Skip to content

Commit ea56ada

Browse files
committed
Modify test executable for screenshot capture
2 parents 52e3a3b + 6221d9b commit ea56ada

File tree

3 files changed

+26
-11
lines changed

3 files changed

+26
-11
lines changed

collection/screenshot/capture-screenshot.yml

+1-2
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,7 @@ rule:
1818
- BFB9B5391A13D0AFD787E87AB90F14F5:0x1314610A
1919
- 7204e3efc2434012e13ca939db0d0b02:0x414070
2020
- 50D5EE1CE2CA5E30C6B1019EE64EEEC2:0x406E07
21-
- 333cf4a403f2dbd56e2509eb2f1d8922:0x140002180
22-
- de5f2dd641b3e75eea6e4575b0ba4a48:0x140002180
21+
- 0a30182ff3a6b67beb0f2cda9d0de678:0x407910
2322
features:
2423
# Classic GDI Capture
2524
- or:

host-interaction/process/create/create-process-suspended.yml

+24-8
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,27 @@ rule:
1616
examples:
1717
- Practical Malware Analysis Lab 03-03.exe_:0x4010EA
1818
features:
19-
- and:
20-
- or:
21-
- number: 0x08000004 = CREATE_NO_WINDOW | CREATE_SUSPENDED
22-
- number: 4 = CREATE_SUSPENDED
23-
- number: 2 = DEBUG_ONLY_THIS_PROCESS
24-
- or:
25-
- api: kernel32.CreateProcess
26-
- api: advapi32.CreateProcessAsUser
19+
- or:
20+
- and:
21+
- or:
22+
- number: 0x08000004 = CREATE_NO_WINDOW | CREATE_SUSPENDED
23+
- number: 0x800000C = CREATE_SUSPENDED | DETACHED_PROCESS | CREATE_NO_WINDOW
24+
- number: 4 = CREATE_SUSPENDED
25+
- number: 2 = DEBUG_ONLY_THIS_PROCESS
26+
- or:
27+
- api: kernel32.CreateProcess
28+
- api: kernel32.CreateProcessInternal
29+
- api: advapi32.CreateProcessAsUser
30+
- api: advapi32.CreateProcessWithLogon
31+
- api: advapi32.CreateProcessWithToken
32+
- and:
33+
- or:
34+
- number: 0x10 = PROCESS_CREATE_FLAGS_CREATE_SUSPENDED
35+
- number: 0x2000010 = PROCESS_CREATE_FLAGS_CREATE_SUSPENDED | PROCESS_CREATE_FLAGS_NO_WINDOW
36+
- number: 0x11 = PROCESS_CREATE_FLAGS_CREATE_SUSPENDED | PROCESS_CREATE_FLAGS_BREAKAWAY
37+
- or:
38+
- api: ntdll.NtCreateProcessEx
39+
- api: ZwCreateProcessEx
40+
- api: ntdll.NtCreateUserProcess
41+
- api: ntdll.ZwCreateUserProcess
42+
- api: ntdll.RtlCreateUserProcess

lib/write-process-memory.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ rule:
55
66
lib: true
77
scopes:
8-
static: function
8+
static: instruction
99
dynamic: call
1010
att&ck:
1111
- Defense Evasion::Process Injection [T1055]

0 commit comments

Comments
 (0)