Potential Maze Ransomware Activity
Detects specific process characteristics of Maze ransomware word document droppers
Sigma rule (View on GitHub)
1title: Potential Maze Ransomware Activity
2id: 29fd07fc-9cfd-4331-b7fd-cc18dfa21052
3status: test
4description: Detects specific process characteristics of Maze ransomware word document droppers
5references:
6 - https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
7 - https://app.any.run/tasks/51e7185c-52d7-4efb-ac0d-e86340053473/
8 - https://app.any.run/tasks/65a79440-373a-4725-8d74-77db9f2abda4/
9author: Florian Roth (Nextron Systems)
10date: 2020-05-08
11modified: 2023-02-13
12tags:
13 - attack.execution
14 - attack.t1204.002
15 - attack.t1047
16 - attack.impact
17 - attack.t1490
18 - detection.emerging-threats
19logsource:
20 category: process_creation
21 product: windows
22detection:
23 # Dropper
24 selection1:
25 ParentImage|endswith: '\WINWORD.exe'
26 Image|endswith: '.tmp'
27 # Binary Execution
28 selection2:
29 Image|endswith: '\wmic.exe'
30 ParentImage|contains: '\Temp\'
31 CommandLine|endswith: 'shadowcopy delete'
32 # Specific Pattern
33 selection3:
34 CommandLine|endswith: 'shadowcopy delete'
35 CommandLine|contains: '\..\..\system32'
36 condition: 1 of selection*
37fields:
38 - ComputerName
39 - User
40 - Image
41falsepositives:
42 - Unlikely
43level: critical
References
Related rules
- WMI Shadow Copy Deletion
- Blue Mockingbird
- Droppers Exploiting CVE-2017-11882
- Exploit for CVE-2017-0261
- Exploit for CVE-2017-8759