Emerging Threathighexperimental

Forest Blizzard APT - Process Creation Activity

Detects the execution of specific processes and command line combination. These were seen being created by Forest Blizzard as described by MSFT.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems)Created Tue Apr 23Updated Wed Jan 2207db928c-8632-488e-ac7d-3db8474891752024
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic4 selectors
detection:
    selection_hashes:
        Hashes|contains:
            - 'SHA256=6b311c0a977d21e772ac4e99762234da852bbf84293386fbe78622a96c0b052f'
            - 'SHA256=c60ead92cd376b689d1b4450f2578b36ea0bf64f3963cfa5546279fa4424c2a5'
    selection_schtasks_create:
        Image|endswith: '\schtasks.exe'
        CommandLine|contains|all:
            - 'Create'
            - '/RU'
            - 'SYSTEM'
            - '\Microsoft\Windows\WinSrv'
        CommandLine|contains:
            - 'servtask.bat'
            - 'execute.bat'
            - 'doit.bat'
    selection_schtasks_delete:
        Image|endswith: '\schtasks.exe'
        CommandLine|contains|all:
            - 'Delete'
            - '/F '
            - '\Microsoft\Windows\WinSrv'
    selection_powershell:
        CommandLine|contains|all:
            - 'Get-ChildItem'
            - '.save'
            - 'Compress-Archive -DestinationPath C:\ProgramData\'
    condition: 1 of selection_*
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK

Other

detection.emerging-threats
Rule Metadata
Rule ID
07db928c-8632-488e-ac7d-3db847489175
Status
experimental
Level
high
Type
Emerging Threat
Created
Tue Apr 23
Modified
Wed Jan 22
Path
rules-emerging-threats/2024/TA/Forest-Blizzard/proc_creation_win_apt_forest_blizzard_activity.yml
Raw Tags
attack.defense-evasionattack.executiondetection.emerging-threats
View on GitHub