37 lines
1.1 KiB
YAML
37 lines
1.1 KiB
YAML
title: Droppers Exploiting CVE-2017-11882
|
|
author: Florian Roth
|
|
date: 2017/11/23
|
|
description: Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other
|
|
sub processes like mshta.exe
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 1
|
|
SELECTION_2:
|
|
ParentImage: '*\EQNEDT32.EXE'
|
|
condition: (SELECTION_1 and SELECTION_2)
|
|
falsepositives:
|
|
- unknown
|
|
fields:
|
|
- CommandLine
|
|
id: 678eb5f4-8597-4be6-8be7-905e4234b53a
|
|
level: critical
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
modified: 2020/08/29
|
|
references:
|
|
- https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100
|
|
- https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw
|
|
status: experimental
|
|
tags:
|
|
- attack.execution
|
|
- attack.t1203
|
|
- attack.t1204.002
|
|
- attack.t1204
|
|
- attack.initial_access
|
|
- attack.t1566.001
|
|
- attack.t1193
|
|
yml_filename: win_exploit_cve_2017_11882.yml
|
|
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation
|
|
|