Files
hayabusa/rules/sigma/process_creation/win_susp_vboxdrvinst.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

40 lines
1.1 KiB
YAML

title: Suspicious VBoxDrvInst.exe Parameters
author: Konstantin Grishchenko, oscd.community
date: 2020/10/06
description: Detect VBoxDrvInst.exe run with parameters allowing processing INF file.
This allows to create values in the registry and install drivers. For example one
could use this technique to obtain persistence via modifying one of Run or RunOnce
registry keys
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\VBoxDrvInst.exe'
SELECTION_3:
CommandLine: '*driver*'
SELECTION_4:
CommandLine: '*executeinf*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Legitimate use of VBoxDrvInst.exe utility by VirtualBox Guest Additions installation
process
fields:
- ComputerName
- User
- CommandLine
- ParentCommandLine
id: b7b19cb6-9b32-4fc4-a108-73f19acfe262
level: medium
logsource:
category: process_creation
product: windows
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OtherBinaries/VBoxDrvInst.yml
- https://twitter.com/pabraeken/status/993497996179492864
status: experimental
tags:
- attack.defense_evasion
- attack.t1112
ruletype: SIGMA