SigmaHQ/rules/windows/process_creation/win_malware_trickbot_wermgr.yml
2020-11-26 09:54:27 +01:00

26 lines
764 B
YAML

title: Trickbot Malware Activity
id: 58bf96d9-ff5f-44bd-8dcc-1c4f79bf3a27
status: experimental
description: Detects Trickbot malware process tree pattern in which rundll32.exe is parent of wermgr.exe
references:
- https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20
- https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/
author: Florian Roth
date: 2020/11/26
tags:
- attack.execution
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\wermgr.exe'
ParentImage|endswith:
- '\rundll32.exe'
ParentCommandLine|contains:
- 'DllRegisterServer'
condition: selection
falsepositives:
- Unknown
level: critical