mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 17:58:52 +00:00
44 lines
1.3 KiB
YAML
44 lines
1.3 KiB
YAML
|
title: Suspicious Werfault.exe Network Connection Outbound
|
||
|
id: e12c75f2-d09e-43f6-90e4-6a23842907af
|
||
|
status: experimental
|
||
|
description: Adversaries can migrate cobalt strike/metasploit/C2 beacons on compromised systems to legitimate werfault.exe process to avoid detection.
|
||
|
references:
|
||
|
- https://thedfirreport.com/2021/03/08/bazar-drops-the-anchor/
|
||
|
author: Sreeman
|
||
|
date: 2021/03/09
|
||
|
modified: 2021/06/11
|
||
|
tags:
|
||
|
- attack.command_and_control
|
||
|
- attack.t1571
|
||
|
logsource:
|
||
|
product: windows
|
||
|
category: network_connection
|
||
|
detection:
|
||
|
selection:
|
||
|
Image: 'werfault.exe'
|
||
|
filter1:
|
||
|
ParentImage: 'svchost.exe'
|
||
|
filter2:
|
||
|
DestinationIp:
|
||
|
- '104.42.151.234'
|
||
|
- '104.43.193.48'
|
||
|
- '52.255.188.83'
|
||
|
- '13.64.90.137'
|
||
|
- '168.61.161.212'
|
||
|
- '13.88.21.125'
|
||
|
- '40.88.32.150'
|
||
|
- '52.147.198.201'
|
||
|
- '52.239.207.100'
|
||
|
- '52.176.224.96'
|
||
|
- '2607:7700:0:24:0:1:287e:1894'
|
||
|
- '10.*'
|
||
|
- '192.168.*'
|
||
|
- '127.*'
|
||
|
filter3:
|
||
|
DestinationHostname|contains:
|
||
|
- '*.windowsupdate.com'
|
||
|
- '*.microsoft.com'
|
||
|
condition: selection and not ( filter1 and filter2 and filter3 )
|
||
|
falsepositives:
|
||
|
- Communication to other corporate systems that use IP addresses from public address spaces and Microsoft IP spaces
|
||
|
level: medium
|