Files
blue-team-tools/rules/apt/apt_apt29_tor.yml
T

33 lines
1.0 KiB
YAML
Raw Normal View History

action: global
2017-03-31 19:31:13 +02:00
title: APT29 Google Update Service Install
2019-11-12 23:12:27 +01:00
id: c069f460-2b87-4010-8dcf-e45bab362624
description: This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
so the service names and executable locations used by APT29 are specific enough to be detected in log files.
references:
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
2018-07-25 09:50:01 +02:00
tags:
2019-03-13 09:25:28 +00:00
- attack.persistence
2018-07-25 09:50:01 +02:00
- attack.g0016
2019-03-13 09:25:28 +00:00
- attack.t1050
logsource:
product: windows
2019-03-04 16:44:30 +03:00
service: system
detection:
2019-03-04 16:44:30 +03:00
service_install:
EventID: 7045
ServiceName: 'Google Update'
2019-03-04 16:51:39 +03:00
timeframe: 5m
condition: service_install | near process
falsepositives:
- Unknown
level: high
---
logsource:
category: process_creation
product: windows
detection:
process:
Image:
- 'C:\Program Files(x86)\Google\GoogleService.exe'
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'