Files
hayabusa/rules/sigma/process_creation/win_malware_formbook.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

65 lines
1.9 KiB
YAML

title: Formbook Process Creation
author: Florian Roth, oscd.community, Jonhnathan Ribeiro
date: 2019/09/30
description: Detects Formbook like process executions that inject code into a set
of files in the System32 folder, which executes a special command command line to
delete the dropper from the AppData Temp folder. We avoid false positives by excluding
all parent process with command line parameters.
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
CommandLine: '*\Desktop\\*'
SELECTION_11:
CommandLine: '*/C*'
SELECTION_12:
CommandLine: '*type nul >*'
SELECTION_13:
CommandLine: '*\Desktop\\*'
SELECTION_14:
CommandLine: '*.exe'
SELECTION_2:
ParentCommandLine:
- C:\Windows\System32\\*
- C:\Windows\SysWOW64\\*
SELECTION_3:
ParentCommandLine:
- '*.exe'
SELECTION_4:
CommandLine: '*C:\Users\\*'
SELECTION_5:
CommandLine: '*/c*'
SELECTION_6:
CommandLine: '*del*'
SELECTION_7:
CommandLine: '*\AppData\Local\Temp\\*'
SELECTION_8:
CommandLine: '*/c*'
SELECTION_9:
CommandLine: '*del*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and ((SELECTION_5
and SELECTION_6 and SELECTION_7) or (SELECTION_8 and SELECTION_9 and SELECTION_10)
or (SELECTION_11 and SELECTION_12 and SELECTION_13)) and SELECTION_14)
falsepositives:
- Unknown
fields:
- CommandLine
- ParentCommandLine
id: 032f5fb3-d959-41a5-9263-4173c802dc2b
level: critical
logsource:
category: process_creation
product: windows
modified: 2019/10/31
references:
- https://inquest.net/blog/2018/06/22/a-look-at-formbook-stealer
- https://app.any.run/tasks/388d5802-aa48-4826-b069-250420504758/
- https://app.any.run/tasks/8e22486b-5edc-4cef-821c-373e945f296c/
- https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/
status: experimental
tags:
- attack.develop_capabilities
- attack.t1587.001
ruletype: SIGMA