SigmaHQ/rules/windows/process_creation/win_apt_lazarus_session_highjack.yml

29 lines
863 B
YAML
Raw Normal View History

2020-06-03 21:38:03 +00:00
title: Lazarus Session Highjacker
id: 3f7f5b0b-5b16-476c-a85f-ab477f6dd24b
description: Detects executables launched outside their default directories as used by Lazarus Group (Bluenoroff)
status: experimental
references:
2020-06-10 14:36:17 +00:00
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
2020-06-03 21:38:03 +00:00
tags:
- attack.defense_evasion
- attack.t1036 # an old one
2020-06-17 17:31:40 +00:00
- attack.t1036.005
author: Trent Liffick (@tliffick), Bartlomiej Czyz (@bczyz1)
2020-06-03 21:38:03 +00:00
date: 2020/06/03
logsource:
category: process_creation
product: windows
detection:
selection:
2020-06-10 14:36:17 +00:00
Image:
- '*\msdtc.exe'
2020-06-10 14:36:17 +00:00
- '*\gpvc.exe'
2020-06-03 21:38:03 +00:00
filter:
2020-06-10 14:36:17 +00:00
Image:
- 'C:\Windows\System32\\*'
2020-06-10 14:41:03 +00:00
- 'C:\Windows\SysWOW64\\*'
2020-06-03 21:38:03 +00:00
condition: selection and not filter
falsepositives:
2020-06-10 14:36:17 +00:00
- unknown
2020-06-03 21:38:03 +00:00
level: high