mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 09:25:17 +00:00
Create registry_event_mal_netwire.yml
This commit is contained in:
parent
66a37298a7
commit
ff439099bc
29
rules/windows/malware/registry_event_mal_netwire.yml
Normal file
29
rules/windows/malware/registry_event_mal_netwire.yml
Normal file
@ -0,0 +1,29 @@
|
||||
title: NetWire RAT Registry Key
|
||||
id: 1d218616-71b0-4c40-855b-9dbe75510f7f
|
||||
description: Attempts to detect registry events for common NetWire key HKCU\Software\NetWire
|
||||
Note: You likely will have to change the sysmon configuration file.
|
||||
Per SwiftOnSecurity "Because Sysmon runs as a service, it has no filtering ability for,
|
||||
or concept of, HKCU or HKEY_CURRENT_USER. Use "contains" or "end with" to get around this limitation"
|
||||
Therefore I set <TargetObject condition="contains">netwire</TargetObjecct> in my configuration.
|
||||
status: experimental
|
||||
references:
|
||||
- https://www.fortinet.com/blog/threat-research/new-netwire-rat-variant-spread-by-phishing
|
||||
- https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/
|
||||
- https://unit42.paloaltonetworks.com/guloader-installing-netwire-rat/
|
||||
- https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line
|
||||
- https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1112
|
||||
date: 2021/10/07
|
||||
author: Christopher Peacock
|
||||
level: high
|
||||
logsource:
|
||||
product: windows
|
||||
category: registry_event
|
||||
detection:
|
||||
selection1:
|
||||
TargetObject|contains: '\software\NetWire'
|
||||
condition: selection1
|
||||
falsepositives:
|
||||
- No known false positives
|
Loading…
Reference in New Issue
Block a user