2017-03-04 09:38:23 +00:00
title : Malware Shellcode in Verclsid Target Process
status : experimental
2018-07-10 14:14:07 +00:00
description : Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro
2018-01-27 23:24:16 +00:00
references :
- https://twitter.com/JohnLaTwC/status/837743453039534080
2017-03-04 09:38:23 +00:00
author : John Lambert (tech), Florian Roth (rule)
date : 2017 /03/04
logsource :
2017-03-13 08:23:08 +00:00
product : windows
service : sysmon
2018-11-15 06:00:06 +00:00
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events : <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
2017-03-04 09:38:23 +00:00
detection :
selection :
EventID : 10
TargetImage : '*\verclsid.exe'
GrantedAccess : '0x1FFFFF'
combination1 :
CallTrace : '*|UNKNOWN(*VBE7.DLL*'
combination2 :
SourceImage : '*\Microsoft Office\*'
CallTrace : '*|UNKNOWN*'
2018-03-06 22:14:43 +00:00
condition : selection and 1 of combination*
2017-03-04 09:38:23 +00:00
falsepositives :
- unknown
level : high