SigmaHQ/rules/windows/malware/mal_azorult_reg.yml

30 lines
675 B
YAML
Raw Normal View History

2020-05-09 01:31:33 +00:00
title: Registy Entries For Azorult Malware
id: f7f9ab88-7557-4a69-b30e-0a8f91b3a0e7
description: Detects the presence of a registry key created during Azorult execution
status: experimental
references:
- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.azoruit.a
author: Trent Liffick
date: 2020/05/08
tags:
- attack.execution
- attack.t1112
logsource:
product: windows
service: sysmon
detection:
selection:
EventID:
- 12
- 13
2020-10-28 01:07:45 +00:00
TargetObject|endswith:
2020-10-15 19:15:25 +00:00
- 'SYSTEM\\*\services\localNETService'
condition: selection
fields:
- Image
- TargetObject
- TargetDetails
falsepositives:
- unknown
2020-05-11 08:40:23 +00:00
level: critical