mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 09:25:17 +00:00
Merge pull request #2193 from frack113/vhd_dowload
Add file_event_mal_vhd_download.yml
This commit is contained in:
commit
b17c4fab33
33
rules/windows/file_event/file_event_mal_vhd_download.yml
Normal file
33
rules/windows/file_event/file_event_mal_vhd_download.yml
Normal file
@ -0,0 +1,33 @@
|
||||
title: Suspicious VHD Image Download From Browser
|
||||
id: 8468111a-ef07-4654-903b-b863a80bbc95
|
||||
status: experimental
|
||||
description: Malware can use mountable Virtual Hard Disk .vhd file to encapsulate payloads and evade security controls
|
||||
references:
|
||||
- https://redcanary.com/blog/intelligence-insights-october-2021/
|
||||
- https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/
|
||||
- https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
|
||||
author: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'
|
||||
date: 2021/10/25
|
||||
tags:
|
||||
- attack.resource_development
|
||||
- attack.t1587.001
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
definition: in sysmon add "<TargetFilename condition="end with">.vhd</TargetFilename> <!--vhd files for ZLoader and lazarus malware vectors -->"
|
||||
detection:
|
||||
selection:
|
||||
- Image|endswith:
|
||||
- chrome.exe
|
||||
- firefox.exe
|
||||
- microsoftedge.exe
|
||||
- microsoftedgecp.exe
|
||||
- msedge.exe
|
||||
- iexplorer.exe
|
||||
- brave.exe
|
||||
- opera.exe
|
||||
- TargetFilename|contains: '.vhd' #not endswith to get the alternate data stream log Too TargetFilename: C:\Users\Frack113\Downloads\windows.vhd:Zone.Identifier
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate user creation
|
||||
level: medium
|
Loading…
Reference in New Issue
Block a user