339. Hunting for MuddyWater's UDPGangster

Hello everyone!

In some cases adversaries still use malicious documents to deliver malware. Let's look at a recent example.

It's MuddyWater again. The adversary leveraged phishing emails to deliver malicious Microsoft Word documents. The document dropped UDPGangster to C:\Users\Public\ui.txt and executed it.

Here we have winword.exe spawning a suspicious file from %PUBLIC% folder. Let's transform it into a query:

event_type: "processcreatewin"

AND

proc_p_file_path: "winword.exe"

AND

proc_file_path: "public"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge