Detects the existence of FakeUpdate .zip file, commonly associated with SocGholish malware family. Javascript file (.js) is usually hidden inside the .zip file
Example:
Edge.6ebddd.zip Edge.7a859a.zip
Related
https://www.secureworks.com/research/threat-profiles/gold-prelude
Reference:
https://redcanary.com/threat-detection-report/threats/socgholish/
https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems
{{ mitre("T1189") }}
Data Source(s): File
DeviceFileEvents
| where FileName matches regex @"Edge\\.[a-z0-9]{6}\\.zip" or FileName matches regex @"Chrome\\.Update\\.[a-z0-9]{6}\\.zip" or FileName matches regex @"FireFox\\.Update\\.[a-z0-9]{6}\\.zip" or FileName matches regex @"download\\.[a-z0-9]{6}\\.zip"
| where InitiatingProcessFileName <> "MsSense.exe" //Exclude files detected by Defender for Endpoint
- Examine the FileOriginUrl field and determine whether it's suspicious/ malicious
- Delete the malicious file
- Determine whether user have clicked the file/ not
Unknown
Version 1.0 (date: 22/08/2023)