Skip to content

Google Chronicle (SecOps)

Category
SIEM
Stage
planning

Need This?

Open a ticket or reach out to initiate the integration of this technology 🎉

Example

rule malware_httpbrowser
{
  meta:
    author = "Google Cloud Security"
    description = "HTTPBrowser malware"
    reference1 = "https://attack.mitre.org/software/S0070/"
    reference2 = "https://www.zscaler.com/blogs/research/chinese-cyber-espionage-apt-group-leveraging-recently-leaked-hacking-team-exploits-target-financial-services-firm"
    yara_version = "YL2.0"
    rule_version = "1.0"

  events:
    (
      $e1.metadata.event_type = "REGISTRY_CREATION" and
      re.regex($e1.target.registry.registry_key, `(HKCU|HKEY_CURRENT_USER)\\Software\\Microsoft\\Windows\\CurrentVersion\\Run`) nocase and
      $e1.target.registry.registry_value_name = "wdm" nocase
    )
    or
    (
      $e1.metadata.event_type = "FILE_CREATION" and
      re.regex($e1.target.file.full_path, `\\vpdn\\VPDN_LU.exe$`) nocase
    )
    or
    (
      $e1.network.http.user_agent = "HttpBrowser/1.0" and
      re.regex($e1.target.url, `/.*c=.*&l=.*&o=.*&u=.*&r=`)
    )

  condition:
    $e1
}

Source: https://github.com/chronicle/detection-rules/blob/main/malware/httpbrowser.yaral