-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add rule: rules/windows/file/file_event/file_event_win_cve_2023_27363… #4239
Conversation
…7363_foxit_pdf.yml
…in_foxit_cve_2023_27363.yml
file_event_win_startup_folder_file_write is a general detection for files being created in the Windows startup directory. Can write the rule more generic, I think of 2 possible way:
|
The rule: file_event_win_cve_2023_27363.yml is in order to hunt malicious PDFs in VirusTotal, and due to the limitation of CVE-2023-27363, only .hta extension is allowed to trigger RCE. However, generic rule can not hunt the specific kind of attack. |
Thanks for the contribution @greg-workspace and sorry this took so long. |
…_foxit_pdf.yml
Summary of the Pull Request
This PR adds a new rule for CVE-2023-27363 exploitation
Changelog
new: Potential CVE-2023-27363 Exploitation - HTA File Creation By FoxitPDFReader
Example Log Event
Fixed Issues
N/A
SigmaHQ Rule Creation Conventions