Emerging Threatmediumtest

DarkGate - Drop DarkGate Loader In C:\Temp Directory

Detects attackers attempting to save, decrypt and execute the DarkGate Loader in C:\temp folder.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Tomasz Dyduch, Josh NickelsCreated Fri May 31df49c691-8026-48dd-94d3-4ba6a79102a82024
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event

Events for file system activity including creation, modification, and deletion.

Detection Logic
Detection Logic2 selectors
detection:
    selection_filename_suffix:
        TargetFilename|contains: ':\temp\'
        TargetFilename|endswith:
            - '.au3'
            - '\autoit3.exe'
    selection_image_suffix:
        Image|contains: ':\temp\'
        Image|endswith:
            - '.au3'
            - '\autoit3.exe'
    condition: 1 of selection_*
False Positives

Unlikely legitimate usage of AutoIT in temp folders.

MITRE ATT&CK

Other

detection.emerging-threats
Rule Metadata
Rule ID
df49c691-8026-48dd-94d3-4ba6a79102a8
Status
test
Level
medium
Type
Emerging Threat
Created
Fri May 31
Path
rules-emerging-threats/2024/Malware/DarkGate/file_event_win_malware_darkgate_autoit3_save_temp.yml
Raw Tags
attack.executionattack.t1059detection.emerging-threats
View on GitHub