2018-03-05 10:29:42 +00:00
---
2017-11-01 21:12:14 +00:00
action : global
2017-03-31 17:31:13 +00:00
title : APT29 Google Update Service Install
2017-04-01 08:30:36 +00:00
description : 'This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe so the service names and executable locations used by APT29 are specific enough to be detected in log files.'
2018-01-27 23:24:16 +00:00
references :
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
2017-03-31 17:31:13 +00:00
logsource :
product : windows
detection :
2017-11-01 21:12:14 +00:00
service :
2017-03-31 17:31:13 +00:00
EventID : 7045
ServiceName : 'Google Update'
2017-11-01 21:12:14 +00:00
timeframe : 5m
condition : service | near process
falsepositives :
- Unknown
level : high
---
# Windows Audit Log
detection :
process :
2017-04-01 08:30:36 +00:00
EventID : 4688
NewProcessName :
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'
2017-11-01 21:12:14 +00:00
---
# Sysmon
detection :
process :
EventID : 1
Image :
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'