Overview

Simulates CLOP ransomware service installation events. CLOP is a sophisticated ransomware family that uses specific service names ('SecurityCenterIBM', 'WinCheckDRVs') for persistence and privilege escalation. This template generates events matching known CLOP TTPs for detection rule testing and SOC training.

When Generated:
  • During CLOP ransomware deployment phase
  • For persistence establishment on compromised Windows systems
  • In red team exercises simulating CLOP campaign tactics
  • For detection rule validation and SOC analyst training
Security Relevance: Critical
Compliance: MITRE ATT&CK T1543.003 (Create or Modify System Process: Windows Service) NIST Cybersecurity Framework - Detect (DE.CM) SANS TOP 20 Critical Security Controls PCI DSS Requirement 10 (Logging and Monitoring)
Frequency Notes: Very low frequency in legitimate environments - any occurrence should trigger immediate investigation

Resources

Tools

Generation Configuration

Base Frequency: 0.2 events/hour
Time Patterns: business_hours night_hours weekend
Business Hours Multiplier: 1.5x
Night Hours Multiplier: 2.0x
Weekend Multiplier: 1.8x