Detectionmediumtest

CodePage Modification Via MODE.COM To Russian Language

Detects a CodePage modification using the "mode.com" utility to Russian language. This behavior has been used by threat actors behind Dharma ransomware.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Joseliyo SanchezCreated Wed Jan 1712fbff88-16b5-4b42-9754-cd001a789fb3windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    # VT Query: behavior:"mode con cp select=1251"
    # VT Query: behavior:"mode con cp select=866"
    selection_img:
        - Image|endswith: '\mode.com'
        - OriginalFileName: 'MODE.COM'
    selection_cli:
        CommandLine|contains|all:
            - ' con '
            - ' cp '
            - ' select='
        CommandLine|endswith:
            - '=1251' # ANSI Cyrillic; Cyrillic (Windows) - Observed ITW by Dharma ransomware
            - '=866' # OEM Russian; Cyrillic (DOS) - Observed ITW by other malware
    condition: all of selection_*
False Positives

Russian speaking people changing the CodePage

Rule Metadata
Rule ID
12fbff88-16b5-4b42-9754-cd001a789fb3
Status
test
Level
medium
Type
Detection
Created
Wed Jan 17
Path
rules/windows/process_creation/proc_creation_win_mode_codepage_russian.yml
Raw Tags
attack.defense-evasionattack.t1036
View on GitHub