Skip to content

Commit 44cf714

Browse files
committed
feat(rules): Potential shellcode execution via ETW logger thread
Adversaries may employ the undocumented EtwpCreateEtwThread function to execute shellcode within the local process address space.
1 parent a367399 commit 44cf714

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
name: Potential shellcode execution via ETW logger thread
2+
id: 3e915273-5ea0-4576-afc9-b018e2d53545
3+
version: 1.0.0
4+
description: |
5+
Adversaries may employ the undocumented EtwpCreateEtwThread function to execute shellcode
6+
within the local process address space.
7+
labels:
8+
tactic.id: TA0005
9+
tactic.name: Defense Evasion
10+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
11+
technique.id: T1055
12+
technique.name: Process Injection
13+
technique.ref: https://attack.mitre.org/techniques/T1055/
14+
references:
15+
- https://www.geoffchappell.com/studies/windows/win32/ntdll/api/etw/index.htm
16+
- https://github.com/Ne0nd0g/go-shellcode/tree/master?tab=readme-ov-file#EtwpCreateEtwThread
17+
18+
condition: >
19+
create_thread and kevt.pid != 4 and thread.callstack.symbols iin ('ntdll.dll!EtwpCreateEtwThread')
20+
and
21+
not
22+
(ps.exe imatches
23+
(
24+
'?:\\WINDOWS\\System32\\ProvTool.exe',
25+
'?:\\Windows\\System32\\LogonUI.exe'
26+
)
27+
or
28+
thread.callstack.symbols iin ('ntdll.dll!EtwProcessPrivateLoggerRequest', 'sechost.dll!ControlTrace*')
29+
)
30+
31+
output: >
32+
Potential shellcode execution via EtwpCreateEtwThread API initiated by process %ps.exe
33+
severity: high
34+
35+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)