Skip to content

Commit

Permalink
Added a dotnet rundown artifact.
Browse files Browse the repository at this point in the history
  • Loading branch information
bmcder02 committed Jan 25, 2024
1 parent 19a0638 commit b1044f4
Showing 1 changed file with 45 additions and 0 deletions.
45 changes: 45 additions & 0 deletions artifacts/definitions/Windows/ETW/DotNetRundown.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
name: Windows.ETW.DotNetRundown
author: @bmcder02
description: |
Queries the Microsoft-Windows-DotNETRuntimeRundown provider to collect a list of
DotNet modules loaded into a process. This can be useful when responding to
reflectively loaded DotNet malware.
NOTE: System.Timestamp represents when the artifact was run, NOT when the module was
loaded.
type: CLIENT

parameters:
- name: ProcessRegex
default: .
type: regex
- name: PidRegex
default: .
type: regex
- name: EventIDRegex
default: .
type: regex
- name: Timeout
default: 20
type: int
sources:
- precondition:
SELECT OS From info() where OS = 'windows'

query: |
LET EventData = SELECT System.ID AS EventID, System.ProcessID AS ProcessID,
process_tracker_get(id=System.ProcessID) AS ProcessDetails,
*
FROM watch_etw(
guid="{A669021C-C450-4609-A035-5AF59AF4DF18}",
any=0x48, timeout=Timeout)
SELECT EventID, ProcessID, ProcessDetails.Data.Name AS ProcessName,
ProcessDetails.Data.Exe AS ProcessPath, System, EventData, ProviderGUID,
ProcessDetails
FROM EventData
WHERE EventID =~ EventIDRegex
AND ProcessID =~ PidRegex
AND ProcessPath =~ ProcessRegex

0 comments on commit b1044f4

Please sign in to comment.