Winnti Malware HK University Campaign
Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities
Sigma rule (View on GitHub)
 1title: Winnti Malware HK University Campaign
 2id: 3121461b-5aa0-4a41-b910-66d25524edbb
 3status: test
 4description: Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities
 5references:
 6    - https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/
 7author: Florian Roth (Nextron Systems), Markus Neis
 8date: 2020-02-01
 9modified: 2021-11-27
10tags:
11    - attack.privilege-escalation
12    - attack.persistence
13    - attack.defense-evasion
14    - attack.t1574.001
15    - attack.g0044
16    - detection.emerging-threats
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection1:
22        ParentImage|contains:
23            - 'C:\Windows\Temp'
24            - '\hpqhvind.exe'
25        Image|startswith: 'C:\ProgramData\DRM'
26    selection2:
27        ParentImage|startswith: 'C:\ProgramData\DRM'
28        Image|endswith: '\wmplayer.exe'
29    selection3:
30        ParentImage|endswith: '\Test.exe'
31        Image|endswith: '\wmplayer.exe'
32    selection4:
33        Image: 'C:\ProgramData\DRM\CLR\CLR.exe'
34    selection5:
35        ParentImage|startswith: 'C:\ProgramData\DRM\Windows'
36        Image|endswith: '\SearchFilterHost.exe'
37    condition: 1 of selection*
38falsepositives:
39    - Unlikely
40level: critical
References
Related rules
- Winnti Pipemon Characteristics
- APT27 - Emissary Panda Activity
- DLL Names Used By SVR For GraphicalProton Backdoor
- Diamond Sleet APT DLL Sideloading Indicators
- Lazarus APT DLL Sideloading Activity
