mirror of
https://github.com/valitydev/atomic-threat-coverage.git
synced 2024-11-07 01:55:21 +00:00
148 lines
4.0 KiB
YAML
Executable File
148 lines
4.0 KiB
YAML
Executable File
title: Executable used by PlugX in Uncommon Location - Sysmon Version
|
|
status: experimental
|
|
description: Detects the execution of an executable that is typically used by PlugX for DLL side loading started from an uncommon location
|
|
references:
|
|
- 'http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/'
|
|
- 'https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/'
|
|
author: Florian Roth
|
|
date: 2017/06/12
|
|
logsource:
|
|
product: windows
|
|
service: sysmon
|
|
detection:
|
|
|
|
# CamMute
|
|
selection_cammute:
|
|
EventID: 1
|
|
Image: '*\CamMute.exe'
|
|
filter_cammute:
|
|
EventID: 1
|
|
Image: '*\Lenovo\Communication Utility\*'
|
|
|
|
# Chrome Frame Helper
|
|
selection_chrome_frame:
|
|
EventID: 1
|
|
Image: '*\chrome_frame_helper.exe'
|
|
filter_chrome_frame:
|
|
EventID: 1
|
|
Image: '*\Google\Chrome\application\*'
|
|
|
|
# Microsoft Device Emulator
|
|
selection_devemu:
|
|
EventID: 1
|
|
Image: '*\dvcemumanager.exe'
|
|
filter_devemu:
|
|
EventID: 1
|
|
Image: '*\Microsoft Device Emulator\*'
|
|
|
|
# Windows Media Player Gadget
|
|
selection_gadget:
|
|
EventID: 1
|
|
Image: '*\Gadget.exe'
|
|
filter_gadget:
|
|
EventID: 1
|
|
Image: '*\Windows Media Player\*'
|
|
|
|
# HTML Help Workshop
|
|
selection_hcc:
|
|
EventID: 1
|
|
Image: '*\hcc.exe'
|
|
filter_hcc:
|
|
EventID: 1
|
|
Image: '*\HTML Help Workshop\*'
|
|
|
|
# Hotkey Command Module for Intel Graphics Contollers
|
|
selection_hkcmd:
|
|
EventID: 1
|
|
Image: '*\hkcmd.exe'
|
|
filter_hkcmd:
|
|
EventID: 1
|
|
Image:
|
|
- '*\System32\*'
|
|
- '*\SysNative\*'
|
|
- '*\SysWowo64\*'
|
|
|
|
# McAfee component
|
|
selection_mc:
|
|
EventID: 1
|
|
Image: '*\Mc.exe'
|
|
filter_mc:
|
|
EventID: 1
|
|
Image:
|
|
- '*\Microsoft Visual Studio*'
|
|
- '*\Microsoft SDK*'
|
|
- '*\Windows Kit*'
|
|
|
|
# MsMpEng - Microsoft Malware Protection Engine
|
|
selection_msmpeng:
|
|
EventID: 1
|
|
Image: '*\MsMpEng.exe'
|
|
filter_msmpeng:
|
|
EventID: 1
|
|
Image:
|
|
- '*\Microsoft Security Client\*'
|
|
- '*\Windows Defender\*'
|
|
- '*\AntiMalware\*'
|
|
|
|
# Microsoft Security Center
|
|
selection_msseces:
|
|
EventID: 1
|
|
Image: '*\msseces.exe'
|
|
filter_msseces:
|
|
EventID: 1
|
|
Image: '*\Microsoft Security Center\*'
|
|
|
|
# Microsoft Office 2003 OInfo
|
|
selection_oinfo:
|
|
EventID: 1
|
|
Image: '*\OInfoP11.exe'
|
|
filter_oinfo:
|
|
EventID: 1
|
|
Image: '*\Common Files\Microsoft Shared\*'
|
|
|
|
# OLE View
|
|
selection_oleview:
|
|
EventID: 1
|
|
Image: '*\OleView.exe'
|
|
filter_oleview:
|
|
EventID: 1
|
|
Image:
|
|
- '*\Microsoft Visual Studio*'
|
|
- '*\Microsoft SDK*'
|
|
- '*\Windows Kit*'
|
|
- '*\Windows Resource Kit\*'
|
|
|
|
# RC
|
|
selection_rc:
|
|
EventID: 1
|
|
Image: '*\OleView.exe'
|
|
filter_rc:
|
|
EventID: 1
|
|
Image:
|
|
- '*\Microsoft Visual Studio*'
|
|
- '*\Microsoft SDK*'
|
|
- '*\Windows Kit*'
|
|
- '*\Windows Resource Kit\*'
|
|
- '*\Microsoft.NET\*'
|
|
|
|
condition: ( selection_cammute and not filter_cammute ) or
|
|
( selection_chrome_frame and not filter_chrome_frame ) or
|
|
( selection_devemu and not filter_devemu ) or
|
|
( selection_gadget and not filter_gadget ) or
|
|
( selection_hcc and not filter_hcc ) or
|
|
( selection_hkcmd and not filter_hkcmd ) or
|
|
( selection_mc and not filter_mc ) or
|
|
( selection_msmpeng and not filter_msmpeng ) or
|
|
( selection_msseces and not filter_msseces ) or
|
|
( selection_oinfo and not filter_oinfo ) or
|
|
( selection_oleview and not filter_oleview ) or
|
|
( selection_rc and not filter_rc )
|
|
fields:
|
|
- CommandLine
|
|
- ParentCommandLine
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|
|
|
|
|