From e7c6794ecd6cfd9bd5c96ffabc2ec9a1f3093726 Mon Sep 17 00:00:00 2001 From: Florian Roth Date: Mon, 12 Oct 2020 09:18:30 +0200 Subject: [PATCH] rule: suspicious wmic process call create + rundll32 --- .../win_susp_wmic_proc_create_rundll32.yml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 rules/windows/process_creation/win_susp_wmic_proc_create_rundll32.yml diff --git a/rules/windows/process_creation/win_susp_wmic_proc_create_rundll32.yml b/rules/windows/process_creation/win_susp_wmic_proc_create_rundll32.yml new file mode 100644 index 00000000000..72ee04d1a89 --- /dev/null +++ b/rules/windows/process_creation/win_susp_wmic_proc_create_rundll32.yml @@ -0,0 +1,26 @@ +title: Suspicious WMI Execution using Rundll32 +id: 3c89a1e8-0fba-449e-8f1b-8409d6267ec8 +status: experimental +description: Detects WMI executing rundll32 +references: + - https://thedfirreport.com/2020/10/08/ryuks-return/ +author: Florian Roth +date: 2020/10/12 +logsource: + category: process_creation + product: windows +detection: + selection: + CommandLine|contains|all: + - 'process call create' + - 'rundll32' + condition: selection +fields: + - CommandLine + - ParentCommandLine +tags: + - attack.execution + - attack.t1047 +falsepositives: + - Unknown +level: high