Attack Vector Detection Coverage

Overview

The MetaDefender Core YARA engine provides comprehensive threat detection across the attack lifecycle, from initial delivery through execution and evasion. This analysis examines 80+ hand-picked and high efficiency detection rules across 10 major attack vector categories, focusing on the threats our engine identifies and the detection strategies employed.

Attack Vectors Covered:

  1. Document-Based Attack Vectors - Malicious Office documents, PDFs, and RTF files
  2. Script and Macro-Based Execution - PowerShell, JavaScript, VBA, and scriptlet attacks
  3. Encoding and Obfuscation Techniques - Base64, XOR, hex encoding, and multi-layer obfuscation
  4. PE Structure Manipulation and Evasion - Executable format modifications and packing
  5. Import Table and Dynamic Loading - API hiding and dynamic resolution techniques
  6. Embedded Content and Payload Hiding - Hidden executables in resources and overlays
  7. Network and Communication Vectors - C2 channels and legitimate service abuse
  8. Shortcut and Link Abuse - Malicious LNK files and hyperlink manipulation
  9. Cryptographic and Encoding Functions - Encryption libraries and protocol obfuscation
  10. Anti-Analysis and Evasion - VM detection and environment fingerprinting

1. Document-Based Attack Vectors

Description

Document-based attacks exploit legitimate file formats to deliver payloads or execute malicious code, leveraging user trust in common document types.

Detection Examples:

Key rules in this category include such as FC_Encrypted_Office_Document which identifies encrypted documents used to bypass security scanning, and FC_PDF_Launch_Function which catches PDFs with dangerous execution capabilities. FC_Office_Document_with_VBA_Project detects macro-enabled documents, among other document-based detection rules.

Required Rule Groups:

  • Microsoft Office Documents
  • PDF
  • OLE (Object Linking and Embedding)
  • Email Attachments
  • OneNote
  • Exploits

Key Associated MITRE ATT&CK Techniques:

2. Script and Macro-Based Execution

Description

Script-based attacks leverage legitimate system interpreters to execute malicious code, using "living off the land" techniques with PowerShell, JavaScript, VBA and such script languages.

Detection Examples:

Notable examples include FC_File_with_JavaScript_Script_Block which detects JavaScript script blocks in files, and FC_Scripting_VB which identifies Visual Basic scripting content. SC_JavaScript_Double_Indirect_Call targets sophisticated JavaScript indirection methods, representing several of the script execution detection capabilities.

Required Rule Groups:

  • JavaScript in HTML
  • Script Execution
  • Microsoft Shortcut (LNK)
  • Exploits

Key Associated MITRE ATT&CK Techniques:

3. Encoding and Obfuscation Techniques

Description

Obfuscation and encoding techniques hide malicious content from static analysis and security tools using various encoding schemes and data manipulation methods.

Detection Examples:

Among the obfuscation detection rules, pe_double_base64d_pe identifies executables encoded twice with Base64 for sophisticated evasion, and pe_resource_single_byte_xor_PE detects XOR-based obfuscation in PE resources. FC_File_with_UTF8_and_Base64_Encoded_Strings identifies multi-layer encoding schemes across different file formats, illustrating the breadth of encoding detection methods.

Required Rule Groups:

  • Encoding
  • Resources, overlay, and embedded files

Key Associated MITRE ATT&CK Techniques:

4. PE Structure Manipulation and Evasion

Description

PE structure manipulation involves modifying executable file structures to evade analysis tools while maintaining functionality, using techniques like header anomalies and section manipulation.

Detection Examples:

Representative rules include pe_section_rwx which identifies dangerous read-write-execute sections used for dynamic code generation, and pe_high_entropy_section using entropy analysis to detect packed or encrypted content. pe_overlapping_sections catches deliberate PE manipulation designed to confuse analysis tools, showcasing the engine's comprehensive PE analysis capabilities.

Required Rule Groups:

  • PE Header
  • PE Sections
  • PE Imports
  • Signature

Key Associated MITRE ATT&CK Techniques:

5. Import Table and Dynamic Loading

Description

Import table manipulation hides malware functionality by using dynamic API resolution instead of static imports, making analysis more difficult.

Detection Examples:

Standout detection methods include pe_dynamic_api_resolution_imports which identifies the classic LoadLibrary/GetProcAddress pattern used to hide functionality, and pe_zero_imports which catches completely import-free executables (often indicating packing). pe_imports_by_ordinal targets obfuscated imports using ordinal numbers instead of function names, demonstrating various approaches to import analysis.

Required Rule Groups:

  • PE Imports

Key Associated MITRE ATT&CK Techniques:

6. Embedded Content and Payload Hiding

Description

Payload hiding techniques leverage file structures to conceal malicious content within legitimate containers, using resources, overlays, and encoding methods.

Detection Examples:

Prominent examples include pe_embedded_pe which identifies executables hiding other PE files using header-independent detection, and pe_resource_base64d_pe which catches Base64-encoded executables concealed in resource sections. pe_large_overlay flags suspiciously oversized overlays used for payload storage, reflecting the diverse payload hiding detection techniques available.

Required Rule Groups:

  • Resources, overlay, and embedded files

Key Associated MITRE ATT&CK Techniques:

7. Network and Communication Vectors

Description

Network-based vectors encompass delivery mechanisms and communication channels, often abusing legitimate services to blend with normal traffic.

Detection Examples:

Selected examples include FC_File_with_Amazon_SES_Redirect which identifies abuse of legitimate Amazon email services for malware distribution, and FC_WinHttpRequest_Object which detects embedded HTTP objects used for C2 communication. FC_FTP_Credentials catches embedded authentication data suggesting exfiltration preparation, highlighting key network-based threat detection capabilities.

Required Rule Groups:

  • Application Layer Protocols
  • URL Redirection and External Services

Key Associated MITRE ATT&CK Techniques:

Description

Shortcut and link abuse leverages LNK files and hyperlinks to execute commands or redirect users while appearing as harmless shortcuts.

Detection Examples:

The primary rules in this limited category are SC_Microsoft_LNK_Commands which identifies malicious shortcuts with complex command sequences used for script execution or payload downloading, and FC_HTML_JavaScript_with_Hyperlink_Reference which detects JavaScript-based hyperlink manipulation. These rules target user execution tricks and social engineering tactics that exploit trust in familiar link formats.

Required Rule Groups:

  • Microsoft Shortcut (LNK)

Key Associated MITRE ATT&CK Techniques:

9. Cryptographic and Encoding Functions

Description

Cryptographic and encoding functions detect the presence of encryption libraries and encoding schemes used for payload protection or communication encryption.

Detection Examples:

Core examples from this category include FC_File_with_CryptoJS_Decrypt_Function which identifies suspicious CryptoJS usage in documents where it's unexpected and often malicious, and FC_File_with_CryptoJS_Encode_Function which detects CryptoJS encoding functions. These rules address cryptographic library usage in unexpected contexts, among other cryptographic detection methods.

Required Rule Groups:

  • Encoding

Key Associated MITRE ATT&CK Techniques:

10. Anti-Analysis, Evasion and Privilege Elevation

Description

Anti-analysis techniques detect and evade security analysis environments, ensuring malware only executes in intended target systems. Such attacks include

Detection Examples:

Notable examples include SC_User_Access_Control_Bypass which identifies techniques to bypass Windows User Access Control for privilege escalation, and pe_unusual_entrypoint_section which detects executables with entry points in unexpected sections used to evade analysis. These complement our more sophisticated anti-analysis detection capabilities deployed across the engine.

Required Rule Groups:

  • Archive files and packing techniques
  • Exploits
  • PE Header

Key Associated MITRE ATT&CK Techniques:

Rule Group Mapping Note

The rule group categorizations provided in the "Required Rule Groups" sections represent a best-effort mapping between the existing rule group structure and the attack vector categories. While these mappings provide comprehensive coverage for each attack vector, they are not perfect 1:1 matches due to the different organizational approaches between rule groups and attack vector classifications. Some rule groups may contain rules that extend beyond the specific attack vector category, and some attack vectors may benefit from rules in multiple groups. The suggested groupings are designed to provide optimal detection coverage for each attack vector category.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard