Merge branch 'SigmaHQ:master' into master

This commit is contained in:
Cyb3rEng 2021-09-07 19:58:09 -06:00 committed by GitHub
commit 932b7cf2ba
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
181 changed files with 1871 additions and 298 deletions

View File

@ -12,8 +12,7 @@ logsource:
service: cloudtrail service: cloudtrail
detection: detection:
selection: selection:
eventSource: sts.amazonaws.com userIdentity.type: AssumedRole
eventName: AssumeRole
userIdentity.sessionContext.sessionIssuer.type: Role userIdentity.sessionContext.sessionIssuer.type: Role
condition: selection condition: selection
level: low level: low

View File

@ -15,11 +15,11 @@ detection:
eventSource: iam.amazonaws.com eventSource: iam.amazonaws.com
eventName: UpdateLoginProfile eventName: UpdateLoginProfile
filter: filter:
userIdentity.arn|contains: responseElements.accessKey.userName userIdentity.arn|contains: requestParameters.userName
condition: selection_source and not filter condition: selection_source and not filter
fields: fields:
- userIdentity.arn - userIdentity.arn
- responseElements.accessKey.userName - requestParameters.userName
- errorCode - errorCode
- errorMessage - errorMessage
falsepositives: falsepositives:

View File

@ -0,0 +1,21 @@
title: Azure Application Credential Modified
id: cdeef967-f9a1-4375-90ee-6978c5f23974
description: Identifies when a application credential is modified.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/02
references:
- https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/
logsource:
service: azure.activitylogs
detection:
selection:
properties.message: "Update application - Certificates and secrets management"
condition: selection
level: medium
tags:
- attack.impact
falsepositives:
- Application credential added may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application credential added from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,23 @@
title: Azure Application Deleted
id: 410d2a41-1e6d-452f-85e5-abdd8257a823
description: Identifies when a application is deleted in Azure.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/03
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource:
service: azure.activitylogs
detection:
selection:
properties.message:
- Delete application
- Hard Delete application
condition: selection
level: medium
tags:
- attack.defense_evasion
falsepositives:
- Application being deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,21 @@
title: Azure Device No Longer Managed or Compliant
id: 542b9912-c01f-4e3f-89a8-014c48cdca7d
description: Identifies when a device in azure is no longer managed or compliant
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/03
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
logsource:
service: azure.activitylogs
detection:
selection:
properties.message:
- Device no longer compliant
- Device no longer managed
condition: selection
level: medium
tags:
- attack.impact
falsepositives:
- Administrator may have forgotten to review the device.

