Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential privilege escalation via phantom DLL hijacking
id: 5ccdb5c2-3a30-4e14-87d2-d7aeb4c45fad
version: 1.0.1
version: 1.0.2
description: |
Identifies the loading of the phantom DLL that was previously dropped
to the System directory. Adversaries may exploit this flow to escalate
Expand All @@ -27,7 +27,7 @@ references:
condition: >
sequence
maxspan 10m
|create_file and file.path imatches
|create_file and kevt.pid != 4 and file.path imatches
(
'?:\\Windows\\System32\\wow64log.dll',
'?:\\Windows\\wbemcomn.dll',
Expand All @@ -44,6 +44,18 @@ condition: >
'?:\\Windows\\System32\\Speech\\Engines\\TTS\\MSTTSLocEnUS.dll',
'?:\\Windows\\System32\\DXGIDebug.dll'
)
and
not
ps.exe imatches
(
'?:\\Windows\\System32\\RuntimeBroker.exe',
'?:\\Windows\\System32\\svchost.exe',
'?:\\Windows\\System32\\services.exe',
'?:\\Windows\\System32\\smss.exe',
'?:\\Windows\\System32\\csrss.exe',
'?:\\Windows\\System32\\wininit.exe',
'?:\\Windows\\System32\\winlogon.exe'
)
| by file.path
|load_dll| by image.path

Expand Down