SigmaHQ/rules/apt/apt_ta17_293a_ps.yml
2019-06-19 23:21:43 +02:00

21 lines
602 B
YAML
Executable File

title: Ps.exe Renamed SysInternals Tool
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report
references:
- https://www.us-cert.gov/ncas/alerts/TA17-293A
tags:
- attack.defense_evasion
- attack.g0035
- attack.t1036
- car.2013-05-009
author: Florian Roth
date: 2017/10/22
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: 'ps.exe -accepteula'
condition: selection
falsepositives:
- Renamed SysInternals tool
level: high