Emerging Threathightest

Suspicious RazerInstaller Explorer Subprocess

Detects a explorer.exe sub process of the RazerInstaller software which can be invoked from the installer to select a different installation folder but can also be exploited to escalate privileges to LOCAL SYSTEM

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems), Maxime ThiebautCreated Mon Aug 23Updated Sun Dec 01a4eaf250-7dc1-4842-862a-5e71cd59a1672021
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    selection:
        ParentImage|endswith: '\RazerInstaller.exe'
        IntegrityLevel:
            - 'System'
            - 'S-1-16-16384' # System
    filter_main_razer:
        Image|startswith: 'C:\Windows\Installer\Razer\Installer\'
    condition: selection and not 1 of filter_main_*
False Positives

User selecting a different installation folder (check for other sub processes of this explorer.exe process)

MITRE ATT&CK
Rule Metadata
Rule ID
a4eaf250-7dc1-4842-862a-5e71cd59a167
Status
test
Level
high
Type
Emerging Threat
Created
Mon Aug 23
Modified
Sun Dec 01
Path
rules-emerging-threats/2021/Exploits/RazerInstaller-LPE-Exploit/proc_creation_win_exploit_other_razorinstaller_lpe.yml
Raw Tags
attack.defense-evasionattack.privilege-escalationattack.t1553detection.emerging-threats
View on GitHub