Formbook Process Creation
Detects Formbook like process executions that inject code into a set of files in the System32 folder, which executes a special command command line to delete the dropper from the AppData Temp folder. We avoid false positives by excluding all parent process with command line parameters.
Sigma rule (View on GitHub)
1title: Formbook Process Creation
2id: 032f5fb3-d959-41a5-9263-4173c802dc2b
3status: test
4description: Detects Formbook like process executions that inject code into a set of files in the System32 folder, which executes a special command command line to delete the dropper from the AppData Temp folder. We avoid false positives by excluding all parent process with command line parameters.
5references:
6 - https://inquest.net/blog/2018/06/22/a-look-at-formbook-stealer
7 - https://app.any.run/tasks/388d5802-aa48-4826-b069-250420504758/
8 - https://app.any.run/tasks/8e22486b-5edc-4cef-821c-373e945f296c/
9 - https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/
10author: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
11date: 2019-09-30
12modified: 2022-10-06
13tags:
14 - attack.resource-development
15 - attack.t1587.001
16 - detection.emerging-threats
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection1:
22 # Parent command line should not contain a space value
23 # This avoids false positives not caused by process injection
24 # e.g. wscript.exe /B sysmon-install.vbs
25 ParentCommandLine|startswith:
26 - 'C:\Windows\System32\'
27 - 'C:\Windows\SysWOW64\'
28 ParentCommandLine|endswith: '.exe'
29 selection2:
30 - CommandLine|contains|all:
31 - '/c'
32 - 'del'
33 - 'C:\Users\'
34 - '\AppData\Local\Temp\'
35 - CommandLine|contains|all:
36 - '/c'
37 - 'del'
38 - 'C:\Users\'
39 - '\Desktop\'
40 - CommandLine|contains|all:
41 - '/C'
42 - 'type nul >'
43 - 'C:\Users\'
44 - '\Desktop\'
45 selection3:
46 CommandLine|endswith: '.exe'
47 condition: all of selection*
48fields:
49 - CommandLine
50 - ParentCommandLine
51falsepositives:
52 - Unknown
53level: high
References
Related rules
- Conti Volume Shadow Listing
- Mustang Panda Dropper
- FoggyWeb Backdoor DLL Loading
- PUA - CsExec Execution
- Potential Privilege Escalation To LOCAL SYSTEM