ChromeLoader Malware Execution
Detects execution of ChromeLoader malware via a registered scheduled task
Sigma rule (View on GitHub)
 1title: ChromeLoader Malware Execution
 2id: 0a74c5a9-1b71-4475-9af2-7829d320d5c2
 3status: test
 4description: Detects execution of ChromeLoader malware via a registered scheduled task
 5references:
 6    - https://github.com/xephora/Threat-Remediation-Scripts/tree/main/Threat-Track/CS_INSTALLER
 7    - https://twitter.com/th3_protoCOL/status/1480621526764322817
 8    - https://twitter.com/Kostastsale/status/1480716528421011458
 9    - https://www.virustotal.com/gui/file/ded20df574b843aaa3c8e977c2040e1498ae17c12924a19868df5b12dee6dfdd
10author: '@kostastsale'
11date: 2022-01-10
12tags:
13    - attack.privilege-escalation
14    - attack.execution
15    - attack.persistence
16    - attack.t1053.005
17    - attack.t1059.001
18    - attack.t1176
19    - detection.emerging-threats
20logsource:
21    category: process_creation
22    product: windows
23detection:
24    selection:
25        ParentImage|endswith: '\powershell.exe'
26        ParentCommandLine|contains: '-ExecutionPolicy Bypass -WindowStyle Hidden -E JAB'
27        CommandLine|contains: '--load-extension="*\Appdata\local\chrome"'
28        Image|endswith: '\chrome.exe'
29    condition: selection
30falsepositives:
31    - Unlikely
32level: high
References
Related rules
- Operation Wocao Activity
- Operation Wocao Activity - Security
- Defrag Deactivation
- Kapeka Backdoor Persistence Activity
- OilRig APT Activity