LoFP LoFP / various business process or userland applications and behavior.

Techniques

Sample rules

Suspicious Process Executed From Container File

Description

This analytic identifies a suspicious process spawned by another process from within common container/archive file types. This technique was a common technique used by adversaries and malware to execute scripts or evade defenses. This TTP may detect some normal software installation or user behaviors where opening archive files is common.

Detection logic


| tstats `security_content_summariesonly` count values(Processes.process_name) as process_name min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process IN ("*.ZIP\\*","*.ISO\\*","*.IMG\\*","*.CAB\\*","*.TAR\\*","*.GZ\\*","*.RAR\\*","*.7Z\\*") AND Processes.action="allowed" by Processes.dest Processes.parent_process Processes.process Processes.user
| `drop_dm_object_name(Processes)`
| regex process="(?i).*(ZIP
|ISO
|IMG
|CAB
|TAR
|GZ
|RAR
|7Z)\\\\.+\.(BAT
|BIN
|CAB
|CMD
|COM
|CPL
|EX_
|EXE
|GADGET
|INF1
|INS
|INX
|
|HTM
|HTML
|ISU
|JAR
|JOB
|JS
|JSE
|LNK
|MSC
|MSI
|MSP
|MST
|PAF
|PIF
|PS1
|REG
|RGS
|SCR
|SCT
|SHB
|SHS
|U3P
|VB
|VBE
|VBS
|VBSCRIPT
|WS
|WSF
|WSH)\"?$" 
| rex field=process "(?i).+\\\\(?<file_name>[^\\\]+\.(ZIP
|ISO
|IMG
|CAB
|TAR
|GZ
|RAR
|7Z))\\\\((.+\\\\)+)?(?<process_name>.+\.(BAT
|BIN
|CAB
|CMD
|COM
|CPL
|EX_
|EXE
|GADGET
|INF1
|INS
|INX
|
|HTM
|HTML
|ISU
|JAR
|JOB
|JS
|JSE
|LNK
|MSC
|MSI
|MSP
|MST
|PAF
|PIF
|PS1
|REG
|RGS
|SCR
|SCT
|SHB
|SHS
|U3P
|VB
|VBE
|VBS
|VBSCRIPT
|WS
|WSF
|WSH))\"?$"
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `suspicious_process_executed_from_container_file_filter`