
Summary
This detection rule monitors the execution of Wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non-default locations that may indicate potentially malicious activity, particularly related to the Bumblebee malware. By focusing on processes that do not conform to the expected paths where these executables are typically found, it aims to catch instances when they may be utilized in an unconventional manner during an attack. This is especially significant given the association of these tools with techniques for bypassing defenses and gaining elevated privileges. The logic of the rule is straightforward; it searches for any instances of these executables being executed while ensuring that such execution does not occur from the standard installation directories. As detailed in the references, Bumblebee is known for abusing legitimate Windows tools, making this rule particularly useful for safeguarding against its tactics.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- Process
Created: 2022-08-12