Odbcconf.EXE Suspicious DLL Location

Detects execution of "odbcconf" where the path of the DLL being registered is located in a potentially suspicious location.

Sigma rule (View on GitHub)

 1title: Odbcconf.EXE Suspicious DLL Location
 2id: 6b65c28e-11f3-46cb-902a-68f2cafaf474
 3status: test
 4description: Detects execution of "odbcconf" where the path of the DLL being registered is located in a potentially suspicious location.
 5references:
 6    - https://learn.microsoft.com/en-us/sql/odbc/odbcconf-exe?view=sql-server-ver16
 7    - https://www.trendmicro.com/en_us/research/17/h/backdoor-carrying-emails-set-sights-on-russian-speaking-businesses.html
 8    - https://securityintelligence.com/posts/raspberry-robin-worm-dridex-malware/
 9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2023/05/22
11modified: 2023/05/26
12tags:
13    - attack.defense_evasion
14    - attack.t1218.008
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection_img:
20        - Image|endswith: '\odbcconf.exe'
21        - OriginalFileName: 'odbcconf.exe'
22    selection_cli:
23        # Note: Add more suspicious locations
24        CommandLine|contains:
25            - ':\PerfLogs\'
26            - ':\ProgramData\'
27            - ':\Temp\'
28            - ':\Users\Public\'
29            - ':\Windows\Registration\CRMLog'
30            - ':\Windows\System32\com\dmp\'
31            - ':\Windows\System32\FxsTmp\'
32            - ':\Windows\System32\Microsoft\Crypto\RSA\MachineKeys\'
33            - ':\Windows\System32\spool\drivers\color\'
34            - ':\Windows\System32\spool\PRINTERS\'
35            - ':\Windows\System32\spool\SERVERS\'
36            - ':\Windows\System32\Tasks_Migrated\'
37            - ':\Windows\System32\Tasks\Microsoft\Windows\SyncCenter\'
38            - ':\Windows\SysWOW64\com\dmp\'
39            - ':\Windows\SysWOW64\FxsTmp\'
40            - ':\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA\System\'
41            - ':\Windows\SysWOW64\Tasks\Microsoft\Windows\SyncCenter\'
42            - ':\Windows\Tasks\'
43            - ':\Windows\Temp\'
44            - ':\Windows\Tracing\'
45            - '\AppData\Local\Temp\'
46            - '\AppData\Roaming\'
47    condition: all of selection_*
48falsepositives:
49    - Unlikely
50level: high

References

Related rules

to-top