Wab/Wabmig Unusual Parent Or Child Processes
Detects unusual parent or children of the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity
Sigma rule (View on GitHub)
1title: Wab/Wabmig Unusual Parent Or Child Processes
2id: 63d1ccc0-2a43-4f4b-9289-361b308991ff
3status: test
4description: Detects unusual parent or children of the wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity
5references:
6 - https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
7 - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime
8 - https://thedfirreport.com/2022/09/26/bumblebee-round-two/
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-08-12
11modified: 2022-09-27
12tags:
13 - attack.defense-evasion
14 - attack.execution
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_parent:
20 ParentImage|endswith:
21 # Add more if known
22 - \WmiPrvSE.exe
23 - \svchost.exe
24 - \dllhost.exe
25 Image|endswith:
26 - '\wab.exe'
27 - '\wabmig.exe' # (Microsoft Address Book Import Tool)
28 selection_child:
29 # You can add specific suspicious child processes (such as cmd, powershell...) to increase the accuracy
30 ParentImage|endswith:
31 - '\wab.exe'
32 - '\wabmig.exe' # (Microsoft Address Book Import Tool)
33 condition: 1 of selection_*
34falsepositives:
35 - Unknown
36level: high
References
Related rules
- AMSI Bypass Pattern Assembly GetType
- APT29 2018 Phishing Campaign CommandLine Indicators
- Add Insecure Download Source To Winget
- Add New Download Source To Winget
- Arbitrary File Download Via MSOHTMED.EXE