SigmaHQ/rules/apt/apt_apt29_tor.yml

34 lines
1.1 KiB
YAML
Raw Normal View History

2018-03-05 10:29:42 +00:00
---
action: global
title: APT29 Google Update Service Install
2017-04-01 08:30:36 +00:00
description: 'This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe so the service names and executable locations used by APT29 are specific enough to be detected in log files.'
references:
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
logsource:
product: windows
detection:
service:
EventID: 7045
ServiceName: 'Google Update'
timeframe: 5m
condition: service | near process
falsepositives:
- Unknown
level: high
---
# Windows Audit Log
detection:
process:
2017-04-01 08:30:36 +00:00
EventID: 4688
NewProcessName:
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'
---
# Sysmon
detection:
process:
EventID: 1
Image:
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'