title: Exploit for CVE-2017-0261 author: Florian Roth date: 2018/02/22 description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262 detection: SELECTION_1: EventID: 1 SELECTION_2: ParentImage: '*\WINWORD.EXE' SELECTION_3: Image: '*\FLTLDR.exe*' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders) id: 864403a1-36c9-40a2-a982-4c9a45f7d833 level: medium logsource: category: process_creation product: windows modified: 2020/08/29 references: - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html status: experimental tags: - attack.execution - attack.t1203 - attack.t1204.002 - attack.t1204 - attack.initial_access - attack.t1566.001 - attack.t1193 yml_filename: win_exploit_cve_2017_0261.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation