diff --git a/detections/application/detect_html_help_spawn_child_process.yml b/detections/application/detect_html_help_spawn_child_process.yml index 4047b390a4..5c2918d2bf 100644 --- a/detections/application/detect_html_help_spawn_child_process.yml +++ b/detections/application/detect_html_help_spawn_child_process.yml @@ -1,7 +1,7 @@ name: Detect HTML Help Spawn Child Process id: 723716de-ee55-4cd4-9759-c44e7e55ba4b -version: 11 -date: '2025-05-02' +version: 12 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -79,6 +79,7 @@ tags: - AgentTesla - Living Off The Land - Compromised Windows Host + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.001 diff --git a/detections/endpoint/bitsadmin_download_file.yml b/detections/endpoint/bitsadmin_download_file.yml index 5cbf185398..082db5a301 100644 --- a/detections/endpoint/bitsadmin_download_file.yml +++ b/detections/endpoint/bitsadmin_download_file.yml @@ -1,7 +1,7 @@ name: BITSAdmin Download File id: 80630ff4-8e4c-11eb-aab5-acde48001122 -version: 12 -date: '2025-07-29' +version: 13 +date: '2025-09-18' author: Michael Haag, Sittikorn S status: production type: TTP @@ -81,6 +81,7 @@ tags: - Flax Typhoon - Gozi Malware - Scattered Spider + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1197 diff --git a/detections/endpoint/cisco_nvm___suspicious_download_from_file_sharing_website.yml b/detections/endpoint/cisco_nvm___suspicious_download_from_file_sharing_website.yml index dafdcbd6f7..fd1a19227c 100644 --- a/detections/endpoint/cisco_nvm___suspicious_download_from_file_sharing_website.yml +++ b/detections/endpoint/cisco_nvm___suspicious_download_from_file_sharing_website.yml @@ -1,7 +1,7 @@ name: Cisco NVM - Suspicious Download From File Sharing Website id: 94ebc001-35e7-4ae8-9b0e-52766b2f99c7 -version: 2 -date: '2025-09-09' +version: 3 +date: '2025-09-18' author: Nasreddine Bencherchali, Splunk status: production type: Anomaly @@ -97,6 +97,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Cisco Network Visibility Module Analytics asset_type: Endpoint mitre_attack_id: diff --git a/detections/endpoint/cobalt_strike_named_pipes.yml b/detections/endpoint/cobalt_strike_named_pipes.yml index 6a7ed2ea42..c0bdc330dd 100644 --- a/detections/endpoint/cobalt_strike_named_pipes.yml +++ b/detections/endpoint/cobalt_strike_named_pipes.yml @@ -1,7 +1,7 @@ name: Cobalt Strike Named Pipes id: 5876d429-0240-4709-8b93-ea8330b411b5 -version: 10 -date: '2025-08-04' +version: 11 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -90,6 +90,7 @@ tags: - Graceful Wipe Out Attack - LockBit Ransomware - Gozi Malware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1055 diff --git a/detections/endpoint/detect_html_help_renamed.yml b/detections/endpoint/detect_html_help_renamed.yml index 44efeb5579..f5a823524d 100644 --- a/detections/endpoint/detect_html_help_renamed.yml +++ b/detections/endpoint/detect_html_help_renamed.yml @@ -1,7 +1,7 @@ name: Detect HTML Help Renamed id: 62fed254-513b-460e-953d-79771493a9f3 -version: 11 -date: '2025-05-02' +version: 12 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Hunting @@ -45,6 +45,7 @@ tags: analytic_story: - Suspicious Compiled HTML Activity - Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.001 diff --git a/detections/endpoint/detect_html_help_url_in_command_line.yml b/detections/endpoint/detect_html_help_url_in_command_line.yml index 7e3a4f32c3..987241bff9 100644 --- a/detections/endpoint/detect_html_help_url_in_command_line.yml +++ b/detections/endpoint/detect_html_help_url_in_command_line.yml @@ -1,7 +1,7 @@ name: Detect HTML Help URL in Command Line id: 8c5835b9-39d9-438b-817c-95f14c69a31e -version: 12 -date: '2025-06-30' +version: 13 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -82,6 +82,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Suspicious Compiled HTML Activity - Living Off The Land - Compromised Windows Host diff --git a/detections/endpoint/detect_html_help_using_infotech_storage_handlers.yml b/detections/endpoint/detect_html_help_using_infotech_storage_handlers.yml index d096ef262e..62415a7ddc 100644 --- a/detections/endpoint/detect_html_help_using_infotech_storage_handlers.yml +++ b/detections/endpoint/detect_html_help_using_infotech_storage_handlers.yml @@ -1,7 +1,7 @@ name: Detect HTML Help Using InfoTech Storage Handlers id: 0b2eefa5-5508-450d-b970-3dd2fb761aec -version: 10 -date: '2025-05-02' +version: 11 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -76,6 +76,7 @@ tags: - Suspicious Compiled HTML Activity - Living Off The Land - Compromised Windows Host + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.001 diff --git a/detections/endpoint/detect_mshta_inline_hta_execution.yml b/detections/endpoint/detect_mshta_inline_hta_execution.yml index 89cedd60ca..d2f37de1e9 100644 --- a/detections/endpoint/detect_mshta_inline_hta_execution.yml +++ b/detections/endpoint/detect_mshta_inline_hta_execution.yml @@ -1,7 +1,7 @@ name: Detect mshta inline hta execution id: a0873b32-5b68-11eb-ae93-0242ac130002 -version: '17' -date: '2025-05-06' +version: '18' +date: '2025-09-18' author: Bhavin Patel, Michael Haag, Splunk status: production type: TTP @@ -80,6 +80,7 @@ tags: - Living Off The Land - Suspicious MSHTA Activity - XWorm + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.005 diff --git a/detections/endpoint/detect_mshta_renamed.yml b/detections/endpoint/detect_mshta_renamed.yml index 41fa471e01..664f76887c 100644 --- a/detections/endpoint/detect_mshta_renamed.yml +++ b/detections/endpoint/detect_mshta_renamed.yml @@ -1,7 +1,7 @@ name: Detect mshta renamed id: 8f45fcf0-5b68-11eb-ae93-0242ac130002 -version: 10 -date: '2025-05-02' +version: 11 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Hunting @@ -43,6 +43,7 @@ tags: analytic_story: - Suspicious MSHTA Activity - Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.005 diff --git a/detections/endpoint/detect_mshta_url_in_command_line.yml b/detections/endpoint/detect_mshta_url_in_command_line.yml index 2645611206..d924662ab3 100644 --- a/detections/endpoint/detect_mshta_url_in_command_line.yml +++ b/detections/endpoint/detect_mshta_url_in_command_line.yml @@ -1,7 +1,7 @@ name: Detect MSHTA Url in Command Line id: 9b3af1e6-5b68-11eb-ae93-0242ac130002 -version: 14 -date: '2025-06-30' +version: 15 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -82,6 +82,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Compromised Windows Host - Lumma Stealer - Living Off The Land diff --git a/detections/endpoint/detect_outlook_exe_writing_a_zip_file.yml