Skip to content

Commit 76f4a42

Browse files
swachchhanda000nasbenchphantinuss
authored
Merge PR #5854 from @swachchhanda000 - Add Notepad++ Infrastructure Abuse Rules
new: Notepad++ Updater DNS Query to Uncommon Domains new: Uncommon File Created by Notepad++ Updater Gup.EXE new: Suspicious Child Process of Notepad++ Updater - GUP.Exe --------- Co-authored-by: nasbench <nbencher@cisco.com> Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
1 parent fb37712 commit 76f4a42

File tree

3 files changed

+138
-0
lines changed

3 files changed

+138
-0
lines changed
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
title: Notepad++ Updater DNS Query to Uncommon Domains
2+
id: 2074e137-1b73-4e2d-88ba-5a3407dbdce0
3+
status: experimental
4+
description: |
5+
Detects when the Notepad++ updater (gup.exe) makes DNS queries to domains that are not part of the known legitimate update infrastructure.
6+
This could indicate potential exploitation of the updater mechanism or suspicious network activity that warrants further investigation.
7+
references:
8+
- https://notepad-plus-plus.org/news/v889-released/
9+
- https://www.heise.de/en/news/Notepad-updater-installed-malware-11109726.html
10+
- https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
11+
- https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
12+
- https://securelist.com/notepad-supply-chain-attack/118708/
13+
author: Swachchhanda Shrawan Poudel (Nextron Systems)
14+
date: 2026-02-02
15+
tags:
16+
- attack.collection
17+
- attack.credential-access
18+
- attack.t1195.002
19+
- attack.initial-access
20+
- attack.t1557
21+
logsource:
22+
category: dns_query
23+
product: windows
24+
detection:
25+
selection:
26+
Image|endswith: '\gup.exe'
27+
filter_main_notepad_legit_domain:
28+
QueryName: 'notepad-plus-plus.org'
29+
filter_optional_sourceforge_legit_domain:
30+
QueryName|endswith: '.sourceforge.net'
31+
filter_optional_github_legit_domain:
32+
- QueryName|endswith: '.githubusercontent.com'
33+
- QueryName: 'github.com'
34+
filter_optional_google_storage_legit_domain:
35+
QueryName|endswith: '.googleapis.com'
36+
# Add other known legitimate domains if any
37+
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
38+
falsepositives:
39+
- Some legitimate network misconfigurations or proxy issues causing unexpected DNS queries.
40+
- Other legitimate query to official domains not listed in the filter, needing tuning.
41+
level: medium # can be upgraded to high after tuning with known legitimate DNS queries
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
title: Uncommon File Created by Notepad++ Updater Gup.EXE
2+
id: 3b8f4c92-6a51-4d7e-9c3a-8e2d1f5a7b09
3+
status: experimental
4+
description: |
5+
Detects when the Notepad++ updater (gup.exe) creates files in suspicious or uncommon locations.
6+
This could indicate potential exploitation of the updater component to deliver unwanted malware or unwarranted files.
7+
references:
8+
- https://notepad-plus-plus.org/news/v889-released/
9+
- https://www.heise.de/en/news/Notepad-updater-installed-malware-11109726.html
10+
- https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
11+
- https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
12+
- https://securelist.com/notepad-supply-chain-attack/118708/
13+
author: Swachchhanda Shrawan Poudel (Nextron Systems)
14+
date: 2026-02-03
15+
tags:
16+
- attack.collection
17+
- attack.credential-access
18+
- attack.t1195.002
19+
- attack.initial-access
20+
- attack.t1557
21+
logsource:
22+
category: file_event
23+
product: windows
24+
detection:
25+
selection:
26+
Image|endswith: '\gup.exe'
27+
filter_main_legit_paths:
28+
TargetFilename|startswith:
29+
- 'C:\Program Files\Notepad++\'
30+
- 'C:\Program Files (x86)\Notepad++\'
31+
filter_main_temp_update_installer:
32+
TargetFilename|startswith: 'C:\Users\'
33+
TargetFilename|contains|all:
34+
- '\AppData\Local\Temp\'
35+
- 'npp.'
36+
- '.Installer.'
37+
- '.exe'
38+
filter_main_temp_generic_zip:
39+
TargetFilename|startswith: 'C:\Users\'
40+
TargetFilename|contains|all:
41+
- '\AppData\Local\Temp\'
42+
- '.zip'
43+
filter_main_recycle_bin:
44+
TargetFilename|startswith: 'C:\$Recycle.Bin\S-1-5-21'
45+
condition: selection and not 1 of filter_main_*
46+
falsepositives:
47+
- Custom or portable Notepad++ installations in non-standard directories.
48+
- Legitimate update processes creating temporary files in unexpected locations.
49+
level: high
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
title: Suspicious Child Process of Notepad++ Updater - GUP.Exe
2+
id: bb0e87ce-c89f-4857-84fa-095e4483e9cb
3+
status: experimental
4+
description: |
5+
Detects suspicious child process creation by the Notepad++ updater process (gup.exe).
6+
This could indicate potential exploitation of the updater component to deliver unwanted malware.
7+
references:
8+
- https://notepad-plus-plus.org/news/v889-released/
9+
- https://www.heise.de/en/news/Notepad-updater-installed-malware-11109726.html
10+
- https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
11+
- https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
12+
- https://securelist.com/notepad-supply-chain-attack/118708/
13+
author: Swachchhanda Shrawan Poudel (Nextron Systems)
14+
date: 2026-02-03
15+
tags:
16+
- attack.collection
17+
- attack.credential-access
18+
- attack.t1195.002
19+
- attack.initial-access
20+
- attack.t1557
21+
logsource:
22+
category: process_creation
23+
product: windows
24+
detection:
25+
selection_parent:
26+
ParentImage|endswith: '\gup.exe'
27+
selection_child_img:
28+
Image|endswith:
29+
- '\cmd.exe'
30+
- '\powershell.exe'
31+
- '\pwsh.exe'
32+
- '\cscript.exe'
33+
- '\wscript.exe'
34+
- '\mshta.exe'
35+
selection_child_cli:
36+
CommandLine|contains:
37+
- 'bitsadmin'
38+
- 'certutil'
39+
- 'curl'
40+
- 'finger'
41+
- 'forfiles'
42+
- 'regsvr32'
43+
- 'rundll32'
44+
- 'wget'
45+
condition: selection_parent and 1 of selection_child_*
46+
falsepositives:
47+
- Unlikely
48+
level: high

0 commit comments

Comments
 (0)