Files
blue-team-tools/rules/windows/process_access/proc_access_win_invoke_patchingapi.yml
T
Nasreddine Bencherchali 81f75c1d2e feat: updates and enhancements
2023-01-10 00:13:37 +01:00

33 lines
1.1 KiB
YAML

title: Potential NT API Stub Patching
id: b916cba1-b38a-42da-9223-17114d846fd6
status: experimental
description: Detects potential NT API stub patching as seen used by the project PatchingAPI
references:
- https://github.com/D1rkMtr/UnhookingPatch
- https://twitter.com/D1rkMtr/status/1611471891193298944?s=20
author: frack113
date: 2023/01/07
modified: 2023/01/09
tags:
- attack.defense_evasion
- attack.t1562.002
logsource:
category: process_access
product: windows
detection:
selection:
GrantedAccess: '0x1FFFFF'
CallTrace|startswith: 'C:\Windows\SYSTEM32\ntdll.dll+'
CallTrace|contains: '|UNKNOWN('
CallTrace|endswith: ')'
filter_msbuild:
SourceImage|startswith: 'C:\Program Files\Microsoft Visual Studio\'
SourceImage|endswith:
- '\MSBuild\Current\Bin\amd64\MSBuild.exe'
- '\MSBuild\Current\Bin\MSBuild.exe'
TargetImage|startswith: 'C:\Program Files\Microsoft Visual Studio\'
condition: selection and not 1 filter_*
falsepositives:
- Unknown
level: medium