Phishing Pattern ISO in Archive
Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)
Sigma rule (View on GitHub)
1title: Phishing Pattern ISO in Archive
2id: fcdf69e5-a3d3-452a-9724-26f2308bf2b1
3status: test
4description: Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)
5references:
6 - https://twitter.com/1ZRR4H/status/1534259727059787783
7 - https://app.any.run/tasks/e1fe6a62-bce8-4323-a49a-63795d9afd5d/
8author: Florian Roth (Nextron Systems)
9date: 2022-06-07
10tags:
11 - attack.initial-access
12 - attack.t1566
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection:
18 ParentImage|endswith:
19 - '\Winrar.exe'
20 - '\7zFM.exe'
21 - '\peazip.exe'
22 Image|endswith:
23 - '\isoburn.exe'
24 - '\PowerISO.exe'
25 - '\ImgBurn.exe'
26 condition: selection
27falsepositives:
28 - Legitimate cases in which archives contain ISO or IMG files and the user opens the archive and the image via clicking and not extraction
29level: high
References
Related rules
- Download From Suspicious TLD - Blacklist
- Download From Suspicious TLD - Whitelist
- HTML Help HH.EXE Suspicious Child Process
- Okta FastPass Phishing Detection
- Potential Initial Access via DLL Search Order Hijacking