088. Hunting for IntelliJ's Command Line Runner Abuse

Hello everyone! Adversaries always need to execute commands via various command and scripting interpreters. It's a well-known behavior, so they always look for defense evasion techniques.

Trend Micro releleased a report on Water Gamayun, and noted an interesting technique used by the threat acrors for proxy execution. The adversary abused a renamed version of IntelliJ's Command Line Runner (runnerw.exe) to execute PowerShell.

Of course, we can hunt for similar behaviors searching for renamed binaries:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "runnerw.exe"

AND NOT

proc_file_name: ("runnerw.exe" OR "runnerw64.exe")

As always, more detection opportunities are in the report!

See you tomorrow!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse