Query Details

Nt Map View Of Section Detection Rule

Query

# Rule : Detection of NtMapViewOfSection Remote API Call

## Description
This detection rule identifies suspicious usage of the `NtMapViewOfSection` function for remote API calls. The `NtMapViewOfSection` function allows a process to map a view of a section into its address space, which can be used for legitimate purposes but can also be exploited by malicious actors for process injection. This technique is often used to execute arbitrary code within the context of another process, potentially leading to unauthorized actions or evasion of security controls. According to the MITRE ATT&CK framework, this technique is categorized under "Process Injection" (T1055).

This rule helps detect and audit suspicious usage of `NtMapViewOfSection`, providing an early warning for potential malicious activities involving process injection.

- [MITRE ATT&CK: Process Injection](https://attack.mitre.org/techniques/T1055/)

## Detection Logic
- Monitors `DeviceEvents` for events where:
  - The `ActionType` includes "NtMapViewOfSectionRemoteApiCall".
  - The `FileName` is not "firefox.exe".
  - The `FileName` is not "MicrosoftEdgeCP.exe".

## Tags
- Process Injection
- NtMapViewOfSection
- Remote API Call
- MITRE ATT&CK T1055
- Suspicious Activity

## Search Query
```kql
DeviceEvents 
| where ActionType has_any('NtMapViewOfSectionRemoteApiCall')
| where FileName != "firefox.exe" and FileName != "MicrosoftEdgeCP.exe"
```

Explanation

This query is designed to detect suspicious use of the NtMapViewOfSection function, which can be used for process injection—a technique where malicious code is executed within the context of another process. The query specifically looks for events where this function is called remotely, excluding legitimate uses by Firefox and Microsoft Edge processes. This helps identify potential malicious activities early on.

Details

Ali Hussein profile picture

Ali Hussein

Released: July 21, 2024

Tables

DeviceEvents

Keywords

DeviceEventsProcessInjectionNtMapViewOfSectionRemoteAPICallMITREATT&CKSuspiciousActivity

Operators

has_any!=and

Actions