HackTool - Powerup Write Hijack DLL
Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies on creation of the malicious bat file (debug.bat by default).
Sigma rule (View on GitHub)
1title: HackTool - Powerup Write Hijack DLL
2id: 602a1f13-c640-4d73-b053-be9a2fa58b96
3status: test
4description: |
5 Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation.
6 In it's default mode, it builds a self deleting .bat file which executes malicious command.
7 The detection rule relies on creation of the malicious bat file (debug.bat by default).
8references:
9 - https://powersploit.readthedocs.io/en/latest/Privesc/Write-HijackDll/
10author: Subhash Popuri (@pbssubhash)
11date: 2021-08-21
12modified: 2024-06-27
13tags:
14 - attack.persistence
15 - attack.privilege-escalation
16 - attack.defense-evasion
17 - attack.t1574.001
18logsource:
19 category: file_event
20 product: windows
21detection:
22 selection:
23 Image|endswith:
24 - '\powershell.exe'
25 - '\pwsh.exe'
26 TargetFilename|endswith: '.bat'
27 condition: selection
28falsepositives:
29 - Any powershell script that creates bat files # highly unlikely (untested)
30level: high
References
Related rules
- Creation Of Non-Existent System DLL
- DLL Sideloading Of ShellChromeAPI.DLL
- Microsoft Office DLL Sideload
- Potential 7za.DLL Sideloading
- Potential Antivirus Software DLL Sideloading