SigmaHQ/rules/apt/apt_ta17_293a_ps.yml

20 lines
581 B
YAML
Executable File

title: Ps.exe Renamed SysInternals Tool
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documentied in TA17-293A report
references:
- https://www.us-cert.gov/ncas/alerts/TA17-293A
tags:
- attack.defense_evasion
- attack.g0035
- attack.t1036
author: Florian Roth
date: 2017/10/22
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: 'ps.exe -accepteula'
condition: selection
falsepositives:
- Renamed SysInternals tool
level: high