title: Emotet Process Creation id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18 status: experimental description: Detects all Emotet like process executions that are not covered by the more generic rules author: Florian Roth date: 2019/09/30 modified: 2019/10/16 references: - https://app.any.run/tasks/e13ab713-64cf-4b23-ad93-6dceaa5429ac/ - https://app.any.run/tasks/81f3c28c-c686-425d-8a2b-a98198d244e1/ - https://app.any.run/tasks/97f875e8-0e08-4328-815f-055e971ba754/ - https://app.any.run/tasks/84fc9b4a-ea2b-47b1-8aa6-9014402dfb56/ logsource: category: process_creation product: windows detection: selection: CommandLine: - '* -e* PAA*' - '*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*' # $env:userprofile - '*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*' # $env:userprofile - '*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*' # $env:userprofile - '*IgAoACcAKgAnACkAOwAkA*' # "('*');$ - '*IAKAAnACoAJwApADsAJA*' # "('*');$ - '*iACgAJwAqACcAKQA7ACQA*' # "('*');$ - '*JABGAGwAeAByAGgAYwBmAGQ*' condition: selection fields: - CommandLine - ParentCommandLine falsepositives: - Unlikely level: critical