View File

@ -0,0 +1,25 @@
title: Azure Device or Configuration Modified or Deleted
id: 46530378-f9db-4af9-a9e5-889c177d3881
description: Identifies when a device or device configuration in azure is modified or deleted.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/03
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#core-directory
logsource:
service: azure.activitylogs
detection:
selection:
properties.message:
- Delete device
- Delete device configuration
- Update device
- Update device configuration
condition: selection
level: medium
tags:
- attack.impact
falsepositives:
- Device or device configuration being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Device or device configuration modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,23 @@
title: Azure Domain Federation Settings Modified
id: 352a54e1-74ba-4929-9d47-8193d67aba1e
description: Identifies when an user or application modified the federation settings on the domain.
author: Austin Songer
status: experimental
date: 2021/09/06
references:
- https://attack.mitre.org/techniques/T1078
logsource:
service: azure.signinlogs
detection:
selection:
properties.message: Set federation settings on domain
condition: selection
level: medium
tags:
- attack.initial_access
- attack.t1078
falsepositives:
- Federation Settings being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Federation Settings modified from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,24 @@
title: Azure Network Firewall Policy Modified or Deleted
id: 83c17918-746e-4bd9-920b-8e098bf88c23
description: Identifies when a Firewall Policy is Modified or Deleted.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/02
references:
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
logsource:
service: azure.activitylogs
detection:
selection:
properties.message:
- MICROSOFT.NETWORK/FIREWALLPOLICIES/WRITE
- MICROSOFT.NETWORK/FIREWALLPOLICIES/JOIN/ACTION
- MICROSOFT.NETWORK/FIREWALLPOLICIES/CERTIFICATES/ACTION
- MICROSOFT.NETWORK/FIREWALLPOLICIES/DELETE
condition: selection
level: medium
tags:
- attack.impact
falsepositives:
- Firewall Policy being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Firewall Policy modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,23 @@
title: Azure Owner Removed From Application or Service Principal
id: 636e30d5-3736-42ea-96b1-e6e2f8429fd6
description: Identifies when a owner is was removed from a application or service principal in Azure.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/03
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource:
service: azure.activitylogs
detection:
selection:
properties.message:
- Remove owner from service principal
- Remove owner from application
condition: selection
level: medium
tags:
- attack.defense_evasion
falsepositives:
- Owner being removed may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Owner removed from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,21 @@
title: Azure Service Principal Created
id: 0ddcff6d-d262-40b0-804b-80eb592de8e3
description: Identifies when a service principal is created in Azure.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/02
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource:
service: azure.activitylogs
detection:
selection:
properties.message: "Add service principal"
condition: selection
level: medium
tags:
- attack.defense_evasion
falsepositives:
- Service principal being created may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service principal created from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -0,0 +1,21 @@
title: Azure Service Principal Removed
id: 448fd1ea-2116-4c62-9cde-a92d120e0f08
description: Identifies when a service principal was removed in Azure.
author: Austin Songer @austinsonger
status: experimental
date: 2021/09/03
references:
- https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities#application-proxy
logsource:
service: azure.activitylogs
detection:
selection:
properties.message: Remove service principal
condition: selection
level: medium
tags:
- attack.defense_evasion
falsepositives:
- Service principal being removed may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service principal removed from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.

View File

@ -1,6 +1,5 @@
action: global action: global
title: Cleartext Protocol Usage title: Cleartext Protocol Usage
id: 7e4bfe58-4a47-4709-828d-d86c78b7cc1f
status: stable status: stable
description: Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels. Ensure that an encryption description: Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels. Ensure that an encryption
is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access. is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access.
@ -57,6 +56,7 @@ level: low
# - PCI DSS 3.2 7.2 # - PCI DSS 3.2 7.2
# - PCI DSS 3.2 7.3 # - PCI DSS 3.2 7.3
--- ---
id: 7e4bfe58-4a47-4709-828d-d86c78b7cc1f
logsource: logsource:
product: netflow product: netflow
detection: detection:
@ -80,6 +80,7 @@ detection:
- 5904 - 5904
condition: selection condition: selection
--- ---
id: d7fb8f0e-bd5f-45c2-b467-19571c490d7e
logsource: logsource:
category: firewall category: firewall
detection: detection:

View File

@ -0,0 +1,30 @@
title: Audio Capture
id: a7af2487-9c2f-42e4-9bb9-ff961f0561d5
description: Detects attempts to record audio with arecord utility
#the actual binary that arecord is using and that has to be monitored is /usr/bin/aplay
author: 'Pawel Mazur'
status: experimental
date: 2021/09/04
references:
- https://linux.die.net/man/1/arecord
- https://linuxconfig.org/how-to-test-microphone-with-audio-linux-sound-architecture-alsa
- https://attack.mitre.org/techniques/T1123/
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0:
- arecord
a1:
- '-vv'
a2:
- '-fdat'
condition: selection
tags:
- attack.collection
- attack.t1123
falsepositives:
- None
level: low

