Small Sieve Malware CommandLine Indicator

Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.

Sigma rule (View on GitHub)

 1title: Small Sieve Malware CommandLine Indicator
 2id: 21117127-21c8-437a-ae03-4b51e5a8a088
 3status: test
 4description: Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.
 5references:
 6    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/small-sieve/NCSC-MAR-Small-Sieve.pdf
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023-05-19
 9tags:
10    - attack.privilege-escalation
11    - attack.defense-evasion
12    - attack.persistence
13    - attack.t1574.001
14    - detection.emerging-threats
15logsource:
16    product: windows
17    category: process_creation
18detection:
19    selection:
20        CommandLine|endswith: '.exe Platypus'
21    condition: selection
22falsepositives:
23    - Unlikely
24level: high

References

Related rules

to-top