SigmaHQ/rules/windows/process_creation/win_apt_unc2452_cmds.yml
2021-01-22 09:18:11 +01:00

47 lines
1.5 KiB
YAML

title: UNC2452 Process Creation Patterns
id: 9be34ad0-b6a7-4fbd-91cf-fc7ec1047f5f
description: Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries
status: experimental
references:
- https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
tags:
- attack.execution
- attack.t1059.001
- sunburst
- unc2452
author: Florian Roth
date: 2021/01/22
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- '7z.exe a -v500m -mx9 -r0 -p'
selection2:
ParentCommandLine|contains|all:
- 'wscript.exe'
- '.vbs'
CommandLine|contains|all:
- 'rundll32.exe'
- 'C:\Windows'
- '.dll,Tk_'
selection3:
ParentImage|endswith: '\rundll32.exe'
ParentCommandLine|contains: 'C:\Windows'
CommandLine|contains: 'cmd.exe /C '
selection4:
CommandLine|contains|all:
- 'rundll32 c:\windows\\'
- '.dll '
specific1:
ParentImage|endswith: '\rundll32.exe'
Image|endswith: '\dllhost.exe'
filter1:
CommandLine:
- ' '
- ''
condition: selection1 or selection2 or selection3 or selection4 or ( specific1 and not filter1 )
falsepositives:
- Unknown
level: critical