Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain
title: Phishing Pattern ISO in Archive
id: fcdf69e5-a3d3-452a-9724-26f2308bf2b1
status: test
description: Detects cases in which an ISO files is opend within an archiver like 7Zip or Winrar, which is a sign of phishing as threat actors put small ISO files in archives as email attachments to bypass certain filters and protective measures (mark of web)
references:
- https://twitter.com/1ZRR4H/status/1534259727059787783
- https://app.any.run/tasks/e1fe6a62-bce8-4323-a49a-63795d9afd5d/
author: Florian Roth (Nextron Systems)
date: 2022-06-07
tags:
- attack.initial-access
- attack.t1566
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\Winrar.exe'
- '\7zFM.exe'
- '\peazip.exe'
Image|endswith:
- '\isoburn.exe'
- '\PowerISO.exe'
- '\ImgBurn.exe'
condition: selection
falsepositives:
- Legitimate cases in which archives contain ISO or IMG files and the user opens the archive and the image via clicking and not extraction
level: high
imProcessCreate
| where ((ParentProcessName endswith "\\Winrar.exe" or ParentProcessName endswith "\\7zFM.exe" or ParentProcessName endswith "\\peazip.exe") or (ActingProcessName endswith "\\Winrar.exe" or ActingProcessName endswith "\\7zFM.exe" or ActingProcessName endswith "\\peazip.exe")) and (TargetProcessName endswith "\\isoburn.exe" or TargetProcessName endswith "\\PowerISO.exe" or TargetProcessName endswith "\\ImgBurn.exe")
| Sentinel Table | Notes |
|---|---|
imProcessCreate | Ensure this data connector is enabled |