Detection rules › Sigma

HackTool - RedMimicry Winnti Playbook Execution

Severity
high
Author
Alexander Rausch
Source
upstream

Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059.003 Command and Scripting Interpreter: Windows Command Shell, T1106 Native API
Defense EvasionT1218.011 System Binary Proxy Execution: Rundll32

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

or:
CommandLine|contains: '\Windows\Temp\tmp.bat'
CommandLine|contains: gthread-3.6.dll
CommandLine|contains: sigcmm-2.4.dll
or:
Image|endswith: '\cmd.exe'
Image|endswith: '\rundll32.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • \Windows\Temp\tmp.bat
  • gthread-3.6.dll
  • sigcmm-2.4.dll
Imageends_with
  • \cmd.exe corpus 92 (sigma 92)
  • \rundll32.exe corpus 76 (sigma 76)