EXPLORE
← Back to Explore
sigmahighHunting

PUA - Seatbelt Execution

Detects the execution of the PUA/Recon tool Seatbelt via PE information of command line parameters

MITRE ATT&CK

discovery

Detection Query

selection_img:
  - Image|endswith: \Seatbelt.exe
  - OriginalFileName: Seatbelt.exe
  - Description: Seatbelt
  - CommandLine|contains:
      - " DpapiMasterKeys"
      - " InterestingProcesses"
      - " InterestingFiles"
      - " CertificateThumbprints"
      - " ChromiumBookmarks"
      - " ChromiumHistory"
      - " ChromiumPresence"
      - " CloudCredentials"
      - " CredEnum"
      - " CredGuard"
      - " FirefoxHistory"
      - " ProcessCreationEvents"
selection_group_list:
  CommandLine|contains:
    - " -group=misc"
    - " -group=remote"
    - " -group=chromium"
    - " -group=slack"
    - " -group=system"
    - " -group=user"
    - " -group=all"
selection_group_output:
  CommandLine|contains: " -outputfile="
condition: selection_img or all of selection_group_*

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2022-10-18

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.discoveryattack.t1526attack.t1087attack.t1083
Raw Content
title: PUA - Seatbelt Execution
id: 38646daa-e78f-4ace-9de0-55547b2d30da
status: test
description: Detects the execution of the PUA/Recon tool Seatbelt via PE information of command line parameters
references:
    - https://github.com/GhostPack/Seatbelt
    - https://www.bluetangle.dev/2022/08/fastening-seatbelt-on-threat-hunting.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-10-18
modified: 2023-02-04
tags:
    - attack.discovery
    - attack.t1526
    - attack.t1087
    - attack.t1083
logsource:
    category: process_creation
    product: windows
detection:
    selection_img:
        - Image|endswith: '\Seatbelt.exe'
        - OriginalFileName: 'Seatbelt.exe'
        - Description: 'Seatbelt'
        - CommandLine|contains:
              # This just a list of the commands that will produce the least amount of FP in "theory"
              # Comment out/in as needed in your environment
              # To get the full list of commands see reference section
              - ' DpapiMasterKeys'
              - ' InterestingProcesses'
              - ' InterestingFiles'
              - ' CertificateThumbprints'
              - ' ChromiumBookmarks'
              - ' ChromiumHistory'
              - ' ChromiumPresence'
              - ' CloudCredentials'
              - ' CredEnum'
              - ' CredGuard'
              - ' FirefoxHistory'
              - ' ProcessCreationEvents'
              # - ' RDPSessions'
              # - ' PowerShellHistory'
    selection_group_list:
        CommandLine|contains:
            - ' -group=misc'
            - ' -group=remote'
            - ' -group=chromium'
            - ' -group=slack'
            - ' -group=system'
            - ' -group=user'
            - ' -group=all'
    selection_group_output:
        CommandLine|contains: ' -outputfile='
    condition: selection_img or all of selection_group_*
falsepositives:
    - Unlikely
level: high