Remote Thread Creation In Uncommon Target Image

Detects uncommon target processes for remote thread creation

Sigma rule (View on GitHub)

 1title: Remote Thread Creation In Uncommon Target Image
 2id: a1a144b7-5c9b-4853-a559-2172be8d4a03
 3related:
 4    - id: f016c716-754a-467f-a39e-63c06f773987
 5      type: obsoletes
 6status: experimental
 7description: Detects uncommon target processes for remote thread creation
 8references:
 9    - https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
10author: Florian Roth (Nextron Systems)
11date: 2022/03/16
12modified: 2023/10/19
13tags:
14    - attack.defense_evasion
15    - attack.privilege_escalation
16    - attack.t1055.003
17logsource:
18    product: windows
19    category: create_remote_thread
20detection:
21    selection:
22        TargetImage|endswith:
23            - '\calc.exe'
24            - '\calculator.exe'
25            - '\explorer.exe'
26            - '\mspaint.exe'
27            - '\notepad.exe'
28            - '\ping.exe'
29            - '\sethc.exe'
30            - '\spoolsv.exe'
31            - '\wordpad.exe'
32            - '\write.exe'
33    filter_main_csrss:
34        SourceImage|endswith: ':\Windows\System32\csrss.exe'
35    filter_optional_aurora_1:
36        StartFunction: 'EtwpNotificationThread'
37    filter_optional_aurora_2:
38        SourceImage|contains: 'unknown process'
39    filter_optional_vmtoolsd:
40        SourceImage|endswith: ':\Program Files\VMware\VMware Tools\vmtoolsd.exe'
41        StartFunction: 'GetCommandLineW'
42        TargetImage|endswith:
43            - ':\Windows\explorer.exe'
44            - ':\Windows\System32\notepad.exe'
45            - ':\Windows\System32\spoolsv.exe'
46    filter_main_rundll32:
47        SourceImage|endswith: ':\Windows\System32\rundll32.exe'
48        TargetImage|endswith: ':\Windows\explorer.exe'
49        StartFunction:
50            - 'LoadLibraryW'
51            - 'FreeLibrary'
52    filter_optional_winzip:
53        SourceImage|endswith: ':\Program Files\WinZip\FAHWindow64.exe'
54        TargetImage|endswith: ':\Windows\explorer.exe'
55    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
56falsepositives:
57    - Unknown
58level: high

References

Related rules

to-top