title: Droppers Exploiting CVE-2017-11882 author: Florian Roth date: 2017/11/23 description: Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe detection: SELECTION_1: EventID: 1 SELECTION_2: ParentImage: '*\EQNEDT32.EXE' condition: (SELECTION_1 and SELECTION_2) falsepositives: - unknown fields: - CommandLine id: 678eb5f4-8597-4be6-8be7-905e4234b53a level: critical logsource: category: process_creation product: windows modified: 2020/08/29 references: - https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100 - https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw status: experimental tags: - attack.execution - attack.t1203 - attack.t1204.002 - attack.t1204 - attack.initial_access - attack.t1566.001 - attack.t1193 yml_filename: win_exploit_cve_2017_11882.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation