Emerging Threathightest

DarkGate - Autoit3.EXE Execution Parameters

Detects execution of the legitimate Autoit3 utility from a suspicious parent process. AutoIt3.exe is used within the DarkGate infection chain to execute shellcode that performs process injection and connects to the DarkGate command-and-control server.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Micah BabinskiCreated Sun Oct 15f8e9aa1c-14f2-4dbd-aa59-b98968ed650d2023
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    selection_proc:
        - Image|endswith: '\Autoit3.exe'
        - OriginalFileName: 'AutoIt3.exe'
    selection_parent:
        ParentImage|endswith:
            - '\cmd.exe'
            - '\KeyScramblerLogon.exe'
            - '\msiexec.exe'
    filter_main_legit_autoit_location:
        Image|endswith:
            - ':\Program Files (x86)\AutoIt3\AutoIt3.exe'
            - ':\Program Files\AutoIt3\AutoIt3.exe'
    condition: all of selection_* and not 1 of filter_main_*
False Positives
Unlikely

False positives are unlikely for most environments. High confidence detection.

MITRE ATT&CK

Other

detection.emerging-threats
Rule Metadata
Rule ID
f8e9aa1c-14f2-4dbd-aa59-b98968ed650d
Status
test
Level
high
Type
Emerging Threat
Created
Sun Oct 15
Path
rules-emerging-threats/2023/Malware/DarkGate/proc_creation_win_malware_darkgate_autoit3_from_susp_parent_and_location.yml
Raw Tags
attack.executionattack.t1059detection.emerging-threats
View on GitHub