Small Sieve Malware CommandLine Indicator

Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.

Sigma rule (View on GitHub)

 1title: Small Sieve Malware CommandLine Indicator
 2id: 21117127-21c8-437a-ae03-4b51e5a8a088
 3status: test
 4description: Detects specific command line argument being passed to a binary as seen being used by the malware Small Sieve.
 5references:
 6    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/small-sieve/NCSC-MAR-Small-Sieve.pdf
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023/05/19
 9tags:
10    - attack.persistence
11    - attack.t1574.001
12    - detection.emerging_threats
13logsource:
14    product: windows
15    category: process_creation
16detection:
17    selection:
18        CommandLine|endswith: '.exe Platypus'
19    condition: selection
20falsepositives:
21    - Unlikely
22level: high

References

Related rules

to-top