From ca50124350539cd0b26726d9daf56ea19455de7a Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Tue, 4 Feb 2025 19:40:45 +0100 Subject: [PATCH 1/6] Add proc_creation_win_parent_run_itself --- .../proc_creation_win_parent_run_itself.yml | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 rules/windows/process_creation/proc_creation_win_parent_run_itself.yml diff --git a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml new file mode 100644 index 00000000000..45a2419c9dd --- /dev/null +++ b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml @@ -0,0 +1,20 @@ +title: Executable Run Itself +id: bafd07c6-3ea5-454a-b4be-058fbb073de7 +status: experimental +description: Detects an executable that executes himself +references: + - https://www.joesandbox.com/analysis/1605063/0/html +author: frack113 +date: 2025-02-04 +tags: + - attack.defense-evasion +logsource: + category: process_creation + product: windows +detection: + selection: + Image|fieldref: ParentImage + condition: selection +falsepositives: + - Unknown +level: medium From 0198075a7d93e9ece19eddf35698ac560528967e Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Tue, 4 Feb 2025 22:18:17 +0100 Subject: [PATCH 2/6] Update proc_creation_win_parent_run_itself.yml --- .../proc_creation_win_parent_run_itself.yml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml index 45a2419c9dd..0d2ec5dfce3 100644 --- a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml +++ b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml @@ -1,13 +1,16 @@ -title: Executable Run Itself +title: Potential Executable Run Itself As Scrificial Process id: bafd07c6-3ea5-454a-b4be-058fbb073de7 status: experimental -description: Detects an executable that executes himself +description: | + Detects an executable that executes himself. + The most common technique is to launch it in suspend mode so that you can inject into it. references: - https://www.joesandbox.com/analysis/1605063/0/html author: frack113 date: 2025-02-04 tags: - attack.defense-evasion + - attack.t1055 logsource: category: process_creation product: windows From 725aa5f6c2c68b84e2f177336f2b0377f2812853 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Tue, 4 Feb 2025 22:22:15 +0100 Subject: [PATCH 3/6] Remove useless space --- .../process_creation/proc_creation_win_parent_run_itself.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml index 0d2ec5dfce3..65c963f41bf 100644 --- a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml +++ b/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml @@ -1,7 +1,7 @@ title: Potential Executable Run Itself As Scrificial Process id: bafd07c6-3ea5-454a-b4be-058fbb073de7 status: experimental -description: | +description: | Detects an executable that executes himself. The most common technique is to launch it in suspend mode so that you can inject into it. references: From c3d7f5764cf15138ca082e4d35cb1533e1e146f7 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Fri, 7 Feb 2025 16:22:56 +0100 Subject: [PATCH 4/6] Move to rules-threat-hunting --- .../process_creation/proc_creation_win_parent_run_itself.yml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename {rules => rules-threat-hunting}/windows/process_creation/proc_creation_win_parent_run_itself.yml (100%) diff --git a/rules/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml similarity index 100% rename from rules/windows/process_creation/proc_creation_win_parent_run_itself.yml rename to rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml From 0db9d088f9019175d17aadf40ee8ac84a65e1c61 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Fri, 7 Feb 2025 19:13:17 +0100 Subject: [PATCH 5/6] Fix goodlog tests --- .../proc_creation_win_parent_run_itself.yml | 37 ++++++++++++++++++- 1 file changed, 36 insertions(+), 1 deletion(-) diff --git a/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml index 65c963f41bf..b52f4c517d9 100644 --- a/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml +++ b/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml @@ -11,13 +11,48 @@ date: 2025-02-04 tags: - attack.defense-evasion - attack.t1055 + - detection.threat-hunting logsource: category: process_creation product: windows detection: selection: Image|fieldref: ParentImage - condition: selection + filter_path: + Image|startswith: + - 'C:\Program Files\' + - 'C:\Program Files (x86)\' + filter_original: + OriginalFileName: + - 'Cmd.Exe' + - 'CompatTelRunner.exe' + - 'Discord.exe' + - 'electron.exe' # Vs Code + - 'EXPLORER.EXE' + - 'httpd.exe' + - 'IE4UINIT.EXE' + - 'mmc.exe' + - 'MpCmdRun.exe' + - 'mscorsvw.exe' + - 'msiexec.exe' + - 'NGenTask.exe' + - 'OneDriveSetup.exe' + - 'PowerShell.EXE' + - 'REGSVR32.EXE' + - 'smss.exe' + - 'Spotify.exe' + - 'WerMgr' + filter_product: + Product: + - 'Avira' + - 'Evernote' + - 'Firefox' + - 'Microsoft Office' + - 'Ninite' + - 'Opera Browser Assistant Installer' + - 'Opera Installer' + - 'Sysinternals Sysmon' + condition: selection and not 1 of filter_* falsepositives: - Unknown level: medium From eed361a5a21226199fb36a70694c22f3c571acd0 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Fri, 7 Feb 2025 19:15:38 +0100 Subject: [PATCH 6/6] Fix yaml --- .../process_creation/proc_creation_win_parent_run_itself.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml b/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml index b52f4c517d9..1fc70217373 100644 --- a/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml +++ b/rules-threat-hunting/windows/process_creation/proc_creation_win_parent_run_itself.yml @@ -23,7 +23,7 @@ detection: - 'C:\Program Files\' - 'C:\Program Files (x86)\' filter_original: - OriginalFileName: + OriginalFileName: - 'Cmd.Exe' - 'CompatTelRunner.exe' - 'Discord.exe' @@ -43,7 +43,7 @@ detection: - 'Spotify.exe' - 'WerMgr' filter_product: - Product: + Product: - 'Avira' - 'Evernote' - 'Firefox'