forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Added and updatd pikabot related rules
- Loading branch information
1 parent
3fb5392
commit 4dc022f
Showing
4 changed files
with
86 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
37 changes: 37 additions & 0 deletions
37
rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
title: Potential Pikabot Discovery Activity | ||
id: 84d70ab3-ba9f-420f-9b9c-c148760ac61f | ||
status: experimental | ||
description: Detects the system discovery activity carried out by Pikabot, after injecting it into legitimitate process such as searchfilterhost.exe. | ||
references: | ||
- https://tria.ge/231023-lpw85she57/behavioral2 | ||
- https://tria.ge/231211-yqc8wahea6/behavioral2 | ||
- https://tria.ge/231206-w5gthabf23/behavioral2 | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2024/01/16 | ||
tags: | ||
- attack.discovery | ||
- attack.t1016 | ||
- attack.t1049 | ||
- attack.t1087 | ||
- detection.emerging_threats | ||
detection: | ||
selection_1: | ||
Image|endswith: | ||
- '\SearchProtocolHost.exe' | ||
- '\SearchFilterHost.exe' | ||
CommandLine: | ||
- 'ipconfig.exe /all' | ||
- 'netstat.exe -aon' | ||
- 'whoami.exe /all' | ||
selection_2: | ||
Image|endswith: | ||
- '\ipconfig.exe' | ||
- '\netstat.exe' | ||
- '\whoami.exe' | ||
ParentImage|endswith: | ||
- '\SearchProtocolHost.exe' | ||
- '\SearchFilterHost.exe' | ||
condition: 1 of selection_* | ||
falsepositives: | ||
- Unlikely | ||
level: Critical |
45 changes: 45 additions & 0 deletions
45
...ng-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_execution.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
title: Suspicious Rundll32 Pikabot's Fake DLL Extension Execution | ||
id: 1bf0ba65-9a39-42a2-9271-31d31bf2f0bf | ||
status: experimental | ||
description: Detect specific process tree behavior linked to "rundll32" executions, wherein the associated DLL lacks the ".dll" extension, often signaling potential Pikabot activity. | ||
references: | ||
- https://github.com/pr0xylife/Pikabot | ||
- https://tria.ge/231004-tp8k6sch9t/behavioral2 | ||
- https://tria.ge/231206-w5gthabf23/behavioral2 | ||
- https://www.virustotal.com/gui/file/56db0c4842a63234ab7fe2dda6eeb63aa7bb68f9a456985b519122f74dea37e2/behavior | ||
- https://tria.ge/231212-r1bpgaefar/behavioral2 | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2024/01/16 | ||
tags: | ||
- detection.emerging_threats | ||
- attack.defense_evasion | ||
- attack.execution | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
selection_parent_image: | ||
ParentImage|endswith: | ||
- '\cmd.exe' | ||
- '\cscript.exe' | ||
- '\curl.exe' | ||
- '\mshta.exe' | ||
- '\powershell.exe' | ||
- '\pwsh.exe' | ||
- '\wscript.exe' | ||
- '\msiexec.exe' | ||
- '\rundll32.exe' | ||
selection_image_and_cmd: | ||
Image|endswith: '\rundll32.exe' | ||
CommandLine|contains: | ||
- '\Windows\Installer\' | ||
- ':\ProgramData\' | ||
- ':\Users\Public\' | ||
- '\AppData\Local\Temp\' | ||
- '\AppData\Roaming\' | ||
filter_dll_extension: | ||
CommandLine|contains: '.dll' | ||
condition: all of selection_* and not filter_dll_extension | ||
falsepositives: | ||
- Unlikely | ||
level: high |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters