Skip to content

Commit

Permalink
feat(rules): DLL loaded via a callback function rule
Browse files Browse the repository at this point in the history
Identifies module proxying as a method to conceal suspicious callstacks. Adversaries use module proxying the hide the origin of the LoadLibrary call from the callstack by loading the library from the callback function.
  • Loading branch information
rabbitstack committed Nov 20, 2024
1 parent c66f028 commit 227ace7
Showing 1 changed file with 42 additions and 0 deletions.
42 changes: 42 additions & 0 deletions rules/defense_evasion_dll_loaded_via_callback_function.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
name: DLL loaded via a callback function
id: c7f46d0a-10b2-421a-b33c-f4df79599f2e
version: 1.0.0
description: |
Identifies module proxying as a method to conceal suspicious callstacks. Adversaries use module proxying
the hide the origin of the LoadLibrary call from the callstack by loading the library from the callback
function.
labels:
tactic.id: TA0005
tactic.name: Defense Evasion
tactic.ref: https://attack.mitre.org/tactics/TA0005/
technique.id: T1055
technique.name: Process Injection
technique.ref: https://attack.mitre.org/techniques/T1055/
tags:
- https://github.com/hlldz/misc/tree/main/proxy_calls
- https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/

condition: >
sequence
maxspan 2m
|spawn_process| by ps.child.uuid
|load_dll and base(image.name) iin
(
'winhttp.dll', 'clr.dll', 'bcrypt.dll', 'bcryptprimitives.dll',
'wininet.dll', 'taskschd.dll', 'dnsapi.dll', 'coreclr.dll', 'ws2_32.dll',
'wmiutils.dll', 'vaultcli.dll', 'System.Management.Automation.dll', 'psapi.dll',
'mstscax.dll', 'dsquery.dll', 'mstask.dll', 'bitsproxy.dll'
)
and thread.callstack.summary
imatches
(
'ntdll.dll|kernelbase.dll|ntdll.dll|kernel32.dll|ntdll.dll',
'ntdll.dll|wow64.dll|wow64cpu.dll|wow64.dll|ntdll.dll|kernelbase.dll|ntdll.dll|kernel32.dll|ntdll.dll'
)
| by ps.uuid
output: >
%2.image.name loaded from callback function by process %ps.exe
severity: high

min-engine-version: 2.0.0

0 comments on commit 227ace7

Please sign in to comment.