CMD Launching Batch Script Stored on External Drive (Chromeloader)
Detects instances of CMD executing a batch stored on an externally-mounted drives, in turn spawning a tar extraction process.
Sigma rule (View on GitHub)
1title: CMD Launching Batch Script Stored on External Drive (Chromeloader)
2id: 79cd4f76-2df9-42e1-a957-34fb7ee5a3cc
3status: experimental
4description: Detects instances of CMD executing a batch stored on an externally-mounted drives, in turn spawning a tar extraction process.
5references:
6 - https://blogs.vmware.com/security/2022/09/the-evolution-of-the-chromeloader-malware.html
7author: Micah Babinski
8date: 2022/11/07
9tags:
10 - attack.defense_evasion
11 - attack.t1553
12 - attack.t1553.005
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection_parent:
18 ParentImage|endswith:
19 - '\powershell.exe'
20 - '\cmd.exe'
21 ParentCommandLine|contains|windash: '/c'
22 ParentCommandLine|re: '^.*[D-Z]:\\.*\.(bat|cmdline).*$'
23 selection_child_proc:
24 Image|endswith: '\tar.exe'
25 selection_extract_options:
26 CommandLine|contains:
27 - '-xvf'
28 - '-xfv'
29 - '-vxf'
30 - '-vfx'
31 - '-fxv'
32 - '-fvx'
33 selection_output_options:
34 CommandLine|contains: '-c'
35 CommandLine|contains: 'appdata\'
36 condition: all of selection*
37falsepositives:
38 - Unknown
39level: high
References
Related rules
- Abusing PowerShell to Disable Defender Components
- Abusing PowerShell to Modify Defender Components
- Application Bypass with RunDLL32 and DllRegisterServer Function
- Base64 Encoding in CMD or Powershell
- Command Shell Obfuscated Commands