2017-11-06 13:24:42 +00:00
|
|
|
title: Malicious Named Pipe
|
2019-11-12 22:12:27 +00:00
|
|
|
id: fe3ac066-98bb-432a-b1e7-a5229cb39d4a
|
2017-11-06 13:24:42 +00:00
|
|
|
status: experimental
|
|
|
|
description: Detects the creation of a named pipe used by known APT malware
|
2018-01-27 23:24:16 +00:00
|
|
|
references:
|
|
|
|
- Various sources
|
2017-11-06 13:24:42 +00:00
|
|
|
date: 2017/11/06
|
|
|
|
author: Florian Roth
|
|
|
|
logsource:
|
|
|
|
product: windows
|
2020-09-30 18:44:14 +00:00
|
|
|
category: pipe_created
|
|
|
|
definition: 'Note that you have to configure logging for PipeEvents in Sysmon config'
|
2017-11-06 13:24:42 +00:00
|
|
|
detection:
|
|
|
|
selection:
|
|
|
|
PipeName:
|
|
|
|
- '\isapi_http' # Uroburos Malware Named Pipe
|
|
|
|
- '\isapi_dg' # Uroburos Malware Named Pipe
|
|
|
|
- '\isapi_dg2' # Uroburos Malware Named Pipe
|
|
|
|
- '\sdlrpc' # Cobra Trojan Named Pipe http://goo.gl/8rOZUX
|
|
|
|
- '\ahexec' # Sofacy group malware
|
|
|
|
- '\winsession' # Wild Neutron APT malware https://goo.gl/pivRZJ
|
|
|
|
- '\lsassw' # Wild Neutron APT malware https://goo.gl/pivRZJ
|
|
|
|
- '\46a676ab7f179e511e30dd2dc41bd388' # Project Sauron https://goo.gl/eFoP4A
|
|
|
|
- '\9f81f59bc58452127884ce513865ed20' # Project Sauron https://goo.gl/eFoP4A
|
|
|
|
- '\e710f28d59aa529d6792ca6ff0ca1b34' # Project Sauron https://goo.gl/eFoP4A
|
|
|
|
- '\rpchlp_3' # Project Sauron https://goo.gl/eFoP4A - Technical Analysis Input
|
2018-10-08 18:00:59 +00:00
|
|
|
- '\NamePipe_MoreWindows' # Cloud Hopper Annex B https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, US-CERT Alert - RedLeaves https://www.us-cert.gov/ncas/alerts/TA17-117A
|
2017-11-06 13:24:42 +00:00
|
|
|
- '\pcheap_reuse' # Pipe used by Equation Group malware 77486bb828dba77099785feda0ca1d4f33ad0d39b672190079c508b3feb21fb0
|
2019-12-18 15:19:47 +00:00
|
|
|
- '\gruntsvc' # Covenant default named pipe
|
2019-02-21 12:26:39 +00:00
|
|
|
# - '\status_*' # CS default named pipes https://github.com/Neo23x0/sigma/issues/253
|
2021-04-23 15:16:09 +00:00
|
|
|
- '\583da945-62af-10e8-4902-a8f205c72b2e' # SolarWinds SUNBURST malware report https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
|
|
|
|
- '\bizkaz' # Snatch Ransomware https://thedfirreport.com/2020/06/21/snatch-ransomware/
|
2017-11-06 13:24:42 +00:00
|
|
|
condition: selection
|
2018-07-20 06:41:54 +00:00
|
|
|
tags:
|
|
|
|
- attack.defense_evasion
|
2019-01-22 18:26:07 +00:00
|
|
|
- attack.privilege_escalation
|
2018-07-20 06:41:54 +00:00
|
|
|
- attack.t1055
|
2017-11-06 13:24:42 +00:00
|
|
|
falsepositives:
|
2021-02-24 14:43:13 +00:00
|
|
|
- Unknown
|
2017-11-06 13:24:42 +00:00
|
|
|
level: critical
|