Potential KamiKakaBot Activity - Lure Document Execution

Detects the execution of a Word document via the WinWord Start Menu shortcut. This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.

Sigma rule (View on GitHub)

 1title: Potential KamiKakaBot Activity - Lure Document Execution
 2id: 24474469-bd80-46cc-9e08-9fbe81bfaaca
 3status: experimental
 4description: |
 5    Detects the execution of a Word document via the WinWord Start Menu shortcut.
 6    This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.    
 7references:
 8    - https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
 9author: Nasreddine Bencherchali (Nextron Systems), X__Junior (Nextron Systems)
10date: 2024/03/22
11tags:
12    - attack.execution
13    - attack.t1059
14    - detection.emerging_threats
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        Image|endswith: '\cmd.exe'
21        CommandLine|contains|all:
22            - '/c '
23            - '.lnk ~'
24            - 'Start Menu\Programs\Word'
25        CommandLine|endswith: '.doc'
26    condition: selection
27falsepositives:
28    - Unknown
29level: medium

References

Related rules

to-top