Coronavirus ransomware detections

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

This rule detects execution of "file2.exe", a malware file associated with CoronaVirus ransomware attacks and also the shadow copy deletion and multiple file modification IoCs associated with CoronaVirus ransomware attacks.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "File created" AND (OBJECTNAME contains "\AppData\Local\Temp" AND OBJECTNAME endswith "exe") Action2: actionname = "Process started" AND PROCESSNAME = Action1.OBJECTNAME AND HOSTNAME = Action1.HOSTNAME Action3: actionname = "Process started" AND (PROCESSNAME endswith "vssadmin.exe" OR PROCESSNAME endswith "wbadmin.exe") AND HOSTNAME = Action1.HOSTNAME Action4: actionname = "File deleted" AND HOSTNAME = Action1.HOSTNAME AND PROCESSNAME = Action1.OBJECTNAME | timewindow 10m | groupby PROCESSNAME having COUNT >= 10 sequence:Action1 followedby Action2 within 30s followedby Action3 within 30s followedby Action4 within 5m select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.ACCESSLIST,Action1.FILETYPE,Action2.HOSTNAME,Action2.MESSAGE,Action2.COMMANDLINE,Action2.FILE_NAME,Action2.PROCESSNAME,Action2.USERNAME,Action2.PARENTPROCESSNAME,Action2.DOMAIN,Action2.ORIGINALFILENAME,Action2.PARENTPROCESSID,Action2.PROCESSID,Action2.PRODUCT_NAME,Action2.SECURITYID,Action3.HOSTNAME,Action3.MESSAGE,Action3.COMMANDLINE,Action3.FILE_NAME,Action3.PROCESSNAME,Action3.USERNAME,Action3.PARENTPROCESSNAME,Action3.DOMAIN,Action3.ORIGINALFILENAME,Action3.PARENTPROCESSID,Action3.PROCESSID,Action3.PRODUCT_NAME,Action3.SECURITYID,Action4.timewindow.HOSTNAME,Action4.timewindow.MESSAGE,Action4.timewindow.USERNAME,Action4.timewindow.DOMAIN,Action4.timewindow.PROCESSNAME,Action4.timewindow.ACCESSLIST,Action4.timewindow.OBJECTNAME,Action4.timewindow.FILENAME,Action4.timewindow.FILETYPE

Detection

Execution Mode

realtime

Log Sources

Windows