Potential EmpireMonkey Activity
Detects potential EmpireMonkey APT activity
Sigma rule (View on GitHub)
1title: Potential EmpireMonkey Activity
2id: 10152a7b-b566-438f-a33c-390b607d1c8d
3status: test
4description: Detects potential EmpireMonkey APT activity
5references:
6 - https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/
7 - https://malpedia.caad.fkie.fraunhofer.de/actor/anthropoid_spider
8author: Markus Neis, Nasreddine Bencherchali (Nextron Systems)
9date: 2019-04-02
10modified: 2023-03-09
11tags:
12 - attack.defense-evasion
13 - attack.t1218.010
14 - detection.emerging-threats
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 CommandLine|contains|all:
21 - '/e:jscript' # This is a guess since the report doesn't mention the method of execution. This assumes that it is achieved via specifying the execution engine
22 - '\Local\Temp\Errors.bat'
23 condition: selection
24falsepositives:
25 - Unlikely
26level: high
References
Related rules
- Potential APT-C-12 BlueMushroom DLL Load Activity Via Regsvr32
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity
- APT29 2018 Phishing Campaign CommandLine Indicators
- APT29 2018 Phishing Campaign File Indicators