title: CACTUSTORCH Remote Thread Creation author: '@SBousseaden (detection), Thomas Patzke (rule)' date: 2019/02/01 description: Detects remote thread creation from CACTUSTORCH as described in references. detection: SELECTION_1: EventID: 8 SELECTION_2: SourceImage: '*\System32\cscript.exe' SELECTION_3: SourceImage: '*\System32\wscript.exe' SELECTION_4: SourceImage: '*\System32\mshta.exe' SELECTION_5: SourceImage: '*\winword.exe' SELECTION_6: SourceImage: '*\excel.exe' SELECTION_7: TargetImage: '*\SysWOW64\\*' SELECTION_8: StartModule|re: ^$ condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5 or SELECTION_6) and SELECTION_7 and SELECTION_8) falsepositives: - unknown id: 2e4e488a-6164-4811-9ea1-f960c7359c40 level: high logsource: category: create_remote_thread product: windows modified: 2021/11/12 references: - https://twitter.com/SBousseaden/status/1090588499517079552 - https://github.com/mdsecactivebreach/CACTUSTORCH status: experimental tags: - attack.defense_evasion - attack.t1093 - attack.t1055.012 - attack.execution - attack.t1064 - attack.t1059.005 - attack.t1059.007 - attack.t1218.005 yml_filename: sysmon_cactustorch.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/create_remote_thread