mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
Merge pull request #1092 from zBlurr/win_susp_sqldumper_activity
[OSCD] Sqldumper.exe LOLbin
This commit is contained in:
commit
33c80b8428
@ -1,25 +0,0 @@
|
|||||||
title: Application Whitelisting Bypass via PresentationHost.exe
|
|
||||||
id: d149a338-ae47-408e-a8ff-9064220c0b34
|
|
||||||
description: Detects defence evasion attempt via PresentationHost.exe to run malicious .xbap file
|
|
||||||
status: experimental
|
|
||||||
references:
|
|
||||||
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Presentationhost.yml
|
|
||||||
- https://medium.com/tsscyber/applocker-bypass-presentationhost-exe-8c87b2354cd4
|
|
||||||
- https://lolbas-project.github.io/lolbas/Binaries/Presentationhost/
|
|
||||||
author: Kirill Kiryanov, oscd.community
|
|
||||||
date: 2020/10/08
|
|
||||||
tags:
|
|
||||||
- attack.defense_evasion
|
|
||||||
- attack.t1218
|
|
||||||
- attack.execution
|
|
||||||
logsource:
|
|
||||||
category: process_creation
|
|
||||||
product: windows
|
|
||||||
detection:
|
|
||||||
selection:
|
|
||||||
Image|endswith: '\presentationhost.exe'
|
|
||||||
CommandLine|contains: '.xbap'
|
|
||||||
condition: selection
|
|
||||||
level: medium
|
|
||||||
falsepositives:
|
|
||||||
- Unknown
|
|
@ -0,0 +1,28 @@
|
|||||||
|
title: Dumping Process via Sqldumper.exe
|
||||||
|
id: 23ceaf5c-b6f1-4a32-8559-f2ff734be516
|
||||||
|
description: Detects process dump via legitimate sqldumper.exe binary
|
||||||
|
status: experimental
|
||||||
|
references:
|
||||||
|
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OtherMSBinaries/Sqldumper.yml
|
||||||
|
- https://twitter.com/countuponsec/status/910977826853068800
|
||||||
|
- https://twitter.com/countuponsec/status/910969424215232518
|
||||||
|
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Sqldumper/
|
||||||
|
author: Kirill Kiryanov, oscd.community
|
||||||
|
date: 2020/10/08
|
||||||
|
tags:
|
||||||
|
- attack.credential_access
|
||||||
|
- attack.t1003.001
|
||||||
|
logsource:
|
||||||
|
category: process_creation
|
||||||
|
product: windows
|
||||||
|
detection:
|
||||||
|
selection:
|
||||||
|
Image|endswith: '\sqldumper.exe'
|
||||||
|
CommandLine|contains:
|
||||||
|
- '0x0110'
|
||||||
|
- '0x01100:40'
|
||||||
|
condition: selection
|
||||||
|
falsepositives:
|
||||||
|
- Legitimate MSSQL Server actions
|
||||||
|
level: medium
|
||||||
|
|
Loading…
Reference in New Issue
Block a user