cortado/rtas/suspicious_child_exchange_um.py (21 lines of code) (raw):
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
import logging
from . import OSType, RuleMetadata, _common, register_code_rta
log = logging.getLogger(__name__)
@register_code_rta(
id="9f58f9e7-a0f5-48e6-a924-d437fd626195",
name="suspicious_child_exchange_um",
platforms=[OSType.WINDOWS],
endpoint_rules=[],
siem_rules=[
RuleMetadata(
id="483c4daf-b0c6-49e0-adf3-0bfa93231d6b", name="Microsoft Exchange Server UM Spawning Suspicious Processes"
)
],
techniques=["T1190"],
)
def main():
umservice = "C:\\Users\\Public\\umservice.exe"
EXE_FILE = _common.get_resource_path("bin/renamed_posh.exe")
_common.copy_file(EXE_FILE, umservice)
_ = _common.execute_command([umservice, "/c", str(EXE_FILE)], timeout_secs=5)
_common.remove_files([umservice])