View File

@ -1,6 +1,5 @@
action: global action: global
title: CVE-2021-3156 Exploitation Attempt title: CVE-2021-3156 Exploitation Attempt
id: 5ee37487-4eb8-4ac2-9be1-d7d14cdc559f
status: experimental status: experimental
description: Detects exploitation attempt of vulnerability described in CVE-2021-3156. | description: Detects exploitation attempt of vulnerability described in CVE-2021-3156. |
Alternative approach might be to look for flooding of auditd logs due to bruteforcing | Alternative approach might be to look for flooding of auditd logs due to bruteforcing |
@ -21,6 +20,7 @@ logsource:
product: linux product: linux
service: auditd service: auditd
--- ---
id: 5ee37487-4eb8-4ac2-9be1-d7d14cdc559f
detection: detection:
selection: selection:
type: 'EXECVE' type: 'EXECVE'
@ -43,6 +43,7 @@ detection:
a4: '\' a4: '\'
condition: selection and (cmd1 or cmd2 or cmd3 or cmd4) and (cmd5 or cmd6 or cmd7 or cmd8) | count() by host > 50 condition: selection and (cmd1 or cmd2 or cmd3 or cmd4) and (cmd5 or cmd6 or cmd7 or cmd8) | count() by host > 50
--- ---
id: b9748c98-9ea7-4fdb-80b6-29bed6ba71d2
detection: detection:
selection: selection:
type: 'SYSCALL' type: 'SYSCALL'

View File

@ -0,0 +1,33 @@
title: Hidden Files and Directoriese
id: d08722cd-3d09-449a-80b4-83ea2d9d4616
description: Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character
author: 'Pawel Mazur'
status: experimental
date: 2021/09/06
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.001/T1564.001.md
- https://attack.mitre.org/techniques/T1564/001/
logsource:
product: linux
service: auditd
detection:
commands:
type: EXECVE
a0:
- mkdir
- touch
- vim
- nano
- vi
arguments:
- a1|contains: '/.'
- a1|startswith: '.'
- a2|contains: '/.'
- a2|startswith: '.'
condition: commands and arguments
tags:
- attack.defense_evasion
- attack.t1564.001
falsepositives:
- None
level: low

View File

@ -0,0 +1,31 @@
title: System Information Discovery
id: f34047d9-20d3-4e8b-8672-0a35cc50dc71
description: Detects System Information Discovery commands
author: 'Pawel Mazur'
status: experimental
date: 2021/09/03
references:
- https://attack.mitre.org/techniques/T1082/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1082/T1082.md
logsource:
product: linux
service: auditd
detection:
selection:
type: PATH
name:
- /etc/lsb-release
- /etc/redhat-release
- /etc/issue
selection2:
type: EXECVE
a0:
- uname
- uptime
condition: selection or selection2
tags:
- attack.discovery
- attack.t1082
falsepositives:
- Legitimate administrative activity
level: low

View File

@ -1,6 +1,5 @@
action: global action: global
title: Linux Network Service Scanning title: Linux Network Service Scanning
id: 3e102cd9-a70d-4a7a-9508-403963092f31
status: experimental status: experimental
description: Detects enumeration of local or remote network services. description: Detects enumeration of local or remote network services.
author: Alejandro Ortuno, oscd.community author: Alejandro Ortuno, oscd.community
@ -14,6 +13,7 @@ tags:
- attack.discovery - attack.discovery
- attack.t1046 - attack.t1046
--- ---
id: 3e102cd9-a70d-4a7a-9508-403963092f31
logsource: logsource:
category: process_creation category: process_creation
product: linux product: linux
@ -31,6 +31,7 @@ detection:
CommandLine|contains: 'l' CommandLine|contains: 'l'
condition: (netcat and not netcat_listen_flag) or network_scanning_tools condition: (netcat and not netcat_listen_flag) or network_scanning_tools
--- ---
id: 3761e026-f259-44e6-8826-719ed8079408
logsource: logsource:
product: linux product: linux
service: auditd service: auditd

View File

@ -1,6 +1,5 @@
action: global action: global
title: Disabling Security Tools title: Disabling Security Tools
id: e3a8a052-111f-4606-9aee-f28ebeb76776
status: experimental status: experimental
description: Detects disabling security tools description: Detects disabling security tools
author: Ömer Günal, Alejandro Ortuno, oscd.community author: Ömer Günal, Alejandro Ortuno, oscd.community
@ -15,6 +14,7 @@ tags:
- attack.t1562.004 - attack.t1562.004
- attack.t1089 # an old one - attack.t1089 # an old one
--- ---
id: e3a8a052-111f-4606-9aee-f28ebeb76776
logsource: logsource:
category: process_creation category: process_creation
product: linux product: linux
@ -84,6 +84,7 @@ detection:
- 'falcon-sensor' - 'falcon-sensor'
condition: 1 of them condition: 1 of them
--- ---
id: 49f5dfc1-f92e-4d34-96fa-feba3f6acf36
logsource: logsource:
product: linux product: linux
service: syslog service: syslog

