title: Exploit for CVE-2017-0261 status: experimental description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262 references: - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html author: Florian Roth date: 2018/02/22 tags: - attack.defense_evasion - attack.privilege_escalation - attack.t1055 logsource: category: process_creation product: windows detection: selection: ParentImage: '*\WINWORD.EXE' Image: '*\FLTLDR.exe*' condition: selection falsepositives: - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders) level: medium