Potential APT10 Cloud Hopper Activity
Detects potential process and execution activity related to APT10 Cloud Hopper operation
Sigma rule (View on GitHub)
1title: Potential APT10 Cloud Hopper Activity
2id: 966e4016-627f-44f7-8341-f394905c361f
3status: test
4description: Detects potential process and execution activity related to APT10 Cloud Hopper operation
5references:
6 - https://web.archive.org/web/20180725233601/https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
7author: Florian Roth (Nextron Systems)
8date: 2017-04-07
9modified: 2023-03-08
10tags:
11 - attack.execution
12 - attack.g0045
13 - attack.t1059.005
14 - detection.emerging-threats
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_cscript:
20 Image|endswith: '\cscript.exe'
21 CommandLine|contains: '.vbs /shell '
22 selection_csvde:
23 CommandLine|contains|all:
24 - 'csvde -f C:\windows\web\'
25 - '.log'
26 condition: 1 of selection_*
27falsepositives:
28 - Unlikely
29level: high
References
Related rules
- Adwind RAT / JRAT
- Potential QBot Activity
- APT29 2018 Phishing Campaign CommandLine Indicators
- Adwind RAT / JRAT File Artifact
- Blue Mockingbird