Skip to content

Latest commit

 

History

History
12 lines (10 loc) · 1.9 KB

r_m_cisco_npe_Ransomware.md

File metadata and controls

12 lines (10 loc) · 1.9 KB

Vendor: Cisco

Product: NPE

Use-Case: Ransomware

Rules Models MITRE ATT&CK® TTPs Event Types Parsers
5 0 8 1 1
Event Type Rules Models
process-created T1070 - Indicator Removal on Host
A-Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected on this asset.
Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected.

T1003.001 - T1003.001
A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset
NotPetya-Activity: NotPetya Ransomware Activity detected

T1070.001 - Indicator Removal on Host: Clear Windows Event Logs
A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset
NotPetya-Activity: NotPetya Ransomware Activity detected

T1218.011 - Signed Binary Proxy Execution: Rundll32
A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset
NotPetya-Activity: NotPetya Ransomware Activity detected

T1059.003 - T1059.003
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1486 - Data Encrypted for Impact
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1490 - Inhibit System Recovery
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset