SigmaHQ/rules/windows/process_creation/win_apt_lazarus_session_highjack.yml

29 lines
836 B
YAML

title: Lazarus Session Highjacker
id: 3f7f5b0b-5b16-476c-a85f-ab477f6dd24b
description: Detects executables launched outside their default directories as used by Lazarus Group (Bluenoroff)
status: experimental
references:
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
tags:
- attack.defense_evasion
- attack.t1036 # an old one
- attack.t1036.005
author: Trent Liffick (@tliffick)
date: 2020/06/03
logsource:
category: process_creation
product: windows
detection:
selection:
Image:
- '*\mstdc.exe'
- '*\gpvc.exe'
filter:
Image:
- 'C:\Windows\System32\\*'
- 'C:\Windows\SysWOW64\\*'
condition: selection and not filter
falsepositives:
- unknown
level: high