SigmaHQ/rules/windows/builtin/win_suspicious_werfault_connection_outbound.yml
2021-06-14 07:33:26 +02:00

44 lines
1.3 KiB
YAML

title: Suspicious Werfault.exe Network Connection Outbound
id: e12c75f2-d09e-43f6-90e4-6a23842907af
status: experimental
description: Adversaries can migrate cobalt strike/metasploit/C2 beacons on compromised systems to legitimate werfault.exe process to avoid detection.
references:
- https://thedfirreport.com/2021/03/08/bazar-drops-the-anchor/
author: Sreeman
date: 2021/03/09
modified: 2021/06/11
tags:
- attack.command_and_control
- attack.t1571
logsource:
product: windows
category: network_connection
detection:
selection:
Image: 'werfault.exe'
filter1:
ParentImage: 'svchost.exe'
filter2:
DestinationIp:
- '104.42.151.234'
- '104.43.193.48'
- '52.255.188.83'
- '13.64.90.137'
- '168.61.161.212'
- '13.88.21.125'
- '40.88.32.150'
- '52.147.198.201'
- '52.239.207.100'
- '52.176.224.96'
- '2607:7700:0:24:0:1:287e:1894'
- '10.*'
- '192.168.*'
- '127.*'
filter3:
DestinationHostname|contains:
- '*.windowsupdate.com'
- '*.microsoft.com'
condition: selection and not ( filter1 and filter2 and filter3 )
falsepositives:
- Communication to other corporate systems that use IP addresses from public address spaces and Microsoft IP spaces
level: medium