2017-03-04 10:38:23 +01:00
title : Malware Shellcode in Verclsid Target Process
status : experimental
2018-07-10 09:14:07 -05:00
description : Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro
2018-01-28 02:24:16 +03:00
references :
- https://twitter.com/JohnLaTwC/status/837743453039534080
2017-03-04 10:38:23 +01:00
author : John Lambert (tech), Florian Roth (rule)
date : 2017 /03/04
logsource :
2017-03-13 09:23:08 +01:00
product : windows
service : sysmon
2018-11-15 09:00:06 +03:00
definition: 'Use the following config to generate the necessary Event ID 10 Process Access events : <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
2017-03-04 10:38:23 +01:00
detection :
selection :
EventID : 10
TargetImage : '*\verclsid.exe'
GrantedAccess : '0x1FFFFF'
combination1 :
CallTrace : '*|UNKNOWN(*VBE7.DLL*'
combination2 :
2019-02-03 00:24:57 +01:00
SourceImage : '*\Microsoft Office\\*'
2017-03-04 10:38:23 +01:00
CallTrace : '*|UNKNOWN*'
2018-03-06 23:14:43 +01:00
condition : selection and 1 of combination*
2017-03-04 10:38:23 +01:00
falsepositives :
- unknown
level : high