mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 10:13:57 +00:00
Added a rule to detect the use of SettingSyncHost.exe to run hijacked binary
This commit is contained in:
parent
93616af1cb
commit
8693bd024f
@ -0,0 +1,33 @@
|
||||
title: Using SettingSyncHost.exe as LOLBIN
|
||||
description: Detects using SettingSyncHost.exe to run hijacked binary
|
||||
id: b2ddd389-f676-4ac4-845a-e00781a48e5f
|
||||
status: experimental
|
||||
references:
|
||||
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1574
|
||||
author: Anton Kutepov, oscd.community
|
||||
date: 2020/02/05
|
||||
modified: 2020/10/10
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
system_utility:
|
||||
Image|startswith:
|
||||
- 'C:\Windows\System32\'
|
||||
- 'C:\Windows\SysWOW64\'
|
||||
parent_is_settingsynchost:
|
||||
ParentCommandLine|contains|all:
|
||||
- 'cmd.exe /c'
|
||||
- 'RoamDiag.cmd'
|
||||
- '-outputpath'
|
||||
condition: not system_utility and parent_is_settingsynchost
|
||||
fields:
|
||||
- TargetFilename
|
||||
- Image
|
||||
falsepositives:
|
||||
- unknown
|
Loading…
Reference in New Issue
Block a user