Skip to content

Commit 39cd2b0

Browse files
committed
feat(rules): Suspicious XSL script execution
Identifies a suspicious execution of XSL script via Windows Management Instrumentation command line tool or XSL transformation utility. Adversaries may bypass application control and obscure the execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files.
1 parent fd099e9 commit 39cd2b0

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: Suspicious XSL script execution
2+
id: 65136b30-14ae-46dd-b8e5-9dfa99690d74
3+
version: 1.0.0
4+
description: |
5+
Identifies a suspicious execution of XSL script via Windows Management Instrumentation command line tool or XSL
6+
transformation utility. Adversaries may bypass application control and obscure the execution of code by embedding
7+
scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing
8+
and rendering of data within XML files.
9+
labels:
10+
tactic.id: TA0005
11+
tactic.name: Defense Evasion
12+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
13+
technique.id: T1220
14+
technique.name: XSL Script Processing
15+
technique.ref: https://attack.mitre.org/techniques/T1220/
16+
references:
17+
- https://www.ired.team/offensive-security/code-execution/application-whitelisting-bypass-with-wmic-and-xsl
18+
19+
condition: >
20+
sequence
21+
maxspan 3m
22+
|spawn_process and (((ps.child.name ~= 'wmic.exe' or ps.child.pe.file.name ~= 'wmic.exe') and ps.child.cmdline imatches
23+
('* format*:*', '*/format*:*', '*-format*:*'))
24+
or
25+
ps.child.name ~= 'msxsl.exe' or ps.child.pe.file.name ~= 'msxsl.exe'
26+
)
27+
| by ps.child.uuid
28+
|load_dll and image.name iin ('vbscript.dll', 'jscript.dll')| by ps.uuid
29+
30+
output: >
31+
Suspicious XSL script executed by process %1.ps.child.name with command line arguments %1.ps.child.args
32+
severity: high
33+
34+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)