← Back to Explore
sigmacriticalHunting
Moriya Rootkit - System
Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report
Detection Query
selection:
Provider_Name: Service Control Manager
EventID: 7045
ServiceName: ZzNetSvc
condition: selection
Author
Bhabesh Raj
Created
2021-05-06
Data Sources
windowssystem
Platforms
windows
Tags
attack.persistenceattack.privilege-escalationattack.t1543.003
Raw Content
title: Moriya Rootkit - System
id: 25b9c01c-350d-4b95-bed1-836d04a4f324
status: test
description: Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report
references:
- https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831
author: Bhabesh Raj
date: 2021-05-06
modified: 2022-11-29
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1543.003
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName: ZzNetSvc
condition: selection
falsepositives:
- Unknown
level: critical