title: Exploit for CVE-2017-0261 id: 864403a1-36c9-40a2-a982-4c9a45f7d833 status: experimental description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262 references: - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html author: Florian Roth date: 2018/02/22 modified: 2020/08/29 tags: - attack.execution - attack.t1203 - attack.t1204.002 - attack.t1204 # an old one - attack.initial_access - attack.t1566.001 - attack.t1193 # an old one logsource: category: process_creation product: windows detection: selection: ParentImage|endswith: '\WINWORD.EXE' Image|contains: '\FLTLDR.exe' condition: selection falsepositives: - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders) level: medium