2020-05-23 16:27:36 +00:00
title : Suspicious Esentutl Use
id : 56a8189f-11b2-48c8-8ca7-c54b03c2fbf7
status : experimental
description : Detects flags often used with the LOLBAS Esentutl for malicious activity. It could be used in rare cases by administrators to access locked files or during maintenance.
author : Florian Roth
date : 2020 /05/23
references :
- https://lolbas-project.github.io/
- https://twitter.com/chadtilbury/status/1264226341408452610
tags :
- attack.defense_evasion
- attack.execution
- attack.s0404
- attack.t1218
logsource :
category : process_creation
product : windows
detection :
2020-05-23 16:32:02 +00:00
selection :
CommandLine|contains|all :
2020-05-23 16:27:36 +00:00
- ' /vss '
- ' /y '
condition : selection
fields :
- CommandLine
- ParentCommandLine
falsepositives :
- Administrative activity
level : high