Cicada3301 Ransomware Execution via PSExec
Detects the use of a potentially-renamed psexec to run the Cicada3301 ransomware tool.
Sigma rule (View on GitHub)
1title: Cicada3301 Ransomware Execution via PSExec
2id: 79495647-d84d-4804-9a52-5263cfdf2c63
3status: experimental
4description: |
5 Detects the use of a potentially-renamed psexec to run the Cicada3301 ransomware tool.
6references:
7 - https://engage.morphisec.com/threat-analysis-cicada3301
8author: 'Micah Babinski, Based on Morphisec report by Michael Gorelik (@smgoreli)'
9date: 2024-09-08
10tags:
11 - attack.execution
12 - attack.t1569
13 - attack.t1569.002
14 - attack.s0029
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_1:
20 - Image|endswith: '\psexec0.exe'
21 - OriginalFileName: 'psexec.c'
22 selection_2:
23 CommandLine|contains:
24 - '--key'
25 - '--path'
26 - '-p '
27 - '-s '
28 - '--no_local'
29 - '--no_net'
30 - '--no_impl'
31 - '--no_notes'
32 filter:
33 Image|endswith: '\psexec.exe'
34 condition: all of selection_* and not filter
35falsepositives:
36 - Unknown
37level: high```
References
Related rules
- Cicada Ransomware PSExec File Creation
- CSExec Service File Creation
- HackTool Service Registration or Execution
- PUA - NSudo Execution
- PUA - NirCmd Execution