View File

@ -1,6 +1,5 @@
action: global action: global
title: Sudo Privilege Escalation CVE-2019-14287 title: Sudo Privilege Escalation CVE-2019-14287
id: f74107df-b6c6-4e80-bf00-4170b658162b
status: experimental status: experimental
description: Detects users trying to exploit sudo vulnerability reported in CVE-2019-14287 description: Detects users trying to exploit sudo vulnerability reported in CVE-2019-14287
author: Florian Roth author: Florian Roth
@ -21,11 +20,13 @@ tags:
- attack.t1169 # an old one - attack.t1169 # an old one
- attack.t1548.003 - attack.t1548.003
--- ---
id: f74107df-b6c6-4e80-bf00-4170b658162b
detection: detection:
selection_keywords: selection_keywords:
- '* -u#*' - '* -u#*'
condition: selection_keywords condition: selection_keywords
--- ---
id: 7fcc54cb-f27d-4684-84b7-436af096f858
detection: detection:
selection_user: selection_user:
USER: USER:

View File

@ -1,6 +1,5 @@
action: global action: global
title: System Information Discovery title: System Information Discovery
id: 42df45e7-e6e9-43b5-8f26-bec5b39cc239
status: stable status: stable
description: Detects system information discovery commands description: Detects system information discovery commands
author: Ömer Günal, oscd.community author: Ömer Günal, oscd.community
@ -15,6 +14,7 @@ tags:
- attack.discovery - attack.discovery
- attack.t1082 - attack.t1082
--- ---
id: 42df45e7-e6e9-43b5-8f26-bec5b39cc239
logsource: logsource:
product: linux product: linux
category: process_creation category: process_creation
@ -30,6 +30,7 @@ detection:
- '/lsmod' - '/lsmod'
condition: selection condition: selection
--- ---
id: 1f358e2e-cb63-43c3-b575-dfb072a6814f
logsource: logsource:
product: linux product: linux
service: auditd service: auditd

View File

@ -1,6 +1,5 @@
action: global action: global
title: High DNS Bytes Out title: High DNS Bytes Out
id: 0f6c1bf5-70a5-4963-aef9-aab1eefb50bd
status: experimental status: experimental
description: High DNS queries bytes amount from host per short period of time description: High DNS queries bytes amount from host per short period of time
author: Daniil Yugoslavskiy, oscd.community author: Daniil Yugoslavskiy, oscd.community
@ -14,6 +13,7 @@ tags:
- attack.t1048 # an old one - attack.t1048 # an old one
- attack.t1048.003 - attack.t1048.003
--- ---
id: 0f6c1bf5-70a5-4963-aef9-aab1eefb50bd
logsource: logsource:
category: dns category: dns
detection: detection:
@ -22,6 +22,7 @@ detection:
timeframe: 1m timeframe: 1m
condition: selection | sum(question_length) by src_ip > 300000 condition: selection | sum(question_length) by src_ip > 300000
--- ---
id: 3b6e327d-8649-4102-993f-d25786481589
logsource: logsource:
category: firewall category: firewall
detection: detection:

View File

@ -1,6 +1,5 @@
action: global action: global
title: High DNS Requests Rate title: High DNS Requests Rate
id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
status: experimental status: experimental
description: High DNS requests amount from host per short period of time description: High DNS requests amount from host per short period of time
author: Daniil Yugoslavskiy, oscd.community author: Daniil Yugoslavskiy, oscd.community
@ -17,6 +16,7 @@ tags:
- attack.t1071 # an old one - attack.t1071 # an old one
- attack.t1071.004 - attack.t1071.004
--- ---
id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
logsource: logsource:
category: dns category: dns
detection: detection:
@ -25,6 +25,7 @@ detection:
timeframe: 1m timeframe: 1m
condition: selection | count() by src_ip > 1000 condition: selection | count() by src_ip > 1000
--- ---
id: 51186749-7415-46be-90e5-6914865c825a
logsource: logsource:
category: firewall category: firewall
detection: detection:

