diff --git a/rules/apt/apt_judgement_panda_gtr19.yml b/rules/apt/apt_judgement_panda_gtr19.yml new file mode 100644 index 000000000..326692100 --- /dev/null +++ b/rules/apt/apt_judgement_panda_gtr19.yml @@ -0,0 +1,46 @@ +--- +action: global +title: Judgement Panda Exfil Activity +description: 'Detects Judgement Panda activity as described in Global Threat Report 2019 by Crowdstrike' +references: + - https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/ +logsource: + product: windows +author: Florian Roth +date: 2019/02/21 +detection: + condition: selection +falsepositives: + - unknown +level: critical +--- +logsource: + product: windows + service: sysmon +detection: + selection1: + EventID: 1 + CommandLine: + - '*\ldifde.exe -f -n *' + - '*\7za.exe a 1.7z *' + - '* eprod.ldf' + - '*\aaaa\procdump64.exe*' + - '*\aaaa\netsess.exe*' + - '*\aaaa\7za.exe*' + - '*copy .\1.7z \\*' + - '*copy \\client\c$\aaaa\*' + selection2: + EventID: 1 + Image: 'C:\Users\Public\7za.exe' +--- +logsource: + product: windows + service: security + description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation' +detection: + selection: + EventID: 4688 + ProcessCommandLine: + - '*\ldifde.exe -f -n *' + - '*\7za.exe a 1.7z *' + - '* eprod.ldf'