title: Dridex Process Pattern author: Florian Roth, oscd.community date: 2019/01/10 description: Detects typical Dridex process patterns detection: SELECTION_1: EventID: 1 SELECTION_10: CommandLine: '*view*' SELECTION_2: Image: '*\svchost.exe' SELECTION_3: CommandLine: '*C:\Users\\*' SELECTION_4: CommandLine: '*\Desktop\\*' SELECTION_5: ParentImage: '*\svchost.exe' SELECTION_6: EventID: 1 SELECTION_7: Image: '*\whoami.exe' SELECTION_8: CommandLine: '*all*' SELECTION_9: Image: - '*\net.exe' - '*\net1.exe' condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3 and SELECTION_4) or (SELECTION_5 and SELECTION_6 and ((SELECTION_7 and SELECTION_8) or (SELECTION_9 and SELECTION_10))))) falsepositives: - Unlikely id: e6eb5a96-9e6f-4a18-9cdd-642cfda21c8e level: critical logsource: category: process_creation product: windows modified: 2020/09/01 references: - https://app.any.run/tasks/993daa5e-112a-4ff6-8b5a-edbcec7c7ba3 status: experimental tags: - attack.defense_evasion - attack.privilege_escalation - attack.t1055 - attack.discovery - attack.t1135 - attack.t1033 ruletype: SIGMA