Lace Tempest Malware Loader Execution

Detects execution of a specific binary based on filename and hash used by Lace Tempest to load additional malware as reported by SysAid Team

Sigma rule (View on GitHub)

 1title: Lace Tempest Malware Loader Execution
 2id: 745ea50b-9673-4ba7-9426-cb45cf4a8e6d
 3status: experimental
 4description: Detects execution of a specific binary based on filename and hash used by Lace Tempest to load additional malware as reported by SysAid Team
 5references:
 6    - https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023/11/09
 9tags:
10    - attack.execution
11    - detection.emerging_threats
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection_img:
17        Image|endswith: ':\Program Files\SysAidServer\tomcat\webapps\usersfiles\user.exe'
18    selection_hash:
19        Hashes|contains: 'SHA256=B5ACF14CDAC40BE590318DEE95425D0746E85B1B7B1CBD14DA66F21F2522BF4D'
20    condition: 1 of selection_*
21falsepositives:
22    - Unlikely
23level: high

References

Related rules

to-top