From 303cb49b8563c38d9b7e2a0da7cbbaa98166fcb9 Mon Sep 17 00:00:00 2001 From: bohops Date: Wed, 10 Jan 2024 07:58:15 -0500 Subject: [PATCH] Merge PR #4643 from @bohops - Adding dotnet-trace LOLBIN new: Binary Proxy Execution Via Dotnet-Trace.EXE --------- Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com> Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com> --- ...tion_win_dotnet_trace_lolbin_execution.yml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml diff --git a/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml b/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml new file mode 100644 index 000000000..89c798b1c --- /dev/null +++ b/rules/windows/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml @@ -0,0 +1,27 @@ +title: Binary Proxy Execution Via Dotnet-Trace.EXE +id: 9257c05b-4a4a-48e5-a670-b7b073cf401b +status: experimental +description: Detects commandline arguments for executing a child process via dotnet-trace.exe +references: + - https://twitter.com/bohops/status/1740022869198037480 +author: Jimmy Bayne (@bohops) +date: 2024/01/02 +tags: + - attack.execution + - attack.defense_evasion + - attack.t1218 +logsource: + category: process_creation + product: windows +detection: + selection_img: + - Image|endswith: '\dotnet-trace.exe' + - OriginalFileName: 'dotnet-trace.dll' + selection_cli: + CommandLine|contains|all: + - '-- ' + - 'collect' + condition: all of selection_* +falsepositives: + - Legitimate usage of the utility in order to debug and trace a program. +level: medium