diff --git a/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml b/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml new file mode 100644 index 000000000..89c798b1c --- /dev/null +++ b/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml @@ -0,0 +1,27 @@ +title: Binary Proxy Execution Via Dotnet-Trace.EXE +id: 9257c05b-4a4a-48e5-a670-b7b073cf401b +status: experimental +description: Detects commandline arguments for executing a child process via dotnet-trace.exe +references: + - https://twitter.com/bohops/status/1740022869198037480 +author: Jimmy Bayne (@bohops) +date: 2024/01/02 +tags: + - attack.execution + - attack.defense_evasion + - attack.t1218 +logsource: + category: process_creation + product: windows +detection: + selection_img: + - Image|endswith: '\dotnet-trace.exe' + - OriginalFileName: 'dotnet-trace.dll' + selection_cli: + CommandLine|contains|all: + - '-- ' + - 'collect' + condition: all of selection_* +falsepositives: + - Legitimate usage of the utility in order to debug and trace a program. +level: medium