-
Notifications
You must be signed in to change notification settings - Fork 47
/
attachment_lnk_file_with_embedded_content.yml
42 lines (41 loc) · 1.28 KB
/
attachment_lnk_file_with_embedded_content.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
name: "Attachment: LNK with embedded content"
description: |
Emotet has been observed to embed executable content within an LNK file to deliver and execute VBScript when launched.
Similar research has demonstrated how this concept may be applied to deliver and launch an embedded executable via PowerShell.
references:
- "https://forensicitguy.github.io/shortcut-to-emotet-ttp-change/"
- "https://www.x86matthew.com/view_post?id=embed_exe_lnk"
type: "rule"
authors:
- twitter: "ajpc500"
severity: "high"
source: |
type.inbound
and (
any(attachments,
.file_extension == "lnk"
and any(file.explode(.),
.file_extension =~ "lnk"
and any(.scan.exiftool.fields, (.key == "TargetFileSize" and .value == "0"))
and any(.scan.exiftool.fields,
(
.key == "CommandLineArguments"
and strings.ilike(.value, "*findstr*", "*sc $path*", "*Set-Content*")
)
)
)
)
)
tags:
- "Malfam: Emotet"
attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Exploit"
- "LNK"
- "Scripting"
detection_methods:
- "Content analysis"
- "Exif analysis"
- "File analysis"
id: "41452f7a-c77d-5259-a5fb-91b1b4419364"