UNC2452 PowerShell Pattern

Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports

Sigma rule (View on GitHub)

 1title: UNC2452 PowerShell Pattern
 2id: b7155193-8a81-4d8f-805d-88de864ca50c
 3status: test
 4description: Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports
 5references:
 6    - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-raindrop-malware
 7    - https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
 8    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md#atomic-test-7---create-a-process-using-wmi-query-and-an-encoded-command
 9author: Florian Roth (Nextron Systems)
10date: 2021/01/20
11modified: 2022/10/09
12tags:
13    - attack.execution
14    - attack.t1059.001
15    - attack.t1047
16    - detection.emerging_threats
17    # - sunburst
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection_cli_1:
23        CommandLine|contains|all:
24            - 'Invoke-WMIMethod win32_process -name create -argumentlist'
25            - 'rundll32 c:\windows'
26    selection_cli_2:
27        CommandLine|contains|all:
28            - 'wmic /node:'
29            - 'process call create "rundll32 c:\windows'
30    condition: 1 of selection_*
31falsepositives:
32    - Unlikely
33level: critical

References

Related rules

to-top