Dumpbin LOLBin use for proxying execution via link.exe

Using dumpbin.exe, a windows binary that is installed along side visual studio versions. When dumbin.exe is executed, it is calling link.exe without checking the legitimacy of the link.exe named binary in the same directory.

Sigma rule (View on GitHub)

 1title: Dumpbin LOLBin use for proxying execution via link.exe 
 2id: c8cf90cc-61ac-4c59-ba8d-739ca0d4f392
 3description: Using dumpbin.exe, a windows binary that is installed along side visual studio versions. When dumbin.exe is executed, 
 4             it is calling link.exe without checking the legitimacy of the link.exe named binary in the same directory. 
 5status: experimental
 6date: 2022/08/25
 7author: \@kostastsale
 8references:
 9    - https://twitter.com/0gtweet/status/1560732860935729152
10logsource:
11    category: process_creation
12    product: windows
13detection:
14    selection1:
15        Image|endswith:
16            - '\link.exe'
17        ParentImage|endswith:
18            - '\dumpbin.exe'
19    filter:
20        Image|endswith:
21            - '\bin\hostx64\x64\link.exe'
22            - '\bin\hostx86\x86\link.exe'
23        ParentImage|endswith:
24            - '\bin\hostx64\x64\dumpbin.exe'
25            - '\bin\hostx86\x86\dumpbin.exe'
26    condition: selection1 and not filter
27falsepositives:
28    - Unlikely
29level: high
30tags:
31    - attack.Defense Evasion
32    - attack.T1218

References

Related rules

to-top