598d29f811
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
24 lines
674 B
YAML
24 lines
674 B
YAML
title: Renamed Gpg.EXE Execution
|
|
id: ec0722a3-eb5c-4a56-8ab2-bf6f20708592
|
|
status: test
|
|
description: Detects the execution of a renamed "gpg.exe". Often used by ransomware and loaders to decrypt/encrypt data.
|
|
references:
|
|
- https://securelist.com/locked-out/68960/
|
|
author: Nasreddine Bencherchali (Nextron Systems), frack113
|
|
date: 2023-08-09
|
|
tags:
|
|
- attack.impact
|
|
- attack.t1486
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
OriginalFileName: 'gpg.exe'
|
|
filter_main_img:
|
|
Image|endswith:
|
|
- '\gpg.exe'
|
|
- '\gpg2.exe'
|
|
condition: selection and not 1 of filter_main_*
|
|
level: high
|