""ET TROJAN HermeticWizard - WMI Spreader - Remote Process Creation M1""

SID: 2035418

Revision: 3

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, created_at 2022_03_09, deployment Internal, deployment Datacenter, malware_family HermeticWizard, signature_severity Major, updated_at 2022_03_15

Reference:

  • md5

  • 517d2b385b846d6ea13b75b8adceb061

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "|05 00 00|"

  • Value: "W|00|i|00|n|00|3|00|2|00|_|00|P|00|r|00|o|00|c|00|e|00|s|00|s|00|"

  • Value: "C|00|r|00|e|00|a|00|t|00|e|00|"

  • Value: "regsvr32|2e|exe|20 2f|s|20 2f|i|20|"

  • Value: "|5c|c"

  • Value: "|2e|dll|00|"

Within: 5

PCRE: "/^[A-F0-9]{12}/R"

Special Options:

  • fast_pattern

source