Detects the expansion or decompression of cabinet files from potentially suspicious or uncommon locations, e.g. seen in Iranian MeteorExpress related attacks
title: Potentially Suspicious Cabinet File Expansion
id: 9f107a84-532c-41af-b005-8d12a607639f
status: test
description: Detects the expansion or decompression of cabinet files from potentially suspicious or uncommon locations, e.g. seen in Iranian MeteorExpress related attacks
references:
- https://labs.sentinelone.com/meteorexpress-mysterious-wiper-paralyzes-iranian-trains-with-epic-troll
- https://blog.malwarebytes.com/threat-intelligence/2021/08/new-variant-of-konni-malware-used-in-campaign-targetting-russia/
author: Bhabesh Raj, X__Junior (Nextron Systems)
date: 2021-07-30
modified: 2024-11-13
tags:
- attack.stealth
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection_cmd:
Image|endswith: '\expand.exe'
CommandLine|contains|windash: '-F:'
selection_folders_1:
CommandLine|contains:
- ':\Perflogs\'
- ':\ProgramData'
- ':\Users\Public\'
- ':\Windows\Temp\'
- '\Admin$\'
- '\AppData\Local\Temp\'
- '\AppData\Roaming\'
- '\C$\'
- '\Temporary Internet'
selection_folders_2:
- CommandLine|contains|all:
- ':\Users\'
- '\Favorites\'
- CommandLine|contains|all:
- ':\Users\'
- '\Favourites\'
- CommandLine|contains|all:
- ':\Users\'
- '\Contacts\'
filter_optional_dell:
# Launched by Dell ServiceShell.exe
ParentImage: 'C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe'
CommandLine|contains: 'C:\ProgramData\Dell\UpdateService\Temp\'
condition: selection_cmd and 1 of selection_folders_* and not 1 of filter_optional_*
falsepositives:
- System administrator Usage
level: medium
imProcessCreate
| where (TargetProcessName endswith "\\expand.exe" and (TargetProcessCommandLine contains "-F:" or TargetProcessCommandLine contains "/F:" or TargetProcessCommandLine contains "–F:" or TargetProcessCommandLine contains "—F:" or TargetProcessCommandLine contains "―F:")) and ((TargetProcessCommandLine contains ":\\Perflogs\\" or TargetProcessCommandLine contains ":\\ProgramData" or TargetProcessCommandLine contains ":\\Users\\Public\\" or TargetProcessCommandLine contains ":\\Windows\\Temp\\" or TargetProcessCommandLine contains "\\Admin$\\" or TargetProcessCommandLine contains "\\AppData\\Local\\Temp\\" or TargetProcessCommandLine contains "\\AppData\\Roaming\\" or TargetProcessCommandLine contains "\\C$\\" or TargetProcessCommandLine contains "\\Temporary Internet") or ((TargetProcessCommandLine contains ":\\Users\\" and TargetProcessCommandLine contains "\\Favorites\\") or (TargetProcessCommandLine contains ":\\Users\\" and TargetProcessCommandLine contains "\\Favourites\\") or (TargetProcessCommandLine contains ":\\Users\\" and TargetProcessCommandLine contains "\\Contacts\\"))) and (not(((ParentProcessName =~ "C:\\Program Files (x86)\\Dell\\UpdateService\\ServiceShell.exe" or ActingProcessName =~ "C:\\Program Files (x86)\\Dell\\UpdateService\\ServiceShell.exe") and TargetProcessCommandLine contains "C:\\ProgramData\\Dell\\UpdateService\\Temp\\")))
| Sentinel Table | Notes |
|---|---|
imProcessCreate | Ensure this data connector is enabled |