339. Hunting for MuddyWater's UDPGangster
Hello everyone!
In some cases adversaries still use malicious documents to deliver malware. Let's look at a recent example.
It's MuddyWater again. The adversary leveraged phishing emails to deliver malicious Microsoft Word documents. The document dropped UDPGangster to C:\Users\Public\ui.txt and executed it.
Here we have winword.exe spawning a suspicious file from %PUBLIC% folder. Let's transform it into a query:
event_type: "processcreatewin"
AND
proc_p_file_path: "winword.exe"
AND
proc_file_path: "public"
See you tomorrow!

Comments
Post a Comment