Commit 2e3f903
committed
feat: add RedSun Windows Defender 0-day (CVE-2026-33825) detection rule
Static analysis of Nightmare-Eclipse/RedSun.cpp PoC identified these IOCs:
- working dir %TEMP%\RS-{GUID} (hardcoded prefix + CoCreateGuid)
- named pipe \pipe\REDSUN (CreateNamedPipe + GetNamedPipeServerSessionId)
- payload filename TieringEngineService.exe impersonating the real MS svc
- reparse mount point to \??\C:\Windows\System32 from user-writable dir
- Cloud Files provider "SERIOUSLYMSFT" (CfRegisterSyncRoot)
- Storage Tiers DCOM CLSID {50d185b9-fff3-4656-92c7-e4018da4361d}
- stdout markers "The red sun shall prevail", "The sun is shinning"
The rule fires on the exploit primitive (MsMpEng.exe writing
TieringEngineService.exe), pre-staging (TEMP drops), post-exploitation
(System32\TieringEngineService.exe spawning conhost.exe), and on any
indicator metadata surfacing the PoC-specific strings. Servicing paths
(WinSxS, SoftwareDistribution, DriverStore, Defender quarantine/platform)
excluded to avoid FP on legitimate MS updates.1 parent 22a68a5 commit 2e3f903
1 file changed
Lines changed: 5 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
199 | 199 | | |
200 | 200 | | |
201 | 201 | | |
| 202 | + | |
| 203 | + | |
| 204 | + | |
| 205 | + | |
| 206 | + | |
202 | 207 | | |
203 | 208 | | |
204 | 209 | | |
| |||
0 commit comments