b/detections/endpoint/detect_outlook_exe_writing_a_zip_file.yml index 2a7b27ce5b..af88fceaf0 100644 --- a/detections/endpoint/detect_outlook_exe_writing_a_zip_file.yml +++ b/detections/endpoint/detect_outlook_exe_writing_a_zip_file.yml @@ -1,7 +1,7 @@ name: Detect Outlook exe writing a zip file id: a51bfe1a-94f0-4822-b1e4-16ae10145893 -version: 13 -date: '2025-05-02' +version: 14 +date: '2025-09-18' author: Bhavin Patel, Splunk status: experimental type: TTP @@ -53,6 +53,7 @@ tags: - Remcos - PXA Stealer - Meduza Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1566.001 diff --git a/detections/endpoint/detect_rundll32_inline_hta_execution.yml b/detections/endpoint/detect_rundll32_inline_hta_execution.yml index 12d42f723f..3d21c17e75 100644 --- a/detections/endpoint/detect_rundll32_inline_hta_execution.yml +++ b/detections/endpoint/detect_rundll32_inline_hta_execution.yml @@ -1,7 +1,7 @@ name: Detect Rundll32 Inline HTA Execution id: 91c79f14-5b41-11eb-ae93-0242ac130002 -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -68,6 +68,7 @@ tags: - Suspicious MSHTA Activity - NOBELIUM Group - Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.005 diff --git a/detections/endpoint/executables_or_script_creation_in_temp_path.yml b/detections/endpoint/executables_or_script_creation_in_temp_path.yml index 47b18998c3..5d8d18a843 100644 --- a/detections/endpoint/executables_or_script_creation_in_temp_path.yml +++ b/detections/endpoint/executables_or_script_creation_in_temp_path.yml @@ -1,7 +1,7 @@ name: Executables Or Script Creation In Temp Path id: e0422b71-2c05-4f32-8754-01fb415f49c9 -version: 15 -date: '2025-08-07' +version: 16 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -102,6 +102,7 @@ tags: - Amadey - IcedID - Interlock Rat + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1036 diff --git a/detections/endpoint/icedid_exfiltrated_archived_file_creation.yml b/detections/endpoint/icedid_exfiltrated_archived_file_creation.yml index ca650e0bf0..70aaf6d22a 100644 --- a/detections/endpoint/icedid_exfiltrated_archived_file_creation.yml +++ b/detections/endpoint/icedid_exfiltrated_archived_file_creation.yml @@ -1,7 +1,7 @@ name: IcedID Exfiltrated Archived File Creation id: 0db4da70-f14b-11eb-8043-acde48001122 -version: 7 -date: '2025-05-02' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Hunting @@ -33,6 +33,7 @@ references: tags: analytic_story: - IcedID + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1560.001 diff --git a/detections/endpoint/lolbas_with_network_traffic.yml b/detections/endpoint/lolbas_with_network_traffic.yml index 2b3b6bd436..65e229b262 100644 --- a/detections/endpoint/lolbas_with_network_traffic.yml +++ b/detections/endpoint/lolbas_with_network_traffic.yml @@ -1,7 +1,7 @@ name: LOLBAS With Network Traffic id: 2820f032-19eb-497e-8642-25b04a880359 -version: 11 -date: '2025-05-26' +version: 12 +date: '2025-09-18' author: Steven Dick status: production type: TTP @@ -74,6 +74,7 @@ tags: - Living Off The Land - Malicious Inno Setup Loader - Water Gamayun + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1105 diff --git a/detections/endpoint/malicious_powershell_process___execution_policy_bypass.yml b/detections/endpoint/malicious_powershell_process___execution_policy_bypass.yml index db8bcc1cb1..c2c100fff4 100644 --- a/detections/endpoint/malicious_powershell_process___execution_policy_bypass.yml +++ b/detections/endpoint/malicious_powershell_process___execution_policy_bypass.yml @@ -1,7 +1,7 @@ name: Malicious PowerShell Process - Execution Policy Bypass id: 9be56c82-b1cc-4318-87eb-d138afaaca39 -version: 15 -date: '2025-08-22' +version: 16 +date: '2025-09-18' author: Rico Valdez, Mauricio Velazco, Splunk status: production type: Anomaly @@ -76,6 +76,7 @@ tags: - XWorm - DarkCrystal RAT - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1059.001 diff --git a/detections/endpoint/mshta_spawning_rundll32_or_regsvr32_process.yml b/detections/endpoint/mshta_spawning_rundll32_or_regsvr32_process.yml index 206a789991..b2007887d4 100644 --- a/detections/endpoint/mshta_spawning_rundll32_or_regsvr32_process.yml +++ b/detections/endpoint/mshta_spawning_rundll32_or_regsvr32_process.yml @@ -1,7 +1,7 @@ name: Mshta spawning Rundll32 OR Regsvr32 Process id: 4aa5d062-e893-11eb-9eb2-acde48001122 -version: 9 -date: '2025-05-02' +version: 10 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -69,6 +69,7 @@ tags: - Trickbot - IcedID - Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.005 diff --git a/detections/endpoint/powershell_4104_hunting.yml b/detections/endpoint/powershell_4104_hunting.yml index 243bae6181..5be89f2bd4 100644 --- a/detections/endpoint/powershell_4104_hunting.yml +++ b/detections/endpoint/powershell_4104_hunting.yml @@ -1,7 +1,7 @@ name: PowerShell 4104 Hunting id: d6f2b006-0041-11ec-8885-acde48001122 -version: 19 -date: '2025-08-22' +version: 20 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Hunting @@ -83,6 +83,7 @@ tags: - Scattered Spider - Interlock Ransomware - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1059.001 diff --git a/detections/endpoint/powershell_fileless_script_contains_base64_encoded_content.yml b/detections/endpoint/powershell_fileless_script_contains_base64_encoded_content.yml index 75043260ec..a0f5d4c9d7 100644 --- a/detections/endpoint/powershell_fileless_script_contains_base64_encoded_content.yml +++ b/detections/endpoint/powershell_fileless_script_contains_base64_encoded_content.yml @@ -1,7 +1,7 @@ name: Powershell Fileless Script Contains Base64 Encoded Content id: 8acbc04c-c882-11eb-b060-acde48001122 -version: 12 -date: '2025-08-22' +version: 13 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -64,6 +64,7 @@ tags: - IcedID - XWorm - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer mitre_attack_id: - T1027 - T1059.001 diff --git a/detections/endpoint/process_creating_lnk_file_in_suspicious_location.yml b/detections/endpoint/process_creating_lnk_file_in_suspicious_location.yml index 43114bf432..ae9bb290f0 100644 --- a/detections/endpoint/process_creating_lnk_file_in_suspicious_location.yml +++ b/detections/endpoint/process_creating_lnk_file_in_suspicious_location.yml @@ -1,7 +1,7 @@ name: Process Creating LNK file in Suspicious Location id: 5d814af1-1041-47b5-a9ac-d754e82e9a26 -version: 12 -date: '2025-05-02' +version: 13 +date: '2025-09-18' author: Jose Hernandez, Michael Haag, Splunk status: production type: TTP @@ -63,6 +63,7 @@ tags: - IcedID - Amadey - Gozi Malware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1566.002 diff --git a/detections/endpoint/processes_tapping_keyboard_events.yml b/detections/endpoint/processes_tapping_keyboard_events.yml index aca5d82d48..4f5f8b4d45 100644 --- a/detections/endpoint/processes_tapping_keyboard_events.yml +++ b/detections/endpoint/processes_tapping_keyboard_events.yml @@ -1,7 +1,7 @@ name: Processes Tapping Keyboard Events id: 2a371608-331d-4034-ae2c-21dda8f1d0ec -version: 6 -date: '2025-05-02' +version: 7 +date: '2025-09-18' author: Jose Hernandez, Splunk status: experimental type: TTP @@ -38,6 +38,7 @@ rba: tags: analytic_story: - ColdRoot MacOS RAT + - APT37 Rustonotto and FadeStealer asset_type: Endpoint product: - Splunk Enterprise diff --git a/detections/endpoint/recursive_delete_of_directory_in_batch_cmd.yml b/detections/endpoint/recursive_delete_of_directory_in_batch_cmd.yml index 999e660557..498cad0bb7 100644 --- a/detections/endpoint/recursive_delete_of_directory_in_batch_cmd.yml +++ b/detections/endpoint/recursive_delete_of_directory_in_batch_cmd.yml @@ -1,7 +1,7 @@ name: Recursive Delete of Directory In Batch CMD id: ba570b3a-d356-11eb-8358-acde48001122 -version: 9 -date: '2025-05-02' +version: 10 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -64,6 +64,7 @@ rba: tags: analytic_story: - Ransomware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1070.004 diff --git a/detections/endpoint/registry_keys_used_for_persistence.yml b/detections/endpoint/registry_keys_used_for_persistence.yml index 42df36d913..75df6a4b29 100644 --- a/detections/endpoint/registry_keys_used_for_persistence.yml +++ b/detections/endpoint/registry_keys_used_for_persistence.yml @@ -1,7 +1,7 @@ name: Registry Keys Used For Persistence id: f5f6af30-7aa7-4295-bfe9-07fe87c01a4b -version: 25 -date: '2025-08-22' +version: 26 +date: '2025-09-18' author: Jose Hernandez, David Dorsey, Teoderick Contreras, Rod Soto, Splunk status: production type: TTP @@ -116,6 +116,7 @@ tags: - MoonPeak - Interlock Ransomware - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1547.001 diff --git a/detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml b/detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml index 273044c950..14ff41bd23 100644 --- a/detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml +++ b/detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml @@ -1,7 +1,7 @@ name: Scheduled Task Deleted Or Created via CMD id: d5af132c-7c17-439c-9d31-13d55340f36c -version: 20 -date: '2025-08-22' +version: 21 +date: '2025-09-18' author: Bhavin Patel, Splunk status: production type: TTP @@ -105,6 +105,7 @@ tags: - MoonPeak - Scattered Spider - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1053.005 diff --git a/detections/endpoint/suspicious_curl_network_connection.yml b/detections/endpoint/suspicious_curl_network_connection.yml index 22c426f43c..28d3e77887 100644 --- a/detections/endpoint/suspicious_curl_network_connection.yml +++ b/detections/endpoint/suspicious_curl_network_connection.yml @@ -1,7 +1,7 @@ name: Suspicious Curl Network Connection id: 3f613dc0-21f2-4063-93b1-5d3c15eef22f -version: 6 -date: '2025-05-02' +version: 7 +date: '2025-09-18' author: Michael Haag, Splunk status: experimental type: TTP @@ -53,6 +53,7 @@ tags: - Silver Sparrow - Ingress Tool Transfer - Linux Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1105 diff --git a/detections/endpoint/suspicious_image_creation_in_appdata_folder.yml b/detections/endpoint/suspicious_image_creation_in_appdata_folder.yml index 4b7762ff63..04e9b54def 100644 --- a/detections/endpoint/suspicious_image_creation_in_appdata_folder.yml +++ b/detections/endpoint/suspicious_image_creation_in_appdata_folder.yml @@ -1,7 +1,7 @@ name: Suspicious Image Creation In Appdata Folder id: f6f904c4-1ac0-11ec-806b-acde48001122 -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -64,6 +64,7 @@ rba: tags: analytic_story: - Remcos + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1113 diff --git a/detections/endpoint/suspicious_mshta_spawn.yml b/detections/endpoint/suspicious_mshta_spawn.yml index 557bebd1c5..5452cf030d 100644 --- a/detections/endpoint/suspicious_mshta_spawn.yml +++ b/detections/endpoint/suspicious_mshta_spawn.yml @@ -1,7 +1,7 @@ name: Suspicious mshta spawn id: 4d33a488-5b5f-11eb-ae93-0242ac130002 -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -68,6 +68,7 @@ tags: analytic_story: - Suspicious MSHTA Activity - Living Off The Land + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.005 diff --git a/detections/endpoint/suspicious_process_executed_from_container_file.yml b/detections/endpoint/suspicious_process_executed_from_container_file.yml index 844389b65c..010fa10dcd 100644 --- a/detections/endpoint/suspicious_process_executed_from_container_file.yml +++ b/detections/endpoint/suspicious_process_executed_from_container_file.yml @@ -1,7 +1,7 @@ name: Suspicious Process Executed From Container File id: d8120352-3b62-411c-8cb6-7b47584dd5e8 -version: 7 -date: '2025-05-02' +version: 8 +date: '2025-09-18' author: Steven Dick status: production type: TTP @@ -74,6 +74,7 @@ rba: type: file_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Unusual Processes - Amadey - Remcos diff --git a/detections/endpoint/suspicious_scheduled_task_from_public_directory.yml b/detections/endpoint/suspicious_scheduled_task_from_public_directory.yml index 9cc82b6d47..9ce6643ab0 100644 --- a/detections/endpoint/suspicious_scheduled_task_from_public_directory.yml +++ b/detections/endpoint/suspicious_scheduled_task_from_public_directory.yml @@ -1,7 +1,7 @@ name: Suspicious Scheduled Task from Public Directory id: 7feb7972-7ac3-11eb-bac8-acde48001122 -version: 15 -date: '2025-07-29' +version: 16 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Anomaly @@ -87,6 +87,7 @@ tags: - MoonPeak - China-Nexus Threat Activity - Scattered Spider + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1053.005 diff --git a/detections/endpoint/windows_alternate_datastream___base64_content.yml b/detections/endpoint/windows_alternate_datastream___base64_content.yml index 8dfb862bfc..736be0138e 100644 --- a/detections/endpoint/windows_alternate_datastream___base64_content.yml +++ b/detections/endpoint/windows_alternate_datastream___base64_content.yml @@ -1,7 +1,7 @@ name: Windows Alternate DataStream - Base64 Content id: 683f48de-982f-4a7e-9aac-9cec550da498 -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Steven Dick, Teoderick Contreras, Michael Haag, Splunk status: production type: TTP @@ -60,6 +60,7 @@ rba: tags: analytic_story: - Windows Defense Evasion Tactics + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1564.004 diff --git a/detections/endpoint/windows_archive_collected_data_via_powershell.yml b/detections/endpoint/windows_archive_collected_data_via_powershell.yml index 89a54a9faa..d5305ed119 100644 --- a/detections/endpoint/windows_archive_collected_data_via_powershell.yml +++ b/detections/endpoint/windows_archive_collected_data_via_powershell.yml @@ -1,7 +1,7 @@ name: Windows Archive Collected Data via Powershell id: 74c5a3b0-27a7-463c-9d00-1a5bb12cb7b5 -version: 7 -date: '2025-06-24' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -52,6 +52,7 @@ rba: threat_objects: [] tags: analytic_story: + - APT37 Rustonotto and FadeStealer - CISA AA23-347A asset_type: Endpoint mitre_attack_id: diff --git a/detections/endpoint/windows_archive_collected_data_via_rar.yml b/detections/endpoint/windows_archive_collected_data_via_rar.yml index f2d22c5c35..7f61bc4191 100644 --- a/detections/endpoint/windows_archive_collected_data_via_rar.yml +++ b/detections/endpoint/windows_archive_collected_data_via_rar.yml @@ -1,7 +1,7 @@ name: Windows Archive Collected Data via Rar id: 2015de95-fe91-413d-9d62-2fe011b67e82 -version: 9 -date: '2025-05-02' +version: 10 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -66,6 +66,7 @@ tags: - DarkGate Malware - Salt Typhoon - China-Nexus Threat Activity + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1560.001 diff --git a/detections/endpoint/windows_archived_collected_data_in_temp_folder.yml b/detections/endpoint/windows_archived_collected_data_in_temp_folder.yml index 145c37fdcb..a2d666b222 100644 --- a/detections/endpoint/windows_archived_collected_data_in_temp_folder.yml +++ b/detections/endpoint/windows_archived_collected_data_in_temp_folder.yml @@ -1,7 +1,7 @@ name: Windows Archived Collected Data In TEMP Folder id: cb56a1ea-e0b1-46d5-913f-e024cba40cbe -version: 5 -date: '2025-05-02' +version: 6 +date: '2025-09-18' author: Teoderick Contreras, Splunk data_source: - Sysmon EventID 11 @@ -56,6 +56,7 @@ rba: tags: analytic_story: - Braodo Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1560 diff --git a/detections/endpoint/windows_boot_or_logon_autostart_execution_in_startup_folder.yml b/detections/endpoint/windows_boot_or_logon_autostart_execution_in_startup_folder.yml index a839d1604c..99e6497da7 100644 --- a/detections/endpoint/windows_boot_or_logon_autostart_execution_in_startup_folder.yml +++ b/detections/endpoint/windows_boot_or_logon_autostart_execution_in_startup_folder.yml @@ -1,7 +1,7 @@ name: Windows Boot or Logon Autostart Execution In Startup Folder id: 99d157cb-923f-4a00-aee9-1f385412146f -version: 10 -date: '2025-07-28' +version: 11 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -65,6 +65,7 @@ tags: - Quasar RAT - RedLine Stealer - Interlock Ransomware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1547.001 diff --git a/detections/endpoint/windows_cab_file_on_disk.yml b/detections/endpoint/windows_cab_file_on_disk.yml index 6f9325a059..26af81cfa7 100644 --- a/detections/endpoint/windows_cab_file_on_disk.yml +++ b/detections/endpoint/windows_cab_file_on_disk.yml @@ -1,7 +1,7 @@ name: Windows CAB File on Disk id: 622f08d0-69ef-42c2-8139-66088bc25acd -version: 6 -date: '2025-05-02' +version: 7 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Anomaly @@ -59,6 +59,7 @@ rba: tags: analytic_story: - DarkGate Malware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint atomic_guid: [] mitre_attack_id: diff --git a/detections/endpoint/windows_curl_download_to_suspicious_path.yml b/detections/endpoint/windows_curl_download_to_suspicious_path.yml index 97afbe592b..c584962477 100644 --- a/detections/endpoint/windows_curl_download_to_suspicious_path.yml +++ b/detections/endpoint/windows_curl_download_to_suspicious_path.yml @@ -1,7 +1,7 @@ name: Windows Curl Download to Suspicious Path id: c32f091e-30db-11ec-8738-acde48001122 -version: 15 -date: '2025-09-09' +version: 16 +date: '2025-09-18' author: Michael Haag, Nasreddine Bencherchali, Splunk status: production type: TTP @@ -93,6 +93,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Black Basta Ransomware - China-Nexus Threat Activity - Forest Blizzard diff --git a/detections/endpoint/windows_exfiltration_over_c2_via_invoke_restmethod.yml b/detections/endpoint/windows_exfiltration_over_c2_via_invoke_restmethod.yml index a553b2f22a..0b11aedd55 100644 --- a/detections/endpoint/windows_exfiltration_over_c2_via_invoke_restmethod.yml +++ b/detections/endpoint/windows_exfiltration_over_c2_via_invoke_restmethod.yml @@ -1,7 +1,7 @@ name: Windows Exfiltration Over C2 Via Invoke RestMethod id: 06ade821-f6fa-40d0-80af-15bc1d45b3ba -version: 8 -date: '2025-06-24' +version: 9 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -57,6 +57,7 @@ rba: threat_objects: [] tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Winter Vivern - Water Gamayun asset_type: Endpoint diff --git a/detections/endpoint/windows_exfiltration_over_c2_via_powershell_uploadstring.yml b/detections/endpoint/windows_exfiltration_over_c2_via_powershell_uploadstring.yml index 3d2779ee2a..04a49cbdb8 100644 --- a/detections/endpoint/windows_exfiltration_over_c2_via_powershell_uploadstring.yml +++ b/detections/endpoint/windows_exfiltration_over_c2_via_powershell_uploadstring.yml @@ -1,7 +1,7 @@ name: Windows Exfiltration Over C2 Via Powershell UploadString id: 59e8bf41-7472-412a-90d3-00f3afa452e9 -version: 7 -date: '2025-06-24' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -56,6 +56,7 @@ rba: threat_objects: [] tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Winter Vivern asset_type: Endpoint mitre_attack_id: diff --git a/detections/endpoint/windows_expand_cabinet_file_extraction.yml b/detections/endpoint/windows_expand_cabinet_file_extraction.yml new file mode 100644 index 0000000000..23ebce0ec6 --- /dev/null +++ b/detections/endpoint/windows_expand_cabinet_file_extraction.yml @@ -0,0 +1,85 @@ +name: Windows Expand Cabinet File Extraction +id: 4e3e3b8c-6d3a-4b47-9f5a-9e3e0a0a6f2f +version: 1 +date: '2025-09-18' +author: Michael Haag, Splunk +status: production +type: TTP +description: | + Detects usage of expand.exe to extract Microsoft Cabinet (CAB) archives, with + emphasis on extractions into `C:\\ProgramData` or similar staging locations. In + recent APT37 activity, a CAB payload (e.g., wonder.cab) was expanded into + ProgramData prior to persistence and execution. This behavior is a strong signal + for ingress tool transfer and staging of payloads. +data_source: +- Sysmon EventID 1 +- Windows Event Log Security 4688 +- CrowdStrike ProcessRollup2 +search: | + | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime + from datamodel=Endpoint.Processes + where Processes.process_name="expand.exe" + (Processes.process="* -F:* *" OR Processes.process="* /F:* *") + (Processes.process="*.cab*" OR Processes.process="*\\ProgramData\\*") + by Processes.dest Processes.user Processes.parent_process_name Processes.process_name Processes.process Processes.original_file_name Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_path Processes.process_exec Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level Processes.process_path Processes.user_id Processes.vendor_product + | `drop_dm_object_name(Processes)` + | `security_content_ctime(firstTime)` + | `security_content_ctime(lastTime)` + | `windows_expand_cabinet_file_extraction_filter` +how_to_implement: | + This analytic relies on process creation telemetry mapped to the Endpoint.Processes + datamodel (e.g., Sysmon EID 1 or EDR). Ensure full command-line logging is enabled + to capture expand.exe arguments, including `/F:*` or `-F:*` and destination paths. +known_false_positives: | + Legitimate software deployment or administrators may use expand.exe for local + file extraction. Filter by approved deployment tools, signed parent processes, + and sanctioned paths. +references: +- https://www.zscaler.com/blogs/security-research/apt37-targets-windows-rust-backdoor-and-python-loader +drilldown_searches: +- name: View the detection results for - "$user$" and "$dest$" + search: '%original_detection_search% | search user = "$user$" dest = "$dest$"' + earliest_offset: $info_min_time$ + latest_offset: $info_max_time$ +- name: View risk events for the last 7 days for - "$user$" and "$dest$" + search: | + | from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$","$dest$") starthoursago=168 + | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" + values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" + values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" + by normalized_risk_object + | `security_content_ctime(firstTime)` + | `security_content_ctime(lastTime)` + earliest_offset: $info_min_time$ + latest_offset: $info_max_time$ +rba: + message: expand.exe extracted cabinet contents on $dest$ executed by $user$. + risk_objects: + - field: dest + type: system + score: 30 + - field: user + type: system + score: 30 + threat_objects: + - field: process_name + type: process_name +tags: + analytic_story: + - APT37 Rustonotto and FadeStealer + asset_type: Endpoint + mitre_attack_id: + - T1105 + product: + - Splunk Enterprise + - Splunk Enterprise Security + - Splunk Cloud + security_domain: endpoint +tests: +- name: True Positive Test + attack_data: + - data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1140/atomic_red_team/expand_windows-sysmon.log + source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational + sourcetype: XmlWinEventLog + + diff --git a/detections/endpoint/windows_file_download_via_powershell.yml b/detections/endpoint/windows_file_download_via_powershell.yml index 2855b926ec..86bc5b78fc 100644 --- a/detections/endpoint/windows_file_download_via_powershell.yml +++ b/detections/endpoint/windows_file_download_via_powershell.yml @@ -1,7 +1,7 @@ name: Windows File Download Via PowerShell id: 58c4e56c-b5b8-46a3-b5fb-6537dca3c6de -version: 2 -date: '2025-09-09' +version: 3 +date: '2025-09-18' author: Michael Haag, Nasreddine Bencherchali, Splunk status: production type: Anomaly @@ -90,6 +90,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Winter Vivern - Phemedrone Stealer - Malicious PowerShell diff --git a/detections/endpoint/windows_high_file_deletion_frequency.yml b/detections/endpoint/windows_high_file_deletion_frequency.yml index 86984c1653..9ca0bf76d7 100644 --- a/detections/endpoint/windows_high_file_deletion_frequency.yml +++ b/detections/endpoint/windows_high_file_deletion_frequency.yml @@ -1,7 +1,7 @@ name: Windows High File Deletion Frequency id: 45b125c4-866f-11eb-a95a-acde48001122 -version: 9 -date: '2025-07-28' +version: 10 +date: '2025-09-18' author: Teoderick Contreras, Splunk, Steven Dick status: production type: Anomaly @@ -79,6 +79,7 @@ tags: - Clop Ransomware - Interlock Ransomware - NailaoLocker Ransomware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1485 diff --git a/detections/endpoint/windows_http_network_communication_from_msiexec.yml b/detections/endpoint/windows_http_network_communication_from_msiexec.yml index 1c14946754..1bca7e03d1 100644 --- a/detections/endpoint/windows_http_network_communication_from_msiexec.yml +++ b/detections/endpoint/windows_http_network_communication_from_msiexec.yml @@ -1,7 +1,7 @@ name: Windows HTTP Network Communication From MSIExec id: b0fd38c7-f71a-43a2-870e-f3ca06bcdd99 -version: 6 -date: '2025-06-30' +version: 7 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: Anomaly @@ -81,6 +81,7 @@ rba: type: process_name tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Windows System Binary Proxy Execution MSIExec - Water Gamayun - Cisco Network Visibility Module Analytics diff --git a/detections/endpoint/windows_indicator_removal_via_rmdir.yml b/detections/endpoint/windows_indicator_removal_via_rmdir.yml index 910d6fc600..6074c402fb 100644 --- a/detections/endpoint/windows_indicator_removal_via_rmdir.yml +++ b/detections/endpoint/windows_indicator_removal_via_rmdir.yml @@ -1,7 +1,7 @@ name: Windows Indicator Removal Via Rmdir id: c4566d2c-b094-48a1-9c59-d66e22065560 -version: 6 -date: '2025-05-02' +version: 7 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -63,6 +63,7 @@ rba: tags: analytic_story: - DarkGate Malware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1070 diff --git a/detections/endpoint/windows_input_capture_using_credential_ui_dll.yml b/detections/endpoint/windows_input_capture_using_credential_ui_dll.yml index f675b2a5e9..b84feae810 100644 --- a/detections/endpoint/windows_input_capture_using_credential_ui_dll.yml +++ b/detections/endpoint/windows_input_capture_using_credential_ui_dll.yml @@ -1,7 +1,7 @@ name: Windows Input Capture Using Credential UI Dll id: 406c21d6-6c75-4e9f-9ca9-48049a1dd90e -version: 7 -date: '2025-05-02' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Hunting @@ -33,6 +33,7 @@ references: tags: analytic_story: - Brute Ratel C4 + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1056.002 diff --git a/detections/endpoint/windows_iso_lnk_file_creation.yml b/detections/endpoint/windows_iso_lnk_file_creation.yml index 34d9d3df87..0208a03802 100644 --- a/detections/endpoint/windows_iso_lnk_file_creation.yml +++ b/detections/endpoint/windows_iso_lnk_file_creation.yml @@ -1,7 +1,7 @@ name: Windows ISO LNK File Creation id: d7c2c09b-9569-4a9e-a8b6-6a39a99c1d32 -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Michael Haag, Teoderick Contreras, Splunk status: production type: Hunting @@ -47,6 +47,7 @@ tags: - Warzone RAT - Amadey - Gozi Malware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1204.001 diff --git a/detections/endpoint/windows_obfuscated_files_or_information_via_rar_sfx.yml b/detections/endpoint/windows_obfuscated_files_or_information_via_rar_sfx.yml index f8023fbcdd..f69d4bcc2e 100644 --- a/detections/endpoint/windows_obfuscated_files_or_information_via_rar_sfx.yml +++ b/detections/endpoint/windows_obfuscated_files_or_information_via_rar_sfx.yml @@ -1,7 +1,7 @@ name: Windows Obfuscated Files or Information via RAR SFX id: 4ab6862b-ce88-4223-96c0-f6da2cffb898 -version: 4 -date: '2025-05-02' +version: 5 +date: '2025-09-18' author: Teoderick Contreras, Splunk data_source: - Sysmon EventID 11 @@ -53,6 +53,7 @@ rba: tags: analytic_story: - Crypto Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1027.013 diff --git a/detections/endpoint/windows_office_product_dropped_cab_or_inf_file.yml b/detections/endpoint/windows_office_product_dropped_cab_or_inf_file.yml index fecbed2b19..9954492a60 100644 --- a/detections/endpoint/windows_office_product_dropped_cab_or_inf_file.yml +++ b/detections/endpoint/windows_office_product_dropped_cab_or_inf_file.yml @@ -1,7 +1,7 @@ name: Windows Office Product Dropped Cab or Inf File id: dbdd251e-dd45-4ec9-a555-f5e151391746 -version: 5 -date: '2025-05-02' +version: 6 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -72,6 +72,7 @@ tags: - Spearphishing Attachments - Microsoft MSHTML Remote Code Execution CVE-2021-40444 - Compromised Windows Host + - APT37 Rustonotto and FadeStealer asset_type: Endpoint cve: - CVE-2021-40444 diff --git a/detections/endpoint/windows_office_product_spawned_child_process_for_download.yml b/detections/endpoint/windows_office_product_spawned_child_process_for_download.yml index a40e4cd4ac..b6b8a1d809 100644 --- a/detections/endpoint/windows_office_product_spawned_child_process_for_download.yml +++ b/detections/endpoint/windows_office_product_spawned_child_process_for_download.yml @@ -1,7 +1,7 @@ name: Windows Office Product Spawned Child Process For Download id: f02b64b8-cbea-4f75-bf77-7a05111566b1 -version: 5 -date: '2025-06-26' +version: 6 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -77,6 +77,7 @@ tags: - CVE-2023-36884 Office and Windows HTML RCE Vulnerability - PlugX - NjRAT + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1566.001 diff --git a/detections/endpoint/windows_office_product_spawned_uncommon_process.yml b/detections/endpoint/windows_office_product_spawned_uncommon_process.yml index 8f3fedf71d..97a60bcb04 100644 --- a/detections/endpoint/windows_office_product_spawned_uncommon_process.yml +++ b/detections/endpoint/windows_office_product_spawned_uncommon_process.yml @@ -1,7 +1,7 @@ name: Windows Office Product Spawned Uncommon Process id: 55d8741c-fa32-4692-8109-410304961eb8 -version: 4 -date: '2025-05-02' +version: 5 +date: '2025-09-18' author: Michael Haag, Teoderick Contreras, Splunk status: production type: TTP @@ -97,6 +97,7 @@ tags: - Spearphishing Attachments - Trickbot - Warzone RAT + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1566.001 diff --git a/detections/endpoint/windows_process_executed_from_removable_media.yml b/detections/endpoint/windows_process_executed_from_removable_media.yml index f4397c5eca..e06a31f4e5 100644 --- a/detections/endpoint/windows_process_executed_from_removable_media.yml +++ b/detections/endpoint/windows_process_executed_from_removable_media.yml @@ -1,7 +1,7 @@ name: Windows Process Executed From Removable Media id: b483804a-4cc0-49a4-9f00-ac29ba844d08 -version: 5 -date: '2025-06-10' +version: 6 +date: '2025-09-18' author: Steven Dick status: production type: Anomaly @@ -88,6 +88,7 @@ rba: tags: analytic_story: - Data Protection + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1200 diff --git a/detections/endpoint/windows_process_execution_from_programdata.yml b/detections/endpoint/windows_process_execution_from_programdata.yml index d2597749ce..68faa930bc 100644 --- a/detections/endpoint/windows_process_execution_from_programdata.yml +++ b/detections/endpoint/windows_process_execution_from_programdata.yml @@ -1,7 +1,7 @@ name: Windows Process Execution From ProgramData id: 237016fa-d8e6-47b4-80f9-70c4d42c72c0 -version: '4' -date: '2025-05-06' +version: '5' +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: Anomaly @@ -71,6 +71,7 @@ tags: - XWorm - Salt Typhoon - China-Nexus Threat Activity + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1036.005 diff --git a/detections/endpoint/windows_process_injection_into_commonly_abused_processes.yml b/detections/endpoint/windows_process_injection_into_commonly_abused_processes.yml index 04bd55f0a2..c4c46bd29a 100644 --- a/detections/endpoint/windows_process_injection_into_commonly_abused_processes.yml +++ b/detections/endpoint/windows_process_injection_into_commonly_abused_processes.yml @@ -1,7 +1,7 @@ name: Windows Process Injection into Commonly Abused Processes id: 1e1dedc6-f6f3-41a0-9dd7-a1245904fe75 -version: 3 -date: '2025-05-02' +version: 4 +date: '2025-09-18' author: 0xC0FFEEEE, Github Community type: Anomaly status: production @@ -71,6 +71,7 @@ tags: - BishopFox Sliver Adversary Emulation Framework - Earth Alux - SAP NetWeaver Exploitation + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1055.002 diff --git a/detections/endpoint/windows_process_injection_into_notepad.yml b/detections/endpoint/windows_process_injection_into_notepad.yml index e84f46ba9e..0c8460f12b 100644 --- a/detections/endpoint/windows_process_injection_into_notepad.yml +++ b/detections/endpoint/windows_process_injection_into_notepad.yml @@ -1,7 +1,7 @@ name: Windows Process Injection into Notepad id: b8340d0f-ba48-4391-bea7-9e793c5aae36 -version: 9 -date: '2025-05-02' +version: 10 +date: '2025-09-18' author: Michael Haag, Splunk type: Anomaly status: production @@ -64,6 +64,7 @@ tags: analytic_story: - BishopFox Sliver Adversary Emulation Framework - Earth Alux + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1055.002 diff --git a/detections/endpoint/windows_replication_through_removable_media.yml b/detections/endpoint/windows_replication_through_removable_media.yml index 1de85f1bbf..6f35ec2683 100644 --- a/detections/endpoint/windows_replication_through_removable_media.yml +++ b/detections/endpoint/windows_replication_through_removable_media.yml @@ -1,7 +1,7 @@ name: Windows Replication Through Removable Media id: 60df805d-4605-41c8-bbba-57baa6a4eb97 -version: 11 -date: '2025-05-06' +version: 12 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -66,6 +66,7 @@ tags: - Derusbi - Salt Typhoon - NjRAT + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1091 diff --git a/detections/endpoint/windows_scheduled_task_with_suspicious_command.yml b/detections/endpoint/windows_scheduled_task_with_suspicious_command.yml index af7c1104ea..af01444771 100644 --- a/detections/endpoint/windows_scheduled_task_with_suspicious_command.yml +++ b/detections/endpoint/windows_scheduled_task_with_suspicious_command.yml @@ -1,7 +1,7 @@ name: Windows Scheduled Task with Suspicious Command id: 1f44c126-c26a-4dd3-83bb-0f9a0f03ecc3 -version: 4 -date: '2025-07-16' +version: 5 +date: '2025-09-18' author: Steven Dick status: production type: TTP @@ -79,6 +79,7 @@ tags: - Ryuk Ransomware - Windows Persistence Techniques - Seashell Blizzard + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1053.005 diff --git a/detections/endpoint/windows_scheduled_task_with_suspicious_name.yml b/detections/endpoint/windows_scheduled_task_with_suspicious_name.yml index 550f83c251..6d11687565 100644 --- a/detections/endpoint/windows_scheduled_task_with_suspicious_name.yml +++ b/detections/endpoint/windows_scheduled_task_with_suspicious_name.yml @@ -1,7 +1,7 @@ name: Windows Scheduled Task with Suspicious Name id: 9e9ab4e3-c9d0-4967-a197-6d755e8a7e6e -version: 3 -date: '2025-08-22' +version: 4 +date: '2025-09-18' author: Steven Dick status: production type: TTP @@ -78,6 +78,7 @@ tags: - Ransomware - Ryuk Ransomware - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1053.005 diff --git a/detections/endpoint/windows_screen_capture_in_temp_folder.yml b/detections/endpoint/windows_screen_capture_in_temp_folder.yml index 74130fb62a..ee9e9bee0c 100644 --- a/detections/endpoint/windows_screen_capture_in_temp_folder.yml +++ b/detections/endpoint/windows_screen_capture_in_temp_folder.yml @@ -1,7 +1,7 @@ name: Windows Screen Capture in TEMP folder id: 00524d1f-a032-46f5-9108-e7d9f01bfb3c -version: 5 -date: '2025-05-02' +version: 6 +date: '2025-09-18' author: Teoderick Contreras, Splunk data_source: - Sysmon EventID 11 @@ -57,6 +57,7 @@ tags: analytic_story: - Crypto Stealer - Braodo Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1113 diff --git a/detections/endpoint/windows_screen_capture_via_powershell.yml b/detections/endpoint/windows_screen_capture_via_powershell.yml index 0184331b21..aae7d42800 100644 --- a/detections/endpoint/windows_screen_capture_via_powershell.yml +++ b/detections/endpoint/windows_screen_capture_via_powershell.yml @@ -1,7 +1,7 @@ name: Windows Screen Capture Via Powershell id: 5e0b1936-8f99-4399-8ee2-9edc5b32e170 -version: 8 -date: '2025-06-24' +version: 9 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -56,6 +56,7 @@ rba: threat_objects: [] tags: analytic_story: + - APT37 Rustonotto and FadeStealer - Winter Vivern - Water Gamayun asset_type: Endpoint diff --git a/detections/endpoint/windows_service_created_with_suspicious_service_path.yml b/detections/endpoint/windows_service_created_with_suspicious_service_path.yml index 1e1ce48088..827f8d2065 100644 --- a/detections/endpoint/windows_service_created_with_suspicious_service_path.yml +++ b/detections/endpoint/windows_service_created_with_suspicious_service_path.yml @@ -1,7 +1,7 @@ name: Windows Service Created with Suspicious Service Path id: 429141be-8311-11eb-adb6-acde48001122 -version: 15 -date: '2025-05-02' +version: 16 +date: '2025-09-18' author: Teoderick Contreras, Mauricio Velazco, Splunk status: production type: TTP @@ -66,6 +66,7 @@ tags: - Clop Ransomware - Crypto Stealer - Brute Ratel C4 + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1569.002 diff --git a/detections/endpoint/windows_spearphishing_attachment_onenote_spawn_mshta.yml b/detections/endpoint/windows_spearphishing_attachment_onenote_spawn_mshta.yml index 33d88d0332..02172c4cbc 100644 --- a/detections/endpoint/windows_spearphishing_attachment_onenote_spawn_mshta.yml +++ b/detections/endpoint/windows_spearphishing_attachment_onenote_spawn_mshta.yml @@ -1,7 +1,7 @@ name: Windows Spearphishing Attachment Onenote Spawn Mshta id: 35aeb0e7-7de5-444a-ac45-24d6788796ec -version: 8 -date: '2025-05-02' +version: 9 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -69,6 +69,7 @@ tags: - Spearphishing Attachments - Compromised Windows Host - AsyncRAT + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1566.001 diff --git a/detections/endpoint/windows_suspicious_driver_loaded_path.yml b/detections/endpoint/windows_suspicious_driver_loaded_path.yml index 96eed3d8a1..afccde3e2a 100644 --- a/detections/endpoint/windows_suspicious_driver_loaded_path.yml +++ b/detections/endpoint/windows_suspicious_driver_loaded_path.yml @@ -1,7 +1,7 @@ name: Windows Suspicious Driver Loaded Path id: 2ca1c4a1-8342-4750-9363-905650e0c933 -version: 4 -date: '2025-07-28' +version: 5 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -58,6 +58,7 @@ tags: - BlackByte Ransomware - Snake Keylogger - Interlock Ransomware + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1543.003 diff --git a/detections/endpoint/windows_system_binary_proxy_execution_compiled_html_file_decompile.yml b/detections/endpoint/windows_system_binary_proxy_execution_compiled_html_file_decompile.yml index bbf92809a5..24d1519215 100644 --- a/detections/endpoint/windows_system_binary_proxy_execution_compiled_html_file_decompile.yml +++ b/detections/endpoint/windows_system_binary_proxy_execution_compiled_html_file_decompile.yml @@ -1,7 +1,7 @@ name: Windows System Binary Proxy Execution Compiled HTML File Decompile id: 2acf0e19-4149-451c-a3f3-39cd3c77e37d -version: 10 -date: '2025-05-02' +version: 11 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -73,6 +73,7 @@ tags: - Suspicious Compiled HTML Activity - Living Off The Land - Compromised Windows Host + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1218.001 diff --git a/detections/endpoint/windows_usbstor_registry_key_modification.yml b/detections/endpoint/windows_usbstor_registry_key_modification.yml index ac81263fa6..11b5e05056 100644 --- a/detections/endpoint/windows_usbstor_registry_key_modification.yml +++ b/detections/endpoint/windows_usbstor_registry_key_modification.yml @@ -1,7 +1,7 @@ name: Windows USBSTOR Registry