heroui logo

HackTool - Powerup Write Hijack DLL

Sigma Rules

View Source
Summary
The detection rule targets the Powerup tool's Write Hijack DLL, which is known for exploiting DLL hijacking vulnerabilities to achieve privilege escalation on Windows systems. This particular method operates by creating a self-deleting batch file (commonly named 'debug.bat') that executes malicious commands under the guise of legitimate processes. The detection mechanism relies on monitoring file events to capture the creation of batch files initiated by PowerShell or PowerShell Core, specifically when the target filename has a '.bat' extension. The rule is designed to detect these malicious attempts and alert security professionals about potential misuse of these tools in an environment, thereby mitigating the risk of unauthorized privilege escalations.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2021-08-21