title: Lazarus Session Highjacker id: 3f7f5b0b-5b16-476c-a85f-ab477f6dd24b description: Detects executables launched outside their default directories as used by Lazarus Group (Bluenoroff) status: experimental references: - https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf tags: - attack.defense_evasion - attack.t1036 - attack.t1036.005 author: Trent Liffick (@tliffick) date: 2020/06/03 logsource: category: process_creation product: windows detection: selection: Image: - '*\mstdc.exe' - '*\gpvc.exe' filter: Image: - 'C:\Windows\System32\\*' - 'C:\Windows\SysWOW64\\*' condition: selection and not filter falsepositives: - unknown level: high