Ke3chang rule

This commit is contained in:
Florian Roth 2020-06-19 09:36:54 +02:00
parent b675c4c706
commit da060bfb90

View File

@ -0,0 +1,31 @@
title: Ke3chang Registry Key Modifications
id: 7b544661-69fc-419f-9a59-82ccc328f205
status: experimental
description: Detects Registry modifcations performaed by Ke3chang malware in campaigns running in 2019 and 2020
references:
- https://www.verfassungsschutz.de/embed/broschuere-2020-06-bfv-cyber-brief-2020-01.pdf
- https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/
tags:
- attack.g0004
- attack.t1059
- attack.t1089
author: Markus Neis, Swisscom
date: 2020/06/18
logsource:
category: process_creation
product: windows
detection:
selection1:
# Ke3chang and TidePool both modify the IEHarden registry key, as well as the following list of keys.
# Setting these registry keys is unique to the Ke3chang and TidePool malware families.
# HKCU\Software\Microsoft\Internet Explorer\Main\Check_Associations
# HKCU\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize
# HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IEharden
CommandLine|contains:
- '-Property DWORD -name DisableFirstRunCustomize -value 2 -Force'
- '-Property String -name Check_Associations -value'
- '-Property DWORD -name IEHarden -value 0 -Force'
condition: selection1
falsepositives:
- Will need to be looked for combinations of those processes
level: critical