Create registry_event_mal_netwire.yml

This commit is contained in:
securepeacock 2021-10-19 18:20:23 -04:00 committed by GitHub
parent 66a37298a7
commit ff439099bc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,29 @@
title: NetWire RAT Registry Key
id: 1d218616-71b0-4c40-855b-9dbe75510f7f
description: Attempts to detect registry events for common NetWire key HKCU\Software\NetWire
Note: You likely will have to change the sysmon configuration file.
Per SwiftOnSecurity "Because Sysmon runs as a service, it has no filtering ability for,
or concept of, HKCU or HKEY_CURRENT_USER. Use "contains" or "end with" to get around this limitation"
Therefore I set <TargetObject condition="contains">netwire</TargetObjecct> in my configuration.
status: experimental
references:
- https://www.fortinet.com/blog/threat-research/new-netwire-rat-variant-spread-by-phishing
- https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/
- https://unit42.paloaltonetworks.com/guloader-installing-netwire-rat/
- https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line
- https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/
tags:
- attack.defense_evasion
- attack.t1112
date: 2021/10/07
author: Christopher Peacock
level: high
logsource:
product: windows
category: registry_event
detection:
selection1:
TargetObject|contains: '\software\NetWire'
condition: selection1
falsepositives:
- No known false positives