mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 10:13:57 +00:00
47 lines
1.5 KiB
YAML
47 lines
1.5 KiB
YAML
|
title: UNC2452 Process Creation Patterns
|
||
|
id: 9be34ad0-b6a7-4fbd-91cf-fc7ec1047f5f
|
||
|
description: Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries
|
||
|
status: experimental
|
||
|
references:
|
||
|
- https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
|
||
|
tags:
|
||
|
- attack.execution
|
||
|
- attack.t1059.001
|
||
|
- sunburst
|
||
|
- unc2452
|
||
|
author: Florian Roth
|
||
|
date: 2021/01/22
|
||
|
logsource:
|
||
|
category: process_creation
|
||
|
product: windows
|
||
|
detection:
|
||
|
selection1:
|
||
|
CommandLine|contains:
|
||
|
- '7z.exe a -v500m -mx9 -r0 -p'
|
||
|
selection2:
|
||
|
ParentCommandLine|contains|all:
|
||
|
- 'wscript.exe'
|
||
|
- '.vbs'
|
||
|
CommandLine|contains|all:
|
||
|
- 'rundll32.exe'
|
||
|
- 'C:\Windows'
|
||
|
- '.dll,Tk_'
|
||
|
selection3:
|
||
|
ParentImage|endswith: '\rundll32.exe'
|
||
|
ParentCommandLine|contains: 'C:\Windows'
|
||
|
CommandLine|contains: 'cmd.exe /C '
|
||
|
selection4:
|
||
|
CommandLine|contains|all:
|
||
|
- 'rundll32 c:\windows\\'
|
||
|
- '.dll '
|
||
|
specific1:
|
||
|
ParentImage|endswith: '\rundll32.exe'
|
||
|
Image|endswith: '\dllhost.exe'
|
||
|
filter1:
|
||
|
CommandLine:
|
||
|
- ' '
|
||
|
- ''
|
||
|
condition: selection1 or selection2 or selection3 or selection4 or ( specific1 and not filter1 )
|
||
|
falsepositives:
|
||
|
- Unknown
|
||
|
level: critical
|