Skip to content

Commit 48be943

Browse files
committed
feat(rules): New Image load via NTFS transaction rule
Identifies image loading of a file written to disk via NTFS transaction. Adversaries may exploit the transactional API to execute code in the address space of the running process without committing the code to disk.
1 parent 40cfe0a commit 48be943

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
name: Image load via NTFS transaction
2+
id: ce8de3d0-0768-41a7-bab9-4eca27ed1e3c
3+
version: 1.0.0
4+
description: |
5+
Identifies image loading of a file written to disk via NTFS transaction. Adversaries may exploit
6+
the transactional API to execute code in the address space of the running process without committing
7+
the code to disk.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1055
13+
technique.name: Process Injection
14+
technique.ref: https://attack.mitre.org/techniques/T1055/
15+
references:
16+
- https://learn.microsoft.com/en-us/windows/win32/fileio/about-transactional-ntfs
17+
18+
condition: >
19+
sequence
20+
maxspan 2m
21+
|create_file and thread.callstack.symbols imatches ('kernel32.dll!CreateFileTransacted*', 'ntdll.dll!RtlSetCurrentTransaction')| by file.name
22+
|load_module and kevt.pid != 4| by image.name
23+
24+
output: >
25+
Image %2.image.name written via transactional NTFS and loaded afterward
26+
severity: high
27+
28+
min-engine-version: 2.0.0

0 commit comments

Comments
 (0)