SigmaHQ/rules/windows/process_creation/win_apt_chafer_mar18.yml

78 lines
2.0 KiB
YAML
Raw Normal View History

action: global
title: Chafer Activity
2019-11-12 22:12:27 +00:00
id: 53ba33fd-3a50-4468-a5ef-c583635cfa92
description: Detects Chafer activity attributed to OilRig as reported in Nyotron report in March 2018
references:
- https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
2018-07-25 07:50:01 +00:00
tags:
2019-03-01 10:23:02 +00:00
- attack.persistence
2018-07-25 07:50:01 +00:00
- attack.g0049
- attack.t1053 # an old one
- attack.t1053.005
2019-03-01 10:23:02 +00:00
- attack.s0111
- attack.t1050 # an old one
- attack.t1543.003
2019-03-01 10:23:02 +00:00
- attack.defense_evasion
- attack.t1112
- attack.command_and_control
- attack.t1071 # an old one
- attack.t1071.004
2018-03-23 09:50:40 +00:00
date: 2018/03/23
modified: 2020/08/26
2020-11-28 09:15:39 +00:00
author: Florian Roth, Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
detection:
condition: 1 of them
falsepositives:
- Unknown
level: critical
---
2019-03-01 12:36:54 +00:00
logsource:
product: windows
service: system
detection:
selection_service:
EventID: 7045
ServiceName:
- 'SC Scheduled Scan'
- 'UpdatMachine'
---
logsource:
product: windows
2019-03-01 10:23:02 +00:00
service: security
detection:
selection_service:
2019-03-01 10:23:02 +00:00
EventID: 4698
TaskName:
- 'SC Scheduled Scan'
- 'UpdatMachine'
---
logsource:
2020-11-28 09:15:39 +00:00
category: registry_event
product: windows
detection:
selection_reg1:
2020-10-15 20:26:58 +00:00
TargetObject|endswith:
- 'SOFTWARE\Microsoft\Windows\CurrentVersion\UMe'
- 'SOFTWARE\Microsoft\Windows\CurrentVersion\UT'
---
logsource:
category: process_creation
product: windows
detection:
2020-11-28 09:15:39 +00:00
selection_process0:
CommandLine|contains: '\Service.exe'
2020-10-15 20:26:58 +00:00
CommandLine|endswith:
2020-11-28 09:15:39 +00:00
- 'i'
- 'u'
selection_process1:
- CommandLine|endswith: '\microsoft\Taskbar\autoit3.exe'
- CommandLine|startswith: 'C:\wsc.exe'
selection_process2:
2020-10-28 02:28:04 +00:00
Image|contains: '\Windows\Temp\DB\'
Image|endswith: '.exe'
2018-03-23 09:50:40 +00:00
selection_process3:
2020-11-28 09:15:39 +00:00
CommandLine|contains|all:
- '\nslookup.exe'
- '-q=TXT'
2020-10-15 20:26:58 +00:00
ParentImage|contains: '\Autoit'