Griffon Malware Attack Pattern
Detects process execution patterns related to Griffon malware as reported by Kaspersky
Sigma rule (View on GitHub)
1title: Griffon Malware Attack Pattern
2id: bcc6f179-11cd-4111-a9a6-0fab68515cf7
3status: test
4description: Detects process execution patterns related to Griffon malware as reported by Kaspersky
5references:
6 - https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-03-09
9tags:
10 - attack.execution
11 - detection.emerging-threats
12logsource:
13 category: process_creation
14 product: windows
15detection:
16 selection:
17 CommandLine|contains|all:
18 - '\local\temp\'
19 - '//b /e:jscript'
20 - '.txt'
21 condition: selection
22falsepositives:
23 - Unlikely
24level: critical
References
Related rules
- APT29 2018 Phishing Campaign CommandLine Indicators
- Adwind RAT / JRAT
- Blue Mockingbird
- CVE-2021-1675 Print Spooler Exploitation
- CVE-2021-1675 Print Spooler Exploitation IPC Access