Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_malware_ryuk.yml
T

28 lines
613 B
YAML
Raw Normal View History

2019-12-16 20:33:12 +01:00
title: Ryuk Ransomware
id: c37510b8-2107-4b78-aa32-72f251e7a844
2021-11-27 11:33:14 +01:00
status: test
2019-12-16 20:33:12 +01:00
description: Detects Ryuk ransomware activity
author: Florian Roth
references:
2021-11-27 11:33:14 +01:00
- https://app.any.run/tasks/d860402c-3ff4-4c1f-b367-0237da714ed1/
date: 2019/12/16
modified: 2021/11/27
2019-12-16 20:33:12 +01:00
logsource:
2021-11-27 11:33:14 +01:00
category: process_creation
product: windows
2019-12-16 20:33:12 +01:00
detection:
2021-11-27 11:33:14 +01:00
selection:
CommandLine|contains|all:
- 'Microsoft\Windows\CurrentVersion\Run'
- 'C:\users\Public\'
condition: selection
2019-12-16 20:33:12 +01:00
fields:
2021-11-27 11:33:14 +01:00
- CommandLine
- ParentCommandLine
2019-12-16 20:33:12 +01:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Unlikely
2019-12-16 20:33:12 +01:00
level: critical
2021-11-27 11:33:14 +01:00
tags:
- attack.persistence
- attack.t1547.001