Skip to content

Commit

Permalink
Added and updatd pikabot related rules
Browse files Browse the repository at this point in the history
  • Loading branch information
swachchhanda000 authored and Swachchhanda Shrawan Poudel committed Jan 16, 2024
1 parent 3fb5392 commit 4dc022f
Show file tree
Hide file tree
Showing 4 changed files with 86 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ description: |
The malware Pikabot has been seen to use this technique to initiate C2-communication through hard-coded Windows binaries.
references:
- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44
- https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
author: Andreas Braathen (mnemonic.io)
date: 2023/10/27
tags:
Expand All @@ -21,6 +22,7 @@ detection:
ParentImage|endswith: '\rundll32.exe'
Image|endswith:
# Note: Only add processes seen used by Pikabot to avoid collision with other strains of malware
- '\searchfilterhost.exe'
- '\searchprotocolhost.exe'
- '\sndvol.exe'
- '\wermgr.exe'
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
title: Potential Pikabot Discovery Activity
id: 84d70ab3-ba9f-420f-9b9c-c148760ac61f
status: experimental
description: Detects the system discovery activity carried out by Pikabot, after injecting it into legitimitate process such as searchfilterhost.exe.
references:
- https://tria.ge/231023-lpw85she57/behavioral2
- https://tria.ge/231211-yqc8wahea6/behavioral2
- https://tria.ge/231206-w5gthabf23/behavioral2
author: Swachchhanda Shrawan Poudel
date: 2024/01/16
tags:
- attack.discovery
- attack.t1016
- attack.t1049
- attack.t1087
- detection.emerging_threats
detection:
selection_1:
Image|endswith:
- '\SearchProtocolHost.exe'
- '\SearchFilterHost.exe'
CommandLine:
- 'ipconfig.exe /all'
- 'netstat.exe -aon'
- 'whoami.exe /all'
selection_2:
Image|endswith:
- '\ipconfig.exe'
- '\netstat.exe'
- '\whoami.exe'
ParentImage|endswith:
- '\SearchProtocolHost.exe'
- '\SearchFilterHost.exe'
condition: 1 of selection_*
falsepositives:
- Unlikely
level: Critical
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
title: Suspicious Rundll32 Pikabot's Fake DLL Extension Execution
id: 1bf0ba65-9a39-42a2-9271-31d31bf2f0bf
status: experimental
description: Detect specific process tree behavior linked to "rundll32" executions, wherein the associated DLL lacks the ".dll" extension, often signaling potential Pikabot activity.
references:
- https://github.com/pr0xylife/Pikabot
- https://tria.ge/231004-tp8k6sch9t/behavioral2
- https://tria.ge/231206-w5gthabf23/behavioral2
- https://www.virustotal.com/gui/file/56db0c4842a63234ab7fe2dda6eeb63aa7bb68f9a456985b519122f74dea37e2/behavior
- https://tria.ge/231212-r1bpgaefar/behavioral2
author: Swachchhanda Shrawan Poudel
date: 2024/01/16
tags:
- detection.emerging_threats
- attack.defense_evasion
- attack.execution
logsource:
product: windows
category: process_creation
detection:
selection_parent_image:
ParentImage|endswith:
- '\cmd.exe'
- '\cscript.exe'
- '\curl.exe'
- '\mshta.exe'
- '\powershell.exe'
- '\pwsh.exe'
- '\wscript.exe'
- '\msiexec.exe'
- '\rundll32.exe'
selection_image_and_cmd:
Image|endswith: '\rundll32.exe'
CommandLine|contains:
- '\Windows\Installer\'
- ':\ProgramData\'
- ':\Users\Public\'
- '\AppData\Local\Temp\'
- '\AppData\Roaming\'
filter_dll_extension:
CommandLine|contains: '.dll'
condition: all of selection_* and not filter_dll_extension
falsepositives:
- Unlikely
level: high
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ description: |
The malware Pikabot has been seen to use this technique for process hollowing through hard-coded Windows binaries
references:
- https://www.virustotal.com/gui/file/b6e8910fb9b3bb1fcddefd35ff0ed8624930d30d6977e11808c8330415685a62
- https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
author: Andreas Braathen (mnemonic.io)
date: 2023/10/27
tags:
Expand All @@ -20,6 +21,7 @@ detection:
ParentImage|endswith: '\rundll32.exe'
Image|endswith:
# Note: Only add processes seen used by Pikabot to avoid collision with other strains of malware
- '\searchfilterhost.exe'
- '\searchprotocolhost.exe'
- '\sndvol.exe'
- '\wermgr.exe'
Expand Down

0 comments on commit 4dc022f

Please sign in to comment.