Files
blue-team-tools/rules/windows/image_load/sysmon_susp_python_image_load.yml
T

31 lines
860 B
YAML
Raw Normal View History

title: Python Py2Exe Image Load
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
description: Detects the image load of Python Core indicative of a Python script bundled with Py2Exe.
status: experimental
date: 2020/05/03
2021-12-05 11:21:40 +01:00
modified: 2021/12/05
author: Patrick St. John, OTR (Open Threat Research)
tags:
- attack.defense_evasion
2020-10-12 21:58:02 -04:00
- attack.t1027.002
references:
- https://www.py2exe.org/
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
logsource:
product: windows
2021-05-12 08:59:51 +02:00
category: image_load
detection:
selection:
Description: 'Python Core'
2021-12-03 19:02:24 +01:00
filter:
2021-12-05 11:21:40 +01:00
- Image|contains:
- 'Python' # FPs with python38.dll, python.exe etc.
- Image|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
2021-12-03 19:02:24 +01:00
condition: selection and not filter
fields:
- Description
falsepositives:
- Legit Py2Exe Binaries
level: medium