Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_apt_cloudhopper.yml
T

30 lines
656 B
YAML
Raw Normal View History

2018-01-27 10:57:30 +01:00
title: WMIExec VBS Script
2019-11-12 23:12:27 +01:00
id: 966e4016-627f-44f7-8341-f394905c361f
2021-11-27 11:33:14 +01:00
status: test
2017-04-07 17:41:53 +02:00
description: Detects suspicious file execution by wscript and cscript
author: Florian Roth
references:
2021-11-27 11:33:14 +01:00
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
date: 2017/04/07
modified: 2021/11/27
2017-04-07 17:41:53 +02:00
logsource:
2021-11-27 11:33:14 +01:00
category: process_creation
product: windows
2017-04-07 17:41:53 +02:00
detection:
2021-11-27 11:33:14 +01:00
selection:
Image|endswith: '\cscript.exe'
CommandLine|contains|all:
- '.vbs'
- '/shell'
condition: selection
2017-09-12 23:54:04 +02:00
fields:
2021-11-27 11:33:14 +01:00
- CommandLine
- ParentCommandLine
2017-04-07 17:41:53 +02:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Unlikely
2017-04-07 17:41:53 +02:00
level: critical
2021-11-27 11:33:14 +01:00
tags:
- attack.execution
- attack.g0045
- attack.t1059.005