Potential Adplus.EXE Abuse
Detects execution of "AdPlus.exe", a binary that is part of the Windows SDK that can be used as a LOLBIN in order to dump process memory and execute arbitrary commands.
Sigma rule (View on GitHub)
1title: Potential Adplus.EXE Abuse
2id: 2f869d59-7f6a-4931-992c-cce556ff2d53
3status: test
4description: Detects execution of "AdPlus.exe", a binary that is part of the Windows SDK that can be used as a LOLBIN in order to dump process memory and execute arbitrary commands.
5references:
6 - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Adplus/
7 - https://twitter.com/nas_bench/status/1534916659676422152
8 - https://twitter.com/nas_bench/status/1534915321856917506
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-06-09
11modified: 2023-06-23
12tags:
13 - attack.defense-evasion
14 - attack.execution
15 - attack.credential-access
16 - attack.t1003.001
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection_img:
22 - Image|endswith: '\adplus.exe'
23 - OriginalFileName: 'Adplus.exe'
24 selection_cli:
25 CommandLine|contains:
26 # Dump process memory
27 - ' -hang '
28 - ' -pn '
29 - ' -pmn '
30 - ' -p '
31 - ' -po '
32 # Using a config file
33 - ' -c '
34 # Execute commands inline
35 - ' -sc '
36 condition: all of selection_*
37falsepositives:
38 - Legitimate usage of Adplus for debugging purposes
39level: high
References
Related rules
- Process Memory Dump Via Comsvcs.DLL
- HackTool - WinPwn Execution
- HackTool - WinPwn Execution - ScriptBlock
- Audit CVE Event
- Credential Dumping Tools Service Execution - Security