diff --git a/rules/windows/process_creation/win_malware_emotet.yml b/rules/windows/process_creation/win_malware_emotet.yml new file mode 100644 index 000000000..75eb62055 --- /dev/null +++ b/rules/windows/process_creation/win_malware_emotet.yml @@ -0,0 +1,22 @@ +title: Emotet Process Creation +status: experimental +description: Detects all Emotet like process executions that are not covered by the more generic rules +author: Florian Roth +date: 2019/09/30 +references: + - https://app.any.run/tasks/e13ab713-64cf-4b23-ad93-6dceaa5429ac/ + - https://app.any.run/tasks/81f3c28c-c686-425d-8a2b-a98198d244e1/ +logsource: + category: process_creation + product: windows +detection: + selection1: + CommandLine: + - '* -enco PAA*' + condition: 1 of them +fields: + - CommandLine + - ParentCommandLine +falsepositives: + - Unlikely +level: critical