Potential BearLPE Exploitation
Detects potential exploitation of the BearLPE exploit using Task Scheduler ".job" import arbitrary DACL write\par
Sigma rule (View on GitHub)
1title: Potential BearLPE Exploitation
2id: 931b6802-d6a6-4267-9ffa-526f57f22aaf
3status: test
4description: Detects potential exploitation of the BearLPE exploit using Task Scheduler ".job" import arbitrary DACL write\par
5references:
6 - https://github.com/djhohnstein/polarbearrepo/blob/f26d3e008093cc5c835e92a7165170baf6713d43/bearlpe/polarbear/polarbear/exploit.cpp
7author: Olaf Hartong
8date: 2019-05-22
9modified: 2023-01-26
10tags:
11 - attack.persistence
12 - attack.execution
13 - attack.privilege-escalation
14 - attack.t1053.005
15 - car.2013-08-001
16 - detection.emerging-threats
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection_img:
22 - Image|endswith: '\schtasks.exe'
23 - OriginalFileName: 'schtasks.exe'
24 selection_cli:
25 CommandLine|contains|all:
26 - '/change'
27 - '/TN'
28 - '/RU'
29 - '/RP'
30 condition: all of selection*
31falsepositives:
32 - Unknown
33level: high
References
Related rules
- ChromeLoader Malware Execution
- Defrag Deactivation
- Kapeka Backdoor Persistence Activity
- OilRig APT Activity
- OilRig APT Registry Persistence