HackTool - RedMimicry Winnti Playbook Execution
Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility
Sigma rule (View on GitHub)
1title: HackTool - RedMimicry Winnti Playbook Execution
2id: 95022b85-ff2a-49fa-939a-d7b8f56eeb9b
3status: test
4description: Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility
5references:
6 - https://redmimicry.com/posts/redmimicry-winnti/
7author: Alexander Rausch
8date: 2020-06-24
9modified: 2023-03-01
10tags:
11 - attack.execution
12 - attack.defense-evasion
13 - attack.t1106
14 - attack.t1059.003
15 - attack.t1218.011
16logsource:
17 product: windows
18 category: process_creation
19detection:
20 selection:
21 Image|endswith:
22 - '\rundll32.exe'
23 - '\cmd.exe'
24 CommandLine|contains:
25 - 'gthread-3.6.dll'
26 - '\Windows\Temp\tmp.bat'
27 - 'sigcmm-2.4.dll'
28 condition: selection
29falsepositives:
30 - Unknown
31level: high
References
Related rules
- HTML Help HH.EXE Suspicious Child Process
- Sofacy Trojan Loader Activity
- Suspicious HH.EXE Execution
- ZxShell Malware
- APT29 2018 Phishing Campaign CommandLine Indicators