Suspicious Response File Execution Via Odbcconf.EXE
Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.
Sigma rule (View on GitHub)
1title: Suspicious Response File Execution Via Odbcconf.EXE
2id: 2d32dd6f-3196-4093-b9eb-1ad8ab088ca5
3related:
4 - id: 5f03babb-12db-4eec-8c82-7b4cb5580868
5 type: derived
6 - id: 65d2be45-8600-4042-b4c0-577a1ff8a60e
7 type: obsolete
8status: experimental
9description: Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.
10references:
11 - https://learn.microsoft.com/en-us/sql/odbc/odbcconf-exe?view=sql-server-ver16
12 - https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/
13 - https://www.trendmicro.com/en_us/research/17/h/backdoor-carrying-emails-set-sights-on-russian-speaking-businesses.html
14author: Nasreddine Bencherchali (Nextron Systems)
15date: 2023-05-22
16modified: 2024-03-13
17tags:
18 - attack.defense-evasion
19 - attack.t1218.008
20logsource:
21 category: process_creation
22 product: windows
23detection:
24 selection_img:
25 - Image|endswith: '\odbcconf.exe'
26 - OriginalFileName: 'odbcconf.exe'
27 selection_cli:
28 CommandLine|contains|windash: ' -f '
29 filter_main_rsp_ext:
30 CommandLine|contains: '.rsp'
31 filter_main_runonce_odbc:
32 # When odbcconf is run with the "/R" flag, it creates a "runonce" key to run at the next reboot
33 ParentImage: 'C:\Windows\System32\runonce.exe'
34 Image: 'C:\Windows\System32\odbcconf.exe'
35 CommandLine|contains: '.exe /E /F "C:\WINDOWS\system32\odbcconf.tmp"'
36 condition: all of selection_* and not 1 of filter_main_*
37falsepositives:
38 - Unlikely
39level: high
References
Related rules
- Driver/DLL Installation Via Odbcconf.EXE
- New DLL Registered Via Odbcconf.EXE
- Odbcconf.EXE Suspicious DLL Location
- Potentially Suspicious DLL Registered Via Odbcconf.EXE
- Response File Execution Via Odbcconf.EXE