title: Exploit for CVE-2017-8759 author: Florian Roth date: 2017/09/15 description: Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759 detection: SELECTION_1: EventID: 1 SELECTION_2: ParentImage: '*\WINWORD.EXE' SELECTION_3: Image: '*\csc.exe' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - Unknown id: fdd84c68-a1f6-47c9-9477-920584f94905 level: critical logsource: category: process_creation product: windows modified: 2020/08/29 references: - https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100 - https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100 tags: - attack.execution - attack.t1203 - attack.t1204.002 - attack.t1204 - attack.initial_access - attack.t1566.001 - attack.t1193 yml_filename: win_exploit_cve_2017_8759.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation