Skip to content

Commit 3cdfd31

Browse files
committed
refactor(rules): Rename and improve Potential Process Hollowing rule
1 parent d2fd6d2 commit 3cdfd31

File tree

1 file changed

+13
-8
lines changed

1 file changed

+13
-8
lines changed

rules/defense_evasion_potential_process_hollowing_injection.yml renamed to rules/defense_evasion_process_execution_from_hollowed_memory_section.yml

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
name: Potential Process Hollowing
1+
name: Process execution from hollowed memory section
22
id: 2a3fbae8-5e8c-4b71-b9da-56c3958c0d53
3-
version: 1.1.7
3+
version: 2.0.0
44
description: |
55
Adversaries may inject malicious code into suspended and hollowed processes in order to
66
evade process-based defenses. Process hollowing is a method of executing arbitrary code
@@ -29,21 +29,26 @@ references:
2929
condition: >
3030
sequence
3131
maxspan 2m
32-
by ps.uuid
3332
|spawn_process and
3433
ps.parent.sid not in ('S-1-5-18', 'S-1-5-19', 'S-1-5-20') and
3534
ps.parent.exe not imatches
3635
(
3736
'?:\\Program Files\\*.exe',
38-
'?:\\Program Files (x86)\\*.exe',
39-
'?:\\Users\\*\\AppData\\Local\\Programs\\Common\\OneDriveCloud\\taskhostw.exe'
37+
'?:\\Program Files (x86)\\*.exe'
4038
)
41-
|
39+
| as e1
4240
|unmap_view_of_section and
43-
file.view.size > 20000 and file.view.protection != 'READONLY' and (length(file.name) = 0 or not ext(file.name) = '.dll')
41+
ps.uuid = $e1.ps.uuid and
42+
file.view.size > 20000 and file.view.protection != 'READONLY'
43+
| as e2
44+
|load_executable and
45+
ps.uuid = $e2.ps.uuid and image.base.address = $e2.file.view.base
4446
|
45-
|load_executable|
4647
action:
4748
- name: kill
4849

50+
output: >
51+
Process %3.ps.exe executed from hollowed memory section
52+
severity: high
53+
4954
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)