OceanLotus Registry Activity
Detects registry keys created in OceanLotus (also known as APT32) attacks
Sigma rule (View on GitHub)
1title: OceanLotus Registry Activity
2id: 4ac5fc44-a601-4c06-955b-309df8c4e9d4
3status: test
4description: Detects registry keys created in OceanLotus (also known as APT32) attacks
5references:
6 - https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/
7 - https://github.com/eset/malware-ioc/tree/master/oceanlotus
8author: megan201296, Jonhnathan Ribeiro
9date: 2019-04-14
10modified: 2023-09-28
11tags:
12 - attack.defense-evasion
13 - attack.t1112
14 - detection.emerging-threats
15logsource:
16 category: registry_event
17 product: windows
18detection:
19 selection_clsid:
20 TargetObject|contains: '\SOFTWARE\Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
21 selection_hkcu:
22 TargetObject|contains:
23 # HKCU\SOFTWARE\Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\
24 - 'Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\'
25 # HKCU\SOFTWARE\Classes\AppX3bbba44c6cae4d9695755183472171e2\
26 - 'Classes\AppX3bbba44c6cae4d9695755183472171e2\'
27 # HKCU\SOFTWARE\Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\
28 - 'Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\'
29 - 'Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
30 selection_appx_1:
31 TargetObject|contains: '\SOFTWARE\App\'
32 selection_appx_2:
33 TargetObject|contains:
34 - 'AppXbf13d4ea2945444d8b13e2121cb6b663\'
35 - 'AppX70162486c7554f7f80f481985d67586d\'
36 - 'AppX37cc7fdccd644b4f85f4b22d5a3f105a\'
37 TargetObject|endswith:
38 - 'Application'
39 - 'DefaultIcon'
40 condition: selection_clsid or selection_hkcu or all of selection_appx_*
41falsepositives:
42 - Unknown
43level: critical
References
Related rules
- OilRig APT Activity
- OilRig APT Registry Persistence
- OilRig APT Schedule Task Persistence - Security
- OilRig APT Schedule Task Persistence - System
- Potential Raspberry Robin Registry Set Internet Settings ZoneMap