From 4dc022f85a7d871d3b2ea7805cdbf6c204e215f1 Mon Sep 17 00:00:00 2001 From: Swachchhanda Shrawan Poudel Date: Tue, 16 Jan 2024 21:04:43 +0545 Subject: [PATCH] Added and updatd pikabot related rules --- ..._win_malware_pikabot_rundll32_activity.yml | 2 + ...reation_win_malware_pikabot_discovery.yaml | 37 +++++++++++++++ ...in_malware_pikabot_rundll32_execution.yaml | 45 +++++++++++++++++++ ...win_malware_pikabot_rundll32_hollowing.yml | 2 + 4 files changed, 86 insertions(+) create mode 100644 rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yaml create mode 100644 rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_execution.yaml diff --git a/rules-emerging-threats/2023/Malware/Pikabot/net_connection_win_malware_pikabot_rundll32_activity.yml b/rules-emerging-threats/2023/Malware/Pikabot/net_connection_win_malware_pikabot_rundll32_activity.yml index 7b0e2de367a..7328d47964d 100644 --- a/rules-emerging-threats/2023/Malware/Pikabot/net_connection_win_malware_pikabot_rundll32_activity.yml +++ b/rules-emerging-threats/2023/Malware/Pikabot/net_connection_win_malware_pikabot_rundll32_activity.yml @@ -6,6 +6,7 @@ description: | The malware Pikabot has been seen to use this technique to initiate C2-communication through hard-coded Windows binaries. references: - https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44 + - https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b author: Andreas Braathen (mnemonic.io) date: 2023/10/27 tags: @@ -21,6 +22,7 @@ detection: ParentImage|endswith: '\rundll32.exe' Image|endswith: # Note: Only add processes seen used by Pikabot to avoid collision with other strains of malware + - '\searchfilterhost.exe' - '\searchprotocolhost.exe' - '\sndvol.exe' - '\wermgr.exe' diff --git a/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yaml b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yaml new file mode 100644 index 00000000000..1c6f4e1b6ab --- /dev/null +++ b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yaml @@ -0,0 +1,37 @@ +title: Potential Pikabot Discovery Activity +id: 84d70ab3-ba9f-420f-9b9c-c148760ac61f +status: experimental +description: Detects the system discovery activity carried out by Pikabot, after injecting it into legitimitate process such as searchfilterhost.exe. +references: + - https://tria.ge/231023-lpw85she57/behavioral2 + - https://tria.ge/231211-yqc8wahea6/behavioral2 + - https://tria.ge/231206-w5gthabf23/behavioral2 +author: Swachchhanda Shrawan Poudel +date: 2024/01/16 +tags: + - attack.discovery + - attack.t1016 + - attack.t1049 + - attack.t1087 + - detection.emerging_threats +detection: + selection_1: + Image|endswith: + - '\SearchProtocolHost.exe' + - '\SearchFilterHost.exe' + CommandLine: + - 'ipconfig.exe /all' + - 'netstat.exe -aon' + - 'whoami.exe /all' + selection_2: + Image|endswith: + - '\ipconfig.exe' + - '\netstat.exe' + - '\whoami.exe' + ParentImage|endswith: + - '\SearchProtocolHost.exe' + - '\SearchFilterHost.exe' + condition: 1 of selection_* +falsepositives: + - Unlikely +level: Critical \ No newline at end of file diff --git a/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_execution.yaml b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_execution.yaml new file mode 100644 index 00000000000..769c3d0e513 --- /dev/null +++ b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_execution.yaml @@ -0,0 +1,45 @@ +title: Suspicious Rundll32 Pikabot's Fake DLL Extension Execution +id: 1bf0ba65-9a39-42a2-9271-31d31bf2f0bf +status: experimental +description: Detect specific process tree behavior linked to "rundll32" executions, wherein the associated DLL lacks the ".dll" extension, often signaling potential Pikabot activity. +references: + - https://github.com/pr0xylife/Pikabot + - https://tria.ge/231004-tp8k6sch9t/behavioral2 + - https://tria.ge/231206-w5gthabf23/behavioral2 + - https://www.virustotal.com/gui/file/56db0c4842a63234ab7fe2dda6eeb63aa7bb68f9a456985b519122f74dea37e2/behavior + - https://tria.ge/231212-r1bpgaefar/behavioral2 +author: Swachchhanda Shrawan Poudel +date: 2024/01/16 +tags: + - detection.emerging_threats + - attack.defense_evasion + - attack.execution +logsource: + product: windows + category: process_creation +detection: + selection_parent_image: + ParentImage|endswith: + - '\cmd.exe' + - '\cscript.exe' + - '\curl.exe' + - '\mshta.exe' + - '\powershell.exe' + - '\pwsh.exe' + - '\wscript.exe' + - '\msiexec.exe' + - '\rundll32.exe' + selection_image_and_cmd: + Image|endswith: '\rundll32.exe' + CommandLine|contains: + - '\Windows\Installer\' + - ':\ProgramData\' + - ':\Users\Public\' + - '\AppData\Local\Temp\' + - '\AppData\Roaming\' + filter_dll_extension: + CommandLine|contains: '.dll' + condition: all of selection_* and not filter_dll_extension +falsepositives: + - Unlikely +level: high \ No newline at end of file diff --git a/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing.yml b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing.yml index bf46872d9b2..a519d78dbf6 100644 --- a/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing.yml +++ b/rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing.yml @@ -6,6 +6,7 @@ description: | The malware Pikabot has been seen to use this technique for process hollowing through hard-coded Windows binaries references: - https://www.virustotal.com/gui/file/b6e8910fb9b3bb1fcddefd35ff0ed8624930d30d6977e11808c8330415685a62 + - https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b author: Andreas Braathen (mnemonic.io) date: 2023/10/27 tags: @@ -20,6 +21,7 @@ detection: ParentImage|endswith: '\rundll32.exe' Image|endswith: # Note: Only add processes seen used by Pikabot to avoid collision with other strains of malware + - '\searchfilterhost.exe' - '\searchprotocolhost.exe' - '\sndvol.exe' - '\wermgr.exe'