2023-02-03 20:17:09 +01:00
title : Potential Arbitrary Code Execution Via Node.EXE
2022-09-09 15:02:31 +02:00
id : 6640f31c-01ad-49b5-beb5-83498a5cd8bd
2023-12-01 12:50:36 +01:00
status : test
2023-02-06 13:53:23 +01:00
description : Detects the execution node.exe which is shipped with multiple software such as VMware, Adobe...etc. In order to execute arbitrary code. For example to establish reverse shell as seen in Log4j attacks...etc
2022-09-09 15:02:31 +02:00
references :
- http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
- https://www.sprocketsecurity.com/resources/crossing-the-log4j-horizon-a-vulnerability-with-no-return
- https://www.rapid7.com/blog/post/2022/01/18/active-exploitation-of-vmware-horizon-servers/
- https://nodejs.org/api/cli.html
2023-02-01 11:14:59 +01:00
author : Nasreddine Bencherchali (Nextron Systems)
2024-08-12 12:02:50 +02:00
date : 2022-09-09
modified : 2023-02-03
2022-09-09 15:02:31 +02:00
tags :
2024-08-12 12:02:50 +02:00
- attack.defense-evasion
2022-09-09 15:02:31 +02:00
- attack.t1127
logsource :
category : process_creation
product : windows
detection :
2024-07-11 11:24:01 +02:00
selection_main :
2022-09-09 15:02:31 +02:00
Image|endswith : '\node.exe'
CommandLine|contains :
- ' -e '
- ' --eval '
# Add more pattern of abuse as actions
2024-07-11 11:24:01 +02:00
selection_action_reverse_shell :
2022-09-09 15:02:31 +02:00
CommandLine|contains|all :
- '.exec('
- 'net.socket'
- '.connect'
- 'child_process'
2024-07-11 11:24:01 +02:00
condition : selection_main and 1 of selection_action_*
2022-09-09 15:02:31 +02:00
falsepositives :
- Unlikely
level : high