DET0507 Detect browser session hijacking via privilege, handle access, and remote thread into browsers
| Item |
Value |
| ID |
DET0507 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1185 (Browser Session Hijacking)
Analytics
Windows
AN1398
Adversary gains high integrity or special privileges (e.g., SeDebugPrivilege), locates a running browser process, opens it with write/inject rights, and modifies it (e.g., CreateRemoteThread / DLL load) to inherit cookies/tokens or establish a browser pivot. Optional step: create a new logon session or use explicit credentials, then drive the victim browser to intranet resources.
Log Sources
Mutable Elements
| Field |
Description |
| BrowserList |
Set of monitored browsers (chrome.exe, msedge.exe, firefox.exe, iexplore.exe). Adjust per fleet. |
| AccessMaskSet |
Access rights implying injection (e.g., 0x1FFFFF, 0x1F3FF, VM_WRITE, VM_OPERATION, CREATE_THREAD). Tune by EDR mapping. |
| SignerAllowList |
Allowed module signers within browser processes (e.g., Microsoft, Google). Helps flag unsigned/unknown ImageLoad into browsers. |
| InternalCIDR |
Enterprise internal ranges or DNS suffixes to identify intranet pivoting via the browser. |
| TimeWindow |
Correlation interval (e.g., 10–20 minutes) linking privilege gain → access → modification → network usage. |
| ParentAllowList |
Legitimate tools that may automate browsers (e.g., Selenium drivers). Reduce FPs by allowlisting. |
| UserContext |
Scope analytics to high-value users, admin workstations, or servers where browsers shouldn’t be automated. |