Potential EmpireMonkey Activity

Detects potential EmpireMonkey APT activity

Sigma rule (View on GitHub)

 1title: Potential EmpireMonkey Activity
 2id: 10152a7b-b566-438f-a33c-390b607d1c8d
 3status: test
 4description: Detects potential EmpireMonkey APT activity
 5references:
 6    - https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/
 7    - https://malpedia.caad.fkie.fraunhofer.de/actor/anthropoid_spider
 8author: Markus Neis, Nasreddine Bencherchali (Nextron Systems)
 9date: 2019/04/02
10modified: 2023/03/09
11tags:
12    - attack.defense_evasion
13    - attack.t1218.010
14    - detection.emerging_threats
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        CommandLine|contains|all:
21            - '/e:jscript' # This is a guess since the report doesn't mention the method of execution. This assumes that it is achieved via specifying the execution engine
22            - '\Local\Temp\Errors.bat'
23    condition: selection
24falsepositives:
25    - Unlikely
26level: high

References

Related rules

to-top