Releases
v2.4.0
Release Notes
New features
#370b43e : Enable callstack for VirtualAlloc
events
#8e81077 : Enable callstack for OpenProcess
and OpenThread
events
#efdd5e3 : Introduce *.path
filter fields
#9df026f : New intersects
operator
#9a14aa9 : New foreach
function
#bdf9844 : New CreateSymbolicLinkObject
event type
#1f97cc2 : Incorporate thread pool event telemetry
#47564c2 : Expose thread pool filter fields
#a83dd8b : Add thread start address symbol and module filter fields
#3b8494e : Add additional callstack filter fields
#b0dabe0 : Introduce match-all
rule engine strategy
#19776aa : New isolate
rule action
New rules
#122e4b1 : Suspicious object symbolic link creation
#d87f913 : LSASS memory dump via MiniDumpWriteDump
#328f7be : Potential ClickFix infection chain via Run window
#fd099e9 : Executable file dropped by an unsigned service DLL
#f317da0 : LSASS handle leak via Seclogon
#34c72bb : DLL loaded via LdrpKernel32 overwrite
#6659103 : Suspicious access to the hosts file
#31fe23d : LSASS access from unsigned executable
#20f33d9 : Suspicious Netsh Helper DLL execution
#aa2b51c : Potential shellcode execution via ETW logger thread
#9ef00e5 : Suspicious execution via WMI from a Microsoft Office process
#a72f48f : LSASS process clone creation via reflection
#b99ea16 : Potential process creation via shellcode
#1cf8151 : Suspicious XSL script execution
#e624865 : Suspicious HTML Application script execution
#2e056be : Suspicious print processor loaded
#070e642 : Suspicious Vault client DLL load
#fadd559 : Suspicious Microsoft Office add-in loaded
#8d82205 : Potential port monitor or print processor persistence via registry modification
#03532e9 : Microsoft Office file execution via WMI
#7df0828 : Microsoft Office file execution via script interpreter
#bd0f9a0 : Suspicious Windows Defender exclusions registry modification
#78c98cf : Windows Defender protection tampering via registry
#cca922a : DLL Side-Loading via Microsoft Office dropped file
Enhancements
#5fab88d : Bump golang.org/x/net
from 0.21.0 to 0.38.0
#efc84b3 : Symbolize thread start address
#c73c2c3 : Append/remove module by base address
#913b71a : Speed up filter expression String
methods
#21eb54b : Expand registry persistence keys list macro
#eab4790 : Improve callstack decorator
#a84c1a1 : Speed up symbol resolution
#ad606f0 : substr
function with optional argument
#4dabdf7 : Limit YARA memory map scans
#ae6e263 : Remove system registry provider session
#fc38e3e : Revamp and improve rule engine
#56b83a0 : Speed up image file characteristics parsing
#48c0492 : Better expvar
insights for the Stackwalk decorator
#4473838 : Improve Unsigned DLL injection via remote thread
rule
#965c28e : Improve Credential discovery via VaultCmd tool
rule
#3588421 : New background and banner in MSI installer
Refactoring
#318f593 : Store memory mappings per process
#43dad32 : Introduce field arguments in the rule grammar
#4c5fd06 : Move callstack
into independent package
Bug fixes
#de9d99f : Invalid thread id for MapViewFile
/UnmapViewFile
events
#97e5764 : Private allocation size computation
#0026453 : Use iin
operator in LSASS memory dump via Windows Error Reporting
rule
#ea6f95c : Adjust rule YAML indentation in the fibratus rules create
CLI
#5caa7da : Use process start time from event timestamp
#83c8046 : Check if the process executable is not empty to make rules more resistant against false positives
#efeeafa : Lookup parent modules in the callstack symbolizer
#099900b : Correct the condition in Process spawned from macro-enabled Microsoft Office document
rule
#33d4a67 : Overwrite Key Control Block (KCB) handle
#933bd8a : Ensure event source is closed once
#01a80ff : Improve Hidden local account creation
rule
#dac9381 : Erratic driver identification
#1e951d5 : Interpolation for arg-based filter fields
#de500a8 : Add process executable exceptions for Potential process injection via tainted memory section
rule
#a94d08a : Add expire sequence condition for the CreateThread
event
#3b8bb5c : Check/initialize process state before out-of-order sequence evaluation
#3d1006a : Exclusion for OneDrive
to tune false positives in Potential process hollowing
rule
#a367399 : Lookup live modules in symbolizer
#0a08b8c : Allow interpolation for filter fields with underscore symbol
#e37d1a6 : Reduce Potential privilege escalation via phantom DLL hijacking
rule false positives
#9f8d98c : Add CompatTelRunner.exe
exclusion for Unusual process modified registry run key
rule
#3355c0e : Rework Script interpreter host or untrusted process persistence
rule for better resistance to false positives
#c490363 : Rework callstack final user frame heuristics
#4dc6121 : Use the correct form of the not
operator in rules
#495fbb9 : Spurious process executable override
#2b39cf4 : Use ps.name
field in Macro execution via script interpreter
rule
#4b411be : General rule false positives reduction
Breaking changes
registry.key
, image.name
, and file.name
now yield the base registry, image, or file name path. Use registry.path
, image.path
or file.path
to obtain the full path
ps.ancestor
indexed-field now always returns the ancestor process name for the given level. Use the foreach
function in conjunction with the ps._ancestors
pseudo field to evaluate other process attributes
ps.modules
field has been removed. Use the foreach
function in conjunction with the ps._modules
pseudo field to evaluate other module attributes
ps.pe.sections
field has been removed. Use the foreach
function in conjunction with the pe._sections
pseudo field to evaluate other section attributes
rarely used callstack indices (ustart
, uend
, kstart
, kend
) have been removed
You can’t perform that action at this time.