Findstr Launching .lnk File

Detects usage of findstr to identify and execute a lnk file as seen within the HHS redirect attack

Sigma rule (View on GitHub)

 1title: Findstr Launching .lnk File
 2id: 33339be3-148b-4e16-af56-ad16ec6c7e7b
 3status: test
 4description: Detects usage of findstr to identify and execute a lnk file as seen within the HHS redirect attack
 5references:
 6    - https://www.bleepingcomputer.com/news/security/hhsgov-open-redirect-used-by-coronavirus-phishing-to-spread-malware/
 7author: Trent Liffick
 8date: 2020/05/01
 9modified: 2023/03/06
10tags:
11    - attack.defense_evasion
12    - attack.t1036
13    - attack.t1202
14    - attack.t1027.003
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection_img:
20        - Image|endswith: '\findstr.exe'
21        - OriginalFileName: 'FINDSTR.EXE'
22    selection_cli:
23        CommandLine|endswith: '.lnk'
24    condition: all of selection_*
25falsepositives:
26    - Unknown
27level: medium

Related rules

to-top