SigmaHQ/rules/windows/process_creation/win_malware_ryuk.yml
2019-12-16 20:33:12 +01:00

24 lines
582 B
YAML

title: Ryuk Ransomware
id: c37510b8-2107-4b78-aa32-72f251e7a844
status: experimental
description: Detects Ryuk ransomware activity
author: Florian Roth
date: 2019/12/16
references:
- https://app.any.run/tasks/d860402c-3ff4-4c1f-b367-0237da714ed1/
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'Microsoft\Windows\CurrentVersion\Run'
- 'C:\users\Public\'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: critical