Skip to content

Commit b17a36c

Browse files
committed
feat(rules): Suspicious object symbolic link creation
Identifies the creation of the object symbolic link inside the object manager namespace by untrusted or unusual processes. Adversaries may exploit object symbolic links to trick system processes into executing malicious payloads.
1 parent 97e1faa commit b17a36c

File tree

2 files changed

+40
-0
lines changed

2 files changed

+40
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: Suspicious object symbolic link creation
2+
id: f9306355-1f5f-4a06-9779-195aa681db80
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of the object symbolic link inside the object manager namespace
6+
by untrusted or unusual processes.
7+
Adversaries may exploit object symbolic links to trick system processes into executing
8+
malicious payloads.
9+
labels:
10+
tactic.id: TA0005
11+
tactic.name: Defense Evasion
12+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
13+
technique.id: T1211
14+
technique.name: Exploitation for Defense Evasion
15+
technique.ref: https://attack.mitre.org/techniques/T1211/
16+
references:
17+
- https://www.cyberark.com/resources/threat-research-blog/follow-the-link-exploiting-symbolic-links-with-ease
18+
- https://www.elastic.co/kr/blog/detect-block-unknown-knowndlls-windows-acl-hardening-attacks-cache-poisoning-escalation
19+
20+
condition: >
21+
create_symbolic_link_object and kevt.pid != 4
22+
and
23+
(pe.is_signed = false or pe.is_trusted = false or not ps.exe imatches
24+
(
25+
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\MsMpEng.exe',
26+
'?:\\WINDOWS\\system32\\svchost.exe',
27+
'?:\\Program Files\\*',
28+
'?:\\Program Files (x86)\\*',
29+
'?:\\Windows\\System32\\vmwp.exe'
30+
)
31+
)
32+
33+
output: >
34+
Suspicious object symbolic link %kevt.arg[target] created by process %ps.exe
35+
severity: high
36+
37+
min-engine-version: 2.4.0

rules/macros/macros.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,9 @@
103103
- macro: reply_dns
104104
expr: kevt.name = 'ReplyDns'
105105

106+
- macro: create_symbolic_link_object
107+
expr: kevt.name = 'CreateSymbolicLinkObject' and kevt.arg[status] = 'Success'
108+
106109
- macro: inbound_network
107110
expr: >
108111
(recv_socket or accept_socket)

0 commit comments

Comments
 (0)