088. Hunting for IntelliJ's Command Line Runner Abuse
Hello everyone! Adversaries always need to execute commands via various command and scripting interpreters. It's a well-known behavior, so they always look for defense evasion techniques.
Trend Micro releleased a report on Water Gamayun, and noted an interesting technique used by the threat acrors for proxy execution. The adversary abused a renamed version of IntelliJ's Command Line Runner (runnerw.exe) to execute PowerShell.
Of course, we can hunt for similar behaviors searching for renamed binaries:
event_type: "processcreatewin"
AND
proc_file_originalfilename: "runnerw.exe"
AND NOT
proc_file_name: ("runnerw.exe" OR "runnerw64.exe")
As always, more detection opportunities are in the report!
See you tomorrow!
Comments
Post a Comment