Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_malware_ryuk.yml
T
2022-02-22 11:16:31 +01:00

28 lines
613 B
YAML

title: Ryuk Ransomware
id: c37510b8-2107-4b78-aa32-72f251e7a844
status: test
description: Detects Ryuk ransomware activity
author: Florian Roth
references:
- https://app.any.run/tasks/d860402c-3ff4-4c1f-b367-0237da714ed1/
date: 2019/12/16
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'Microsoft\Windows\CurrentVersion\Run'
- 'C:\users\Public\'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: critical
tags:
- attack.persistence
- attack.t1547.001