Emotet Child Process Spawn Pattern
Detects Emotet Spawning ipconfig and systeminfo.
Sigma rule (View on GitHub)
1title: Emotet Child Process Spawn Pattern
2id: 50e8cf53-62df-49aa-bbde-8b3a0a6d8a35
3status: Experimental
4description: Detects Emotet Spawning ipconfig and systeminfo.
5author: TheDFIRReport
6references:
7 - https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
8 - Case 15184
9date: 2022/10/03
10logsource:
11 category: process_creation
12 product: windows
13detection:
14 selection_image:
15 CommandLine:
16 - 'ipconfig /all'
17 - 'systeminfo'
18 selection_parent:
19 ParentImage|endswith:
20 - 'regsvr32.exe'
21 selection_parent_cmdline:
22 ParentCommandLine|contains:
23 - '.dll'
24 condition: selection_image and selection_parent and selection_parent_cmdline
25falsepositives:
26 - Unknown
27level: high
28tags:
29 - attack.discovery
30 - attack.t1087