OceanLotus Registry Activity
Detects registry keys created in OceanLotus (also known as APT32) attacks
Sigma rule (View on GitHub)
1title: OceanLotus Registry Activity
2id: 4ac5fc44-a601-4c06-955b-309df8c4e9d4
3status: test
4description: Detects registry keys created in OceanLotus (also known as APT32) attacks
5references:
6 - https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/
7 - https://github.com/eset/malware-ioc/tree/master/oceanlotus
8author: megan201296, Jonhnathan Ribeiro
9date: 2019/04/14
10modified: 2023/09/28
11tags:
12 - attack.defense_evasion
13 - attack.t1112
14logsource:
15 category: registry_event
16 product: windows
17detection:
18 selection_clsid:
19 TargetObject|contains: '\SOFTWARE\Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
20 selection_hkcu:
21 TargetObject|contains:
22 # HKCU\SOFTWARE\Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\
23 - 'Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\'
24 # HKCU\SOFTWARE\Classes\AppX3bbba44c6cae4d9695755183472171e2\
25 - 'Classes\AppX3bbba44c6cae4d9695755183472171e2\'
26 # HKCU\SOFTWARE\Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\
27 - 'Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\'
28 - 'Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
29 selection_appx_1:
30 TargetObject|contains: '\SOFTWARE\App\'
31 selection_appx_2:
32 TargetObject|contains:
33 - 'AppXbf13d4ea2945444d8b13e2121cb6b663\'
34 - 'AppX70162486c7554f7f80f481985d67586d\'
35 - 'AppX37cc7fdccd644b4f85f4b22d5a3f105a\'
36 TargetObject|endswith:
37 - 'Application'
38 - 'DefaultIcon'
39 condition: selection_clsid or selection_hkcu or all of selection_appx_*
40falsepositives:
41 - Unknown
42level: critical
References
Related rules
- Uncommon Microsoft Office Trusted Location Added
- New BgInfo.EXE Custom DB Path Registry Configuration
- New BgInfo.EXE Custom VBScript Registry Configuration
- New BgInfo.EXE Custom WMI Query Registry Configuration
- Activate Suppression of Windows Security Center Notifications