Added detection for .pri files
"FoggyWeb is stored in the encrypted file Windows.Data.TimeZones.zh-PH.pri, while the malicious file version.dll can be described as its loader."
I don't think that this works. The .pri doesn't get loaded as a DLL but gets opened by the malicious DLL. I don't think it would appear as an ImageLoad event.
I don't think that this works. The
.pridoesn't get loaded as a DLL but gets opened by the malicious DLL. I don't think it would appear as an ImageLoad event.
In the ref
After compromising an AD FS server, NOBELIUM was observed dropping the following two files on the system (administrative privileges are required to write these files to the folders listed below): %WinDir%\ADFS\version.dll %WinDir%\SystemResources\Windows.Data.TimeZones\pris\Windows.Data.TimeZones.zh-PH.pri
So it is a file_event rule and the sysmon directive to write if need