SigmaHQ/rules/windows/deprecated/win_susp_esentutl_activity.yml
2020-05-23 18:32:02 +02:00

30 lines
827 B
YAML

title: Suspicious Esentutl Use
id: 56a8189f-11b2-48c8-8ca7-c54b03c2fbf7
status: experimental
description: Detects flags often used with the LOLBAS Esentutl for malicious activity. It could be used in rare cases by administrators to access locked files or during maintenance.
author: Florian Roth
date: 2020/05/23
references:
- https://lolbas-project.github.io/
- https://twitter.com/chadtilbury/status/1264226341408452610
tags:
- attack.defense_evasion
- attack.execution
- attack.s0404
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- ' /vss '
- ' /y '
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: high