Skip to content

Commit 556658b

Browse files
authored
Create 7z_CVE-2022-29072.yml
Adding sigma rule for behavioural detection
1 parent 1bee7ad commit 556658b

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

7z_CVE-2022-29072.yml

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
title: Exploitation of 7zip vulnerability - CVE-2022-29072
2+
description: Detects possible exploitation vulnerability CVE-2022-29072. This vulnerability is due to 7z.dll misconfiguration. When a .7z file is placed in the Help > Contents area of the current Windows version 21.07, anyone with access to the host can elevate privileges. The command creates a child process of 7zFM.exe.
3+
status: experimental
4+
date: 2022/04/18
5+
author: \@kostastsale
6+
references:
7+
- https://github.com/kagancapar/CVE-2022-29072
8+
logsource:
9+
category: process_creation
10+
product: windows
11+
detection:
12+
selection1:
13+
Image|endswith:
14+
- 'cmd.exe'
15+
- 'powershell.exe'
16+
ParentImage|endswith:
17+
- '7zFM.exe'
18+
filter:
19+
CommandLine|endswith:
20+
- '.bat'
21+
- '.cmd'
22+
- '.ps1'
23+
condition: selection1 and not filter
24+
falsepositives:
25+
- Some false positives could exist but unlikely
26+
level: high
27+
tags:
28+
- attack.Exploitation for Privilege Escalation
29+
- attack.T1068

0 commit comments

Comments
 (0)