2020-10-12 18:13:13 -04:00
|
|
|
title: Python Py2Exe Image Load
|
|
|
|
|
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
|
|
|
|
|
description: Detects the image load of Python Core indicative of a Python script bundled with Py2Exe.
|
|
|
|
|
status: experimental
|
|
|
|
|
date: 2020/05/03
|
2021-12-05 11:21:40 +01:00
|
|
|
modified: 2021/12/05
|
2020-10-12 18:13:13 -04:00
|
|
|
author: Patrick St. John, OTR (Open Threat Research)
|
|
|
|
|
tags:
|
|
|
|
|
- attack.defense_evasion
|
2020-10-12 21:58:02 -04:00
|
|
|
- attack.t1027.002
|
2020-10-12 18:13:13 -04:00
|
|
|
references:
|
|
|
|
|
- https://www.py2exe.org/
|
|
|
|
|
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
|
|
|
|
|
logsource:
|
|
|
|
|
product: windows
|
2021-05-12 08:59:51 +02:00
|
|
|
category: image_load
|
2020-10-12 18:13:13 -04:00
|
|
|
detection:
|
|
|
|
|
selection:
|
|
|
|
|
Description: 'Python Core'
|
2021-12-03 19:02:24 +01:00
|
|
|
filter:
|
2021-12-05 11:21:40 +01:00
|
|
|
- Image|contains:
|
|
|
|
|
- 'Python' # FPs with python38.dll, python.exe etc.
|
|
|
|
|
- Image|startswith:
|
|
|
|
|
- 'C:\Program Files\'
|
|
|
|
|
- 'C:\Program Files (x86)\'
|
2021-12-03 19:02:24 +01:00
|
|
|
condition: selection and not filter
|
2020-10-12 18:13:13 -04:00
|
|
|
fields:
|
|
|
|
|
- Description
|
|
|
|
|
falsepositives:
|
|
|
|
|
- Legit Py2Exe Binaries
|
|
|
|
|
level: medium
|