Skip to content

Commit 1b326fc

Browse files
committed
fix(rules): Add process executable exceptions for Potential process injection via tainted memory section rule
1 parent 1b6c87e commit 1b326fc

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

rules/defense_evasion_potential_process_injection_via_tainted_memory_section.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Potential process injection via tainted memory section
22
id: 8e4182f3-02e7-4e95-afc3-93d18c9a9c09
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies potential process injection when the adversary creates and maps a memory
66
section with RW protection rights followed by mapping of the same memory section in
@@ -25,7 +25,13 @@ condition: >
2525
|map_view_of_section and file.view.protection = 'READWRITE' and kevt.pid != 4 and file.view.size >= 4096 and not ps.exe imatches
2626
(
2727
'?:\\Program Files\\*.exe',
28-
'?:\\Program Files (x86)\\*.exe'
28+
'?:\\Program Files (x86)\\*.exe',
29+
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\MsMpEng.exe',
30+
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\NisSrv.exe',
31+
'?:\\WINDOWS\\System32\\csrss.exe',
32+
'?:\\WINDOWS\\Explorer.exe',
33+
'?:\\WINDOWS\\System32\\svchost.exe',
34+
'?:\\WINDOWS\\System32\\lsass.exe'
2935
)
3036
| as e1
3137
|map_view_of_section and file.view.protection = 'READONLY|EXECUTE' and file.key = $e1.file.key and kevt.pid != $e1.kevt.pid|

0 commit comments

Comments
 (0)