Key Modification id: a345980a-417d-4ed3-9fb4-cac30c9405a0 -version: 3 -date: '2025-05-02' +version: 4 +date: '2025-09-18' author: Steven Dick status: production type: Anomaly @@ -68,6 +68,7 @@ rba: tags: analytic_story: - Data Protection + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1200 diff --git a/detections/endpoint/windows_user_execution_malicious_url_shortcut_file.yml b/detections/endpoint/windows_user_execution_malicious_url_shortcut_file.yml index de6c079f0e..31573d9fa1 100644 --- a/detections/endpoint/windows_user_execution_malicious_url_shortcut_file.yml +++ b/detections/endpoint/windows_user_execution_malicious_url_shortcut_file.yml @@ -1,7 +1,7 @@ name: Windows User Execution Malicious URL Shortcut File id: 5c7ee6ad-baf4-44fb-b2f0-0cfeddf82dbc -version: 9 -date: '2025-07-16' +version: 10 +date: '2025-09-18' author: Teoderick Contreras, Nasreddine Bencherchali, Splunk status: production type: Anomaly @@ -64,6 +64,7 @@ tags: - NjRAT - Quasar RAT - Snake Keylogger + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1204.002 diff --git a/detections/endpoint/windows_wpdbusenum_registry_key_modification.yml b/detections/endpoint/windows_wpdbusenum_registry_key_modification.yml index 72d48eaadd..f77db48d24 100644 --- a/detections/endpoint/windows_wpdbusenum_registry_key_modification.yml +++ b/detections/endpoint/windows_wpdbusenum_registry_key_modification.yml @@ -1,7 +1,7 @@ name: Windows WPDBusEnum Registry Key Modification id: 52b48e8b-eb6e-48b0-b8f1-73273f6b134e -version: 3 -date: '2025-05-02' +version: 4 +date: '2025-09-18' author: Steven Dick status: production type: Anomaly @@ -71,6 +71,7 @@ rba: tags: analytic_story: - Data Protection + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1200 diff --git a/detections/endpoint/winevent_scheduled_task_created_within_public_path.yml b/detections/endpoint/winevent_scheduled_task_created_within_public_path.yml index cf27c1b60c..b945c0b5cb 100644 --- a/detections/endpoint/winevent_scheduled_task_created_within_public_path.yml +++ b/detections/endpoint/winevent_scheduled_task_created_within_public_path.yml @@ -1,7 +1,7 @@ name: WinEvent Scheduled Task Created Within Public Path id: 5d9c6eee-988c-11eb-8253-acde48001122 -version: 18 -date: '2025-08-22' +version: 19 +date: '2025-09-18' author: Michael Haag, Splunk status: production type: TTP @@ -77,6 +77,7 @@ tags: - AsyncRAT - Windows Persistence Techniques - 0bj3ctivity Stealer + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1053.005 diff --git a/detections/web/multiple_archive_files_http_post_traffic.yml b/detections/web/multiple_archive_files_http_post_traffic.yml index 41e9630b9d..00393228a4 100644 --- a/detections/web/multiple_archive_files_http_post_traffic.yml +++ b/detections/web/multiple_archive_files_http_post_traffic.yml @@ -1,7 +1,7 @@ name: Multiple Archive Files Http Post Traffic id: 4477f3ea-a28f-11eb-b762-acde48001122 -version: 7 -date: '2025-05-02' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -57,6 +57,7 @@ tags: analytic_story: - Data Exfiltration - Command And Control + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1048.003 diff --git a/detections/web/plain_http_post_exfiltrated_data.yml b/detections/web/plain_http_post_exfiltrated_data.yml index 0fbbd09cc3..cb9bafc47b 100644 --- a/detections/web/plain_http_post_exfiltrated_data.yml +++ b/detections/web/plain_http_post_exfiltrated_data.yml @@ -1,7 +1,7 @@ name: Plain HTTP POST Exfiltrated Data id: e2b36208-a364-11eb-8909-acde48001122 -version: 7 -date: '2025-05-02' +version: 8 +date: '2025-09-18' author: Teoderick Contreras, Splunk status: production type: TTP @@ -52,6 +52,7 @@ tags: analytic_story: - Data Exfiltration - Command And Control + - APT37 Rustonotto and FadeStealer asset_type: Endpoint mitre_attack_id: - T1048.003 diff --git a/stories/apt37_rustonotto_and_fadestealer.yml b/stories/apt37_rustonotto_and_fadestealer.yml new file mode 100644 index 0000000000..bd41d6b184 --- /dev/null +++ b/stories/apt37_rustonotto_and_fadestealer.yml @@ -0,0 +1,18 @@ +name: APT37 Rustonotto and FadeStealer +id: c1dd540c-b8a0-4818-af92-7d53571fecb0 +version: 2 +status: production +date: '2025-09-18' +author: Michael Haag, Splunk +description: APT37 is a North Korean aligned threat actor that continues to evolve its Windows tradecraft by combining a Rust backdoor, a PowerShell stage, and a Python based loader to deploy the FadeStealer surveillance tool. Recent activity relies on spear phishing attachments that deliver Windows shortcut or compiled HTML Help files, which stage artifacts in ProgramData and establish persistence through scheduled tasks and Run key modifications. The campaign centralizes command and control on a single server and uses standard web protocols with Base64 and XOR encoding to move data and instructions. +narrative: The intrusion chain begins with phishing delivered archives that drop a Windows shortcut or CHM file to launch simple stagers. These stagers connect to a single C2 to fetch additional components and write them to ProgramData, where a task named MicrosoftUpdate and a Run entry are created for persistence. Rustonotto, a Rust compiled backdoor, provides basic command execution while a PowerShell variant known as Chinotto may be used interchangeably for early control. During hands on keyboard activity the actor retrieves a CAB archive and expands it on disk, then launches a legitimate Python module that side loads a compiled Python component internally named TransactedHollowing.py. This module reads a Base64 encoded and XOR encrypted payload from disk, decrypts it, and performs Process Doppelgänging via Windows Transactional NTFS to map the payload into a suspended legitimate process and pivot execution through thread context manipulation. Once resident, FadeStealer activates keylogging, screen capture, and device monitoring features and exfiltrates collected data as password protected RAR archives over HTTP to the same controller. The observed behaviors offer multiple opportunities for detection, including CHM and LNK execution, staging and expansion in ProgramData, scheduled task and Run key persistence, Python loader decode patterns, TxF backed section mapping, and RAR based exfiltration over web protocols. +references: +- https://www.zscaler.com/blogs/security-research/apt37-targets-windows-rust-backdoor-and-python-loader +tags: + category: + - Adversary Tactics + product: + - Splunk Enterprise + - Splunk Enterprise Security + - Splunk Cloud + usecase: Advanced Threat Detection \ No newline at end of file