Files
hayabusa/rules/Sigma/win_exploit_cve_2017_0261.yml
2021-11-14 11:00:56 +09:00

37 lines
1.0 KiB
YAML

title: Exploit for CVE-2017-0261
author: Florian Roth
date: 2018/02/22
description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits
for CVE-2017-0261 and CVE-2017-0262
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
ParentImage: '*\WINWORD.EXE'
SELECTION_3:
Image: '*\FLTLDR.exe*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Several false positives identified, check for suspicious file names or locations
(e.g. Temp folders)
id: 864403a1-36c9-40a2-a982-4c9a45f7d833
level: medium
logsource:
category: process_creation
product: windows
modified: 2020/08/29
references:
- https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html
status: experimental
tags:
- attack.execution
- attack.t1203
- attack.t1204.002
- attack.t1204
- attack.initial_access
- attack.t1566.001
- attack.t1193
yml_filename: win_exploit_cve_2017_0261.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation