Skip to content

Commit

Permalink
Merge PR #4594 from @bohops - updating cor profiler rule
Browse files Browse the repository at this point in the history
update: Enabling COR Profiler Environment Variables - Add additional values to increase coverage for potential COR CLR profiler abuse

---------

Co-authored-by: Nasreddine Bencherchali <[email protected]>
  • Loading branch information
bohops and nasbench authored Nov 27, 2023
1 parent 0a95137 commit beccbb8
Showing 1 changed file with 10 additions and 6 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,15 @@
title: Enabling COR Profiler Environment Variables
id: ad89044a-8f49-4673-9a55-cbd88a1b374f
status: test
description: This rule detects cor_enable_profiling and cor_profiler environment variables being set and configured.
description: Detects .NET Framework CLR and .NET Core CLR "cor_enable_profiling" and "cor_profiler" variables being set and configured.
references:
- https://twitter.com/jamieantisocial/status/1304520651248668673
- https://www.slideshare.net/JamieWilliams130/started-from-the-bottom-exploiting-data-sources-to-uncover-attck-behaviors
- https://www.sans.org/cyber-security-summit/archives
author: Jose Rodriguez (@Cyb3rPandaH), OTR (Open Threat Research)
- https://learn.microsoft.com/en-us/dotnet/core/runtime-config/debugging-profiling
author: Jose Rodriguez (@Cyb3rPandaH), OTR (Open Threat Research), Jimmy Bayne (@bohops)
date: 2020/09/10
modified: 2023/08/17
modified: 2023/11/24
tags:
- attack.persistence
- attack.privilege_escalation
Expand All @@ -18,9 +19,12 @@ logsource:
category: registry_set
product: windows
detection:
selection:
selection_1:
TargetObject|endswith:
- '\COR_ENABLE_PROFILING'
- '\COR_PROFILER'
condition: selection
level: high
- '\CORECLR_ENABLE_PROFILING'
selection_2:
TargetObject|contains: '\CORECLR_PROFILER_PATH'
condition: 1 of selection_*
level: medium

0 comments on commit beccbb8

Please sign in to comment.