Merge pull request #2193 from frack113/vhd_dowload

Add file_event_mal_vhd_download.yml
This commit is contained in:
frack113 2021-10-25 20:30:11 +02:00 committed by GitHub
commit b17c4fab33
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,33 @@
title: Suspicious VHD Image Download From Browser
id: 8468111a-ef07-4654-903b-b863a80bbc95
status: experimental
description: Malware can use mountable Virtual Hard Disk .vhd file to encapsulate payloads and evade security controls
references:
- https://redcanary.com/blog/intelligence-insights-october-2021/
- https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/
- https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
author: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'
date: 2021/10/25
tags:
- attack.resource_development
- attack.t1587.001
logsource:
category: file_event
product: windows
definition: in sysmon add "<TargetFilename condition="end with">.vhd</TargetFilename> <!--vhd files for ZLoader and lazarus malware vectors -->"
detection:
selection:
- Image|endswith:
- chrome.exe
- firefox.exe
- microsoftedge.exe
- microsoftedgecp.exe
- msedge.exe
- iexplorer.exe
- brave.exe
- opera.exe
- TargetFilename|contains: '.vhd' #not endswith to get the alternate data stream log Too TargetFilename: C:\Users\Frack113\Downloads\windows.vhd:Zone.Identifier
condition: selection
falsepositives:
- Legitimate user creation
level: medium