Files
hayabusa/rules/alert-rules/sigma/sysmon_susp_python_image_load.yml
2021-11-18 08:43:13 +09:00

32 lines
855 B
YAML

title: Python Py2Exe Image Load
author: Patrick St. John, OTR (Open Threat Research)
date: 2020/05/03
description: Detects the image load of Python Core indicative of a Python script bundled
with Py2Exe.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Description: Python Core
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legit Py2Exe Binaries
fields:
- Description
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
level: medium
logsource:
category: image_load
product: windows
modified: 2021/05/12
references:
- https://www.py2exe.org/
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
status: experimental
tags:
- attack.defense_evasion
- attack.t1027.002
yml_filename: sysmon_susp_python_image_load.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load