
Summary
This detection rule targets a specific tactic used by attackers to manipulate the behavior of the ntdll.dll file. The rule detects commands that output the contents of the `ntdll.dll` library to either a file or a pipe, a technique that malicious actors may use to evade detection by traditional antivirus (AV) or endpoint detection and response (EDR) solutions. The command line patterns that are monitored include variations of the `type` command that reference the ntdll.dll file in typical system directories. Given the importance of ntdll.dll in the Windows operating system, this activity can be indicative of an attack attempting to conceal its malicious actions from monitoring tools. The rule was developed by Florian Roth from Nextron Systems and includes logs from process creation on Windows systems. As such, it falls under the category of defense evasion tactics, implicitly suggesting that enhanced scrutiny of process creation logs is vital for identifying potential threats that engage in similar activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-03-05