.exe accessed the hosts file for potential tampering
35+
severity: medium
36+
37+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)