Skip to content

Commit 662724c

Browse files
committed
feat(rules): Add Suspicious child spawned via reflected process rule
Identifies the creation of a child via clone process by employing the RtlCreateProcessReflection or RtlCloneUserProcess API. This behaviour represents a potential Dirty Vanity process injection.
1 parent 9635329 commit 662724c

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
name: Suspicious child spawned via reflected process
2+
id: 0c71dd48-d238-41bb-9c7e-9ba804e888de
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of a child via the clone process by employing the
6+
RtlCreateProcessReflection or RtlCloneUserProcess API.
7+
This behaviour represents a potential Dirty Vanity process injection.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1055
13+
technique.name: Process Injection
14+
technique.ref: https://attack.mitre.org/techniques/T1055/
15+
references:
16+
- https://unprotect.it/technique/dirty-vanity/
17+
- https://github.com/deepinstinct/Dirty-Vanity
18+
- https://www.deepinstinct.com/blog/dirty-vanity-a-new-approach-to-code-injection-edr-bypass
19+
20+
condition: >
21+
sequence
22+
maxspan 5m
23+
|spawn_process and
24+
thread.callstack.symbols imatches ('ntdll.dll!RtlCreateProcessReflection', 'ntdll.dll!RtlCloneUserProcess') and
25+
not
26+
(
27+
(ps.exe imatches ('?:\\Windows\\System32\\WerFault.exe', '?:\\Windows\\SysWOW64\\WerFault.exe') and thread.callstack.summary imatches '*faultrep.dll|wersvc.dll*') or
28+
(ps.exe imatches ('?:\\Windows\\System32\\WerFault.exe', '?:\\Windows\\SysWOW64\\WerFault.exe') and thread.callstack.summary imatches '*faultrep.dll*') or
29+
(ps.exe imatches '?:\\Windows\\System32\\conhost.exe' and thread.callstack.symbols imatches ('ntdll.dll!*DeviceIoControlFile*'))
30+
)
31+
| by ps.uuid
32+
|spawn_process and
33+
ps.exe not imatches
34+
(
35+
'?:\\Windows\\System32\\WerFault.exe',
36+
'?:\\Windows\\SysWOW64\\WerFault.exe'
37+
)
38+
| by ps.parent.uuid
39+
action:
40+
- name: kill
41+
42+
output: >
43+
Suspicious child process %2.ps.exe spawned via clone process %ps.exe
44+
severity: high
45+
46+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)