heroui logo

Potential Ransomware Note File Dropped via SMB

Elastic Detection Rules

View Source
Summary
This rule detects potential ransomware activity by identifying incoming SMB (Server Message Block) connections that are immediately followed by the creation of files named similarly to common ransomware notes. It aims to alert security teams to potential remote ransomware attacks exploiting SMB protocol vulnerabilities. The rule uses EQL (Event Query Language) to analyze network and file creation events on Windows hosts. Specifically, it tracks connections made to port 445 and monitors for the creation of certain file types (e.g., .txt, .hta) that typically accompany ransomware demands. The rule also considers unusual source IPs and provides remediation steps to respond to potential incidents, emphasizing the importance of isolating hosts and investigating user activity in the event of a trigger.
Categories
  • Endpoint
Data Sources
  • Network Traffic
  • File
ATT&CK Techniques
  • T1485
  • T1490
  • T1021
  • T1021.002
Created: 2024-05-02