title: Exploit for CVE-2017-0261 id: 864403a1-36c9-40a2-a982-4c9a45f7d833 status: test description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262 references: - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html author: Florian Roth (Nextron Systems) date: 2018-02-22 modified: 2021-11-27 tags: - attack.execution - attack.t1203 - attack.t1204.002 - attack.initial-access - attack.t1566.001 - cve.2017-0261 - detection.emerging-threats logsource: category: process_creation product: windows detection: selection: ParentImage|endswith: '\WINWORD.EXE' Image|contains: '\FLTLDR.exe' condition: selection falsepositives: - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders) level: medium