SigmaHQ/rules/windows/malware/win_mal_blue_mockingbird.yml
2020-05-15 12:06:34 +02:00

46 lines
1000 B
YAML

action: global
title: Blue Mockingbird
id: c3198a27-23a0-4c2c-af19-e5328d49680e
status: experimental
description: Attempts to detect system changes made by Blue Mockingbird
references:
- https://redcanary.com/blog/blue-mockingbird-cryptominer/
tags:
- attack.execution
- attack.t1112
- attack.t1047
author: Trent Liffick (@tliffick)
date: 2020/05/14
falsepositives:
- unknown
level: high
detection:
condition: 1 of them
---
logsource:
category: process_creation
product: windows
detection:
exec_selection:
Image|endswith: '\cmd.exe'
CommandLine|contains|all:
- 'sc config'
- 'wercplsupporte.dll'
---
logsource:
category: process_creation
product: windows
detection:
wmic_cmd:
Image|endswith: '\wmic.exe'
CommandLine|endswith: 'COR_PROFILER'
---
logsource:
product: windows
service: sysmon
detection:
mod_reg:
EventID: 13
TargetObject|endswith:
- '\CurrentControlSet\Services\wercplsupport\Parameters\ServiceDll'