CVE-2024-50623 Exploitation Attempt - Cleo

Detects exploitation attempt of Cleo's CVE-2024-50623 by looking for a "cmd.exe" process spawning from the Celo software suite with suspicious Powershell commandline.

Sigma rule (View on GitHub)

 1title: CVE-2024-50623 Exploitation Attempt - Cleo
 2id: f007b877-02e3-45b7-8501-1b78c2864029
 3status: experimental
 4description: |
 5        Detects exploitation attempt of Cleo's CVE-2024-50623 by looking for a "cmd.exe" process spawning from the Celo software suite with suspicious Powershell commandline.
 6references:
 7    - https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
 8author: Tanner Filip, Austin Worline, Chad Hudson, Matt Anderson
 9date: 2024-12-09
10tags:
11    - attack.execution
12    - attack.t1190
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection:
18        ParentImage|endswith: '\javaw.exe'
19        ParentCommandLine|contains:
20            - 'Harmony'
21            - 'lexicom'
22            - 'VersaLex'
23            - 'VLTrader'
24        Image|endswith: '\cmd.exe'
25        CommandLine|contains:
26            - 'powershell'
27            - ' -enc '
28            - ' -EncodedCommand'
29            - '.Download'
30    condition: selection
31falsepositives:
32    - Unlikely
33level: high

References

Related rules

to-top