SigmaHQ/rules/windows/process_creation/win_exploit_cve_2017_11882.yml
Thomas Patzke 7602309138 Increased indentation to 4
* Converted (to generic sigma) rules
* Converter outputs by default with indentation 4
2019-03-02 00:14:20 +01:00

21 lines
779 B
YAML

title: Droppers exploiting CVE-2017-11882
status: experimental
description: Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe
references:
- https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100
- https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw
author: Florian Roth
date: 2017/11/23
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\EQNEDT32.EXE'
condition: selection
fields:
- CommandLine
falsepositives:
- unknown
level: critical