-
Notifications
You must be signed in to change notification settings - Fork 326
/
CAR-2020-11-010.yaml
54 lines (54 loc) · 1.88 KB
/
CAR-2020-11-010.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
---
title: CMSTP
submission_date: 2020/11/30
information_domain: Host
platforms:
- Windows
subtypes:
- Process
analytic_types:
- TTP
contributors:
- Olaf Hartong
- MITRE
id: CAR-2020-11-010
description: |-
CMSTP.exe is the Microsoft Connection Manager Profile Installer, which can be leveraged to setup listeners that will receive and install malware from remote sources in trusted fashion.
When CMSTP.exe is seen in combination with an external connection, it is a good indication of this TTP.
coverage:
- technique: T1218
tactics:
- TA0005
subtechniques:
- T1218.003
coverage: High
implementations:
- name: Pseudocode - CMSTP
description: This is a pseudocode representation of the below splunk search.
code: |
processes = search Process:Create
target_processes = filter processes where (
exe="C:\Windows\System32\CMSTP.exe" AND
src_ip NOT IN [10.0.0.0/8,192.168.0.0/16, 172.16.0.0/12] )
output target_processes
data_model: CAR native
type: Pseudocode
- name: Splunk Search - CMSTP
description: looks for instances of CMSTP.exe that are combined with external communication
code: |
(index=__your_sysmon_index__ EventCode=3) Image="C:\\Windows\\System32\\CMSTP.exe" | where ((!cidrmatch("10.0.0.0/8", SourceIp) AND !cidrmatch("192.168.0.0/16", SourceIp) AND !cidrmatch("172.16.0.0/12", SourceIp))
data_model: Sysmon native
type: Splunk
- name: LogPoint Search - CMSTP
description: looks for instances of CMSTP.exe that are combined with external communication
code: |
norm_id=WindowsSysmon event_id=3 image="C:\Windows\System32\CMSTP.exe" -source_address IN HOMENET
data_model: LogPoint native
type: LogPoint
data_model_references:
- process/create/exe
- process/create/src_ip
d3fend_mappings:
- iri: d3f:ProcessSpawnAnalysis
id: D3-PSA
label: Process Spawn Analysis