SigmaHQ/rules/windows/process_creation/win_malware_ryuk.yml

29 lines
690 B
YAML

title: Ryuk Ransomware
id: c37510b8-2107-4b78-aa32-72f251e7a844
status: experimental
description: Detects Ryuk ransomware activity
author: Florian Roth
date: 2019/12/16
modified: 2020/09/01
tags:
- attack.persistence
- attack.t1547.001
- attack.t1060 # an old one
references:
- https://app.any.run/tasks/d860402c-3ff4-4c1f-b367-0237da714ed1/
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'Microsoft\Windows\CurrentVersion\Run'
- 'C:\users\Public\'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: critical