HackTool - Jlaive In-Memory Assembly Execution

Detects the use of Jlaive to execute assemblies in a copied PowerShell

Sigma rule (View on GitHub)

 1title: HackTool - Jlaive In-Memory Assembly Execution
 2id: 0a99eb3e-1617-41bd-b095-13dc767f3def
 3status: test
 4description: Detects the use of Jlaive to execute assemblies in a copied PowerShell
 5references:
 6    - https://jstnk9.github.io/jstnk9/research/Jlaive-Antivirus-Evasion-Tool
 7    - https://web.archive.org/web/20220514073704/https://github.com/ch2sh/Jlaive
 8author: Jose Luis Sanchez Martinez (@Joseliyo_Jstnk)
 9date: 2022/05/24
10modified: 2023/02/22
11tags:
12    - attack.execution
13    - attack.t1059.003
14logsource:
15    product: windows
16    category: process_creation
17detection:
18    parent_selection:
19        ParentImage|endswith: '\cmd.exe'
20        ParentCommandLine|endswith: '.bat'
21    selection1:
22        Image|endswith: '\xcopy.exe'
23        CommandLine|contains|all:
24            - 'powershell.exe'
25            - '.bat.exe'
26    selection2:
27        Image|endswith: '\xcopy.exe'
28        CommandLine|contains|all:
29            - 'pwsh.exe'
30            - '.bat.exe'
31    selection3:
32        Image|endswith: '\attrib.exe'
33        CommandLine|contains|all:
34            - '+s'
35            - '+h'
36            - '.bat.exe'
37    condition: parent_selection and (1 of selection*)
38falsepositives:
39    - Unknown
40level: medium

References

Related rules

to-top