Skip to content

Commit e37d1a6

Browse files
rabbitstackrabbitstack
authored andcommitted
fix(rules): Reduce Potential privilege escalation via phantom DLL hijacking false positives
1 parent f317da0 commit e37d1a6

File tree

1 file changed

+14
-2
lines changed

1 file changed

+14
-2
lines changed

rules/privilege_escalation_potential_privilege_escalation_via_phantom_dll_hijacking.yml

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Potential privilege escalation via phantom DLL hijacking
22
id: 5ccdb5c2-3a30-4e14-87d2-d7aeb4c45fad
3-
version: 1.0.1
3+
version: 1.0.2
44
description: |
55
Identifies the loading of the phantom DLL that was previously dropped
66
to the System directory. Adversaries may exploit this flow to escalate
@@ -27,7 +27,7 @@ references:
2727
condition: >
2828
sequence
2929
maxspan 10m
30-
|create_file and file.path imatches
30+
|create_file and kevt.pid != 4 and file.path imatches
3131
(
3232
'?:\\Windows\\System32\\wow64log.dll',
3333
'?:\\Windows\\wbemcomn.dll',
@@ -44,6 +44,18 @@ condition: >
4444
'?:\\Windows\\System32\\Speech\\Engines\\TTS\\MSTTSLocEnUS.dll',
4545
'?:\\Windows\\System32\\DXGIDebug.dll'
4646
)
47+
and
48+
not
49+
ps.exe imatches
50+
(
51+
'?:\\Windows\\System32\\RuntimeBroker.exe',
52+
'?:\\Windows\\System32\\svchost.exe',
53+
'?:\\Windows\\System32\\services.exe',
54+
'?:\\Windows\\System32\\smss.exe',
55+
'?:\\Windows\\System32\\csrss.exe',
56+
'?:\\Windows\\System32\\wininit.exe',
57+
'?:\\Windows\\System32\\winlogon.exe'
58+
)
4759
| by file.path
4860
|load_dll| by image.path
4961

0 commit comments

Comments
 (0)