heroui logo

Clop Common Exec Parameter

Splunk Security Content

View Source
Summary
The "Clop Common Exec Parameter" detection rule is designed to identify the execution of CLOP ransomware variants through the monitoring of specific command-line arguments used during process execution. The rule focuses on key identifiers such as the arguments "runrun" and "temp.dat", leveraging data collected from Endpoint Detection and Response (EDR) tools like Sysmon and Windows Event Logs. By examining process names and their associated command-line parameters, the detection mechanism aims to uncover behaviors indicative of ransomware activity that could lead to the encryption of sensitive files on both local and networked systems. The importance of this detection lies in its ability to flag potentially malicious actions that warrant immediate investigation to prevent significant data loss and operational disruptions caused by encrypted files.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1204
Created: 2024-12-10