SigmaHQ/rules/windows/process_creation/win_apt_lazarus_session_highjack.yml
2021-04-03 00:08:55 +02:00

29 lines
876 B
YAML

title: Lazarus Session Highjacker
id: 3f7f5b0b-5b16-476c-a85f-ab477f6dd24b
description: Detects executables launched outside their default directories as used by Lazarus Group (Bluenoroff)
status: experimental
references:
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
tags:
- attack.defense_evasion
- attack.t1036 # an old one
- attack.t1036.005
author: Trent Liffick (@tliffick), Bartlomiej Czyz (@bczyz1)
date: 2020/06/03
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\msdtc.exe'
- '\gpvc.exe'
filter:
Image|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\SysWOW64\'
condition: selection and not filter
falsepositives:
- unknown
level: high