detection-rules
detection-rules copied to clipboard
[Rule Tuning] Potential DLL Side-Loading via Trusted Microsoft Programs
Link to Rule
https://github.com/elastic/detection-rules/blob/main/rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml
Rule Tuning Type
None
Description
It seems that there is a typo in the query:
The query includes the process executable "?:\\Windows\\SyWOW64\\explorer.exe" which should most likely be "?:\\Windows\\SysWOW64\\explorer.exe", i.e. there is an "s" missing in "SysWOW64".
The updated query would be the following:
query = '''
process where host.os.type == "windows" and event.type == "start" and
process.pe.original_file_name in ("WinWord.exe", "EXPLORER.EXE", "w3wp.exe", "DISM.EXE") and
not process.executable : ("?:\\Windows\\explorer.exe",
"?:\\Windows\\SysWOW64\\explorer.exe",
"?:\\Program Files\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
"?:\\Program Files?(x86)\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
"?:\\Windows\\System32\\Dism.exe",
"?:\\Windows\\SysWOW64\\Dism.exe",
"?:\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\amd64\\DISM\\dism.exe",
"?:\\Windows\\System32\\inetsrv\\w3wp.exe",
"?:\\Windows\\SysWOW64\\inetsrv\\w3wp.exe")
'''
Example Data
No response
Nice catch @beninsh, do you want to submit a PR or should I do it?
Thank you :) Feel free to create a PR @w0rk3r