-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added ordinal of ShellExec_RunDLL #5082
Added ordinal of ShellExec_RunDLL #5082
Conversation
HI, |
@frack113 I also referred to the same link, but it didn't work as expected with the ordinal number 568 for ShellExec_RunDLL. It seems they got it wrong or something has changed. I will look at SHELL32.dll exported functions and their ordinal numbers |
Just FYI @frack113 @swachchhanda000 This is due to different versions of the DLL somewhere in Win11 the export ordinals changed Just as a side note, you need to add all 3 variations because they achieve the same thing. The only dangerous thing is the FP rate with cross version of windows. As long there isn't a field indicating which version of windows this is running on, there's gonna be false alerts. You could use the Imphash (if you wanna track them) as a side solution with each collection in their independent selection. In my opinion just create a new hunting version of this that focuses on using ordinals and specify in details what I discussed here in the description |
I think we can reduce false positives by being more specific. For example, we can include these indicators in the parentcommandline, ensuring it has spawned the child process. This means the ordinal number is effective; if it isn't, the rule won't trigger at all. To be even more precise, we can specify a rule to hunt for suspicious child processes, such as cmd.exe, powershell.exe, wscript.exe, and others. |
As they can be many FP with the ordinal. |
Change the metadata to add similar rule
rules/windows/process_creation/proc_creation_win_rundll32_susp_shellexec_execution.yml
Outdated
Show resolved
Hide resolved
…_shellexec_execution.yml Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The detection logic looks good to me
Summary of the Pull Request
Adversaries have been observed leveraging the ordinal number of the ShellExec_RunDLL function in the shell32.dll library instead of explicitly using the function name (ShellExec_RunDLL). This technique bypasses this current detection, which rely solely on the function name, enabling execution of arbitrary system binaries such as cmd.exe or powershell.exe.
Changelog
new: Suspicious ShellExec_RunDLL Call Via Ordinal
Example Log Event
Screen.Recording.2024-11-16.at.7.03.25.PM.mov
Fixed Issues
SigmaHQ Rule Creation Conventions