new: bindfltapi.dll execution by suspicious process #5744
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary of the Pull Request
Adds Windows Security (Event ID 4663) detections for FILE_EXECUTE access to the BindFlt API DLL, which is, as stated in the ZeroSalarium's reference, possible by usermode. These rules are intended for defensive validation of BindFlt API usage as described in ZeroSalarium’s research ("EDR-Redir V2 – Blind EDR With Fake Program Files"), and help surface processes that load the BindFlt API to create redirecting bind links - with the goal of evading EDR solutions (Defender, Elastic Defend, Sophos Intercept X, ESET Premium, CrowdStrike Falcon). Rules include common field aliases and exec mask for portability. This was tested on a Windows Server 2022 Standard VM Version 10.0.20348 Build 20348 by using the following source and the x64 exe built from it:
"https://github.com/TwoSevenOneT/EDR-Redir"
As this rule detects execute access to bindfltapi.dll by suspicious processes, it requires File System auditing and SACL to catch these hits.
Changelog
new: win_security_susp_bindfltapi_execute.yml
Example Log Event
True Positive Example, Matches the rule (
ObjectType: File, path endswith\bindfltapi.dll,AccessMask 0x20/%%4421Execute, non-system process):False Positive Example (Only
ReadAttributes, notExecute. Process is Defender (MsMpEng.exe)):Fixed Issues
SigmaHQ Rule Creation Conventions