diff --git a/rules/windows/process_creation/win_commandline_path_traversal_evasion.yml b/rules/windows/process_creation/win_commandline_path_traversal_evasion.yml new file mode 100644 index 000000000..0ddf5aa89 --- /dev/null +++ b/rules/windows/process_creation/win_commandline_path_traversal_evasion.yml @@ -0,0 +1,28 @@ +title: Command Line Path Traversial Evasion +status: experimental +id: 1327381e-6ab0-4f38-b583-4c1b8346a56b +author: Christian Burkard +date: 2021/10/26 +description: Detects the attempt to evade or obfuscate the executed command on the CommandLine using bogus path traversal +references: + - https://twitter.com/hexacorn/status/1448037865435320323 + - https://twitter.com/Gal_B1t/status/1062971006078345217 +tags: + - attack.defense_evasion + - attack.t1036 +logsource: + category: process_creation + product: windows +detection: + selection1: + Image|contains: '\Windows\' + CommandLine|contains: + - '\..\Windows\' + - '\..\System32\' + - '\..\..\' + selection2: + CommandLine|contains: '.exe\..\' + condition: 1 of them +falsepositives: + - Unknown +level: high