Files
hayabusa/rules/Sigma/win_exploit_cve_2017_8759.yml
2021-11-14 11:00:56 +09:00

36 lines
1.0 KiB
YAML

title: Exploit for CVE-2017-8759
author: Florian Roth
date: 2017/09/15
description: Detects Winword starting uncommon sub process csc.exe as used in exploits
for CVE-2017-8759
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
ParentImage: '*\WINWORD.EXE'
SELECTION_3:
Image: '*\csc.exe'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Unknown
id: fdd84c68-a1f6-47c9-9477-920584f94905
level: critical
logsource:
category: process_creation
product: windows
modified: 2020/08/29
references:
- https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
tags:
- attack.execution
- attack.t1203
- attack.t1204.002
- attack.t1204
- attack.initial_access
- attack.t1566.001
- attack.t1193
yml_filename: win_exploit_cve_2017_8759.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation