088. Hunting for IntelliJ's Command Line Runner Abuse

Hello everyone! Adversaries always need to execute commands via various command and scripting interpreters. It's a well-known behavior, so they always look for defense evasion techniques.

Trend Micro releleased a report on Water Gamayun, and noted an interesting technique used by the threat acrors for proxy execution. The adversary abused a renamed version of IntelliJ's Command Line Runner (runnerw.exe) to execute PowerShell.

Of course, we can hunt for similar behaviors searching for renamed binaries:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "runnerw.exe"

AND NOT

proc_file_name: ("runnerw.exe" OR "runnerw64.exe")

As always, more detection opportunities are in the report!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge