020fc8061f
chore: Upgrade status level from `experimental` to `test` for rules that have not changed in 300 days --------- Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com> Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
26 lines
923 B
YAML
26 lines
923 B
YAML
title: Finger.exe Suspicious Invocation
|
|
id: af491bca-e752-4b44-9c86-df5680533dbc
|
|
status: test
|
|
description: Detects suspicious aged finger.exe tool execution often used in malware attacks nowadays
|
|
references:
|
|
- https://twitter.com/bigmacjpg/status/1349727699863011328?s=12
|
|
- https://app.any.run/tasks/40115012-a919-4208-bfed-41e82cb3dadf/
|
|
- http://hyp3rlinx.altervista.org/advisories/Windows_TCPIP_Finger_Command_C2_Channel_and_Bypassing_Security_Software.txt
|
|
author: Florian Roth (Nextron Systems), omkar72, oscd.community
|
|
date: 2021/02/24
|
|
modified: 2022/08/16
|
|
tags:
|
|
- attack.command_and_control
|
|
- attack.t1105
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
- OriginalFileName: 'finger.exe'
|
|
- Image|endswith: '\finger.exe'
|
|
condition: selection
|
|
falsepositives:
|
|
- Admin activity (unclear what they do nowadays with finger.exe)
|
|
level: high
|