OilRig APT Activity
Detects OilRig activity as reported by Nyotron in their March 2018 report
Sigma rule (View on GitHub)
1title: OilRig APT Activity
2id: ce6e34ca-966d-41c9-8d93-5b06c8b97a06
3related:
4 - id: 53ba33fd-3a50-4468-a5ef-c583635cfa92 # System
5 type: similar
6 - id: c0580559-a6bd-4ef6-b9b7-83703d98b561 # Security
7 type: similar
8 - id: 7bdf2a7c-3acc-4091-9581-0a77dad1c5b5 # Registry
9 type: similar
10status: test
11description: Detects OilRig activity as reported by Nyotron in their March 2018 report
12references:
13 - https://web.archive.org/web/20180402134442/https://nyotron.com/wp-content/uploads/2018/03/Nyotron-OilRig-Malware-Report-March-2018C.pdf
14author: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
15date: 2018-03-23
16modified: 2023-03-08
17tags:
18 - attack.privilege-escalation
19 - attack.execution
20 - attack.persistence
21 - attack.g0049
22 - attack.t1053.005
23 - attack.s0111
24 - attack.t1543.003
25 - attack.defense-evasion
26 - attack.t1112
27 - attack.command-and-control
28 - attack.t1071.004
29 - detection.emerging-threats
30logsource:
31 category: process_creation
32 product: windows
33detection:
34 selection_schtasks:
35 CommandLine|contains|all:
36 - 'SC Scheduled Scan'
37 - '\microsoft\Taskbar\autoit3.exe'
38 selection_temp:
39 Image|contains: '\Windows\Temp\DB\'
40 Image|endswith: '.exe'
41 selection_service:
42 Image: 'C:\Windows\system32\Service.exe'
43 CommandLine|contains:
44 - 'i'
45 - 'u'
46 selection_autoit:
47 ParentImage|endswith: '\local\microsoft\Taskbar\autoit3.exe'
48 CommandLine|contains|all:
49 - 'nslookup.exe'
50 - '-q=TXT'
51 condition: 1 of selection_*
52falsepositives:
53 - Unlikely
54level: critical
References
Related rules
- OilRig APT Registry Persistence
- OilRig APT Schedule Task Persistence - Security
- OilRig APT Schedule Task Persistence - System
- Defrag Deactivation
- Operation Wocao Activity