技能 编程开发 LOLBAS 检测规则

LOLBAS 检测规则

v20260317
hunting-living-off-the-land-binaries
通过分析 Windows 进程创建日志(事件 4688/Sysmon 1)并对照 LOLBAS 数据库命令,在 SIEM 或威胁狩猎中识别 certutil、wmic 等零文件攻击工具的滥用行为。
获取技能
103 次下载
概览

Hunting Living Off The Land Binaries

Instructions

Detect LOLBAS abuse by analyzing Windows process creation events (Event ID 4688 / Sysmon 1) and matching command lines against known malicious patterns from the LOLBAS project.

import json
import requests

# Fetch LOLBAS database
resp = requests.get("https://lolbas-project.github.io/api/lolbas.json")
lolbas_db = resp.json()

# Extract binary names and suspicious commands
for entry in lolbas_db:
    print(entry["Name"], [cmd["Command"] for cmd in entry.get("Commands", [])])

Key detection patterns:

  1. certutil -urlcache -split -f (download)
  2. mshta vbscript:Execute (script execution)
  3. regsvr32 /s /n /u /i:http (squiblydoo)
  4. rundll32 javascript: (script execution)
  5. wmic process call create (process creation)
  6. bitsadmin /transfer (download)

Examples

# Match Sysmon Event ID 1 against LOLBAS patterns
import Evtx.Evtx as evtx
with evtx.Evtx("Microsoft-Windows-Sysmon.evtx") as log:
    for record in log.records():
        xml = record.xml()
        if "certutil" in xml.lower() and "urlcache" in xml.lower():
            print(f"LOLBAS detected: {xml}")
信息
Category 编程开发
Name hunting-living-off-the-land-binaries
版本 v20260317
大小 8.25KB
更新时间 2026-03-18
语言