View File

@ -1,6 +1,5 @@
action: global action: global
title: Network Scans title: Network Scans
id: fab0ddf0-b8a9-4d70-91ce-a20547209afb
status: experimental status: experimental
description: Detects many failed connection attempts to different ports or hosts description: Detects many failed connection attempts to different ports or hosts
author: Thomas Patzke author: Thomas Patzke
@ -21,12 +20,14 @@ tags:
- attack.discovery - attack.discovery
- attack.t1046 - attack.t1046
--- ---
id: fab0ddf0-b8a9-4d70-91ce-a20547209afb
detection: detection:
selection: selection:
action: denied action: denied
timeframe: 24h timeframe: 24h
condition: selection | count(dst_port) by src_ip > 10 condition: selection | count(dst_port) by src_ip > 10
--- ---
id: 4601eaec-6b45-4052-ad32-2d96d26ce0d8
detection: detection:
selection: selection:
action: denied action: denied

View File

@ -7,9 +7,9 @@ date: 2021/08/19
modified: 2021/08/23 modified: 2021/08/23
author: Saw Winn Naung, Azure-Sentinel, @neu5ron author: Saw Winn Naung, Azure-Sentinel, @neu5ron
level: low level: low
logsource: logsource:
service: dns service: dns
product: zeek product: zeek
tags: tags:
- attack.t1035 # an old one - attack.t1035 # an old one
- attack.t1569.002 - attack.t1569.002
@ -93,7 +93,7 @@ detection:
- "0.0.0.0" - "0.0.0.0"
exclude_rejected: exclude_rejected:
rejected: "true" rejected: "true"
condition: selection and not (exclude_answers OR exclude_rejected) condition: selection and not (exclude_answers or exclude_rejected)
falsepositives: falsepositives:
- A DNS lookup does not necessarily mean a successful attempt, verify a) if there was a response using the zeek answers field, if there was then verify the connections (conn.log) to those IPs. b) verify if HTTP, SSL, or TLS activity to the domain that was queried. http.log field is "host" and ssl/tls is "server_name". - A DNS lookup does not necessarily mean a successful attempt, verify a) if there was a response using the zeek answers field, if there was then verify the connections (conn.log) to those IPs. b) verify if HTTP, SSL, or TLS activity to the domain that was queried. http.log field is "host" and ssl/tls is "server_name".
fields: fields:

View File

@ -44,7 +44,7 @@ detection:
- '137' - '137'
- '138' - '138'
- '139' - '139'
condition: NOT z_flag_unset AND most_probable_valid_domain AND NOT (exclude_tlds OR exclude_tlds OR exclude_query_types OR exclude_responses OR exclude_netbios) condition: not z_flag_unset and most_probable_valid_domain and not (exclude_tlds or exclude_tlds or exclude_query_types or exclude_responses or exclude_netbios)
falsepositives: falsepositives:
- 'Internal or legitimate external domains using DNSSec. Verify if these are legitimate DNSSec domains and then exclude them.' - 'Internal or legitimate external domains using DNSSec. Verify if these are legitimate DNSSec domains and then exclude them.'
- 'If you work in a Public Sector then it may be good to exclude things like endswith ".edu", ".gov" and or ".mil"' - 'If you work in a Public Sector then it may be good to exclude things like endswith ".edu", ".gov" and or ".mil"'

View File

@ -50,6 +50,7 @@ detection:
- 'Mozilla/5.0 (Windows NT 6.2; Win32; rv:47.0)' # Strong Pity loader https://twitter.com/VK_Intel/status/1264185981118406657 - 'Mozilla/5.0 (Windows NT 6.2; Win32; rv:47.0)' # Strong Pity loader https://twitter.com/VK_Intel/status/1264185981118406657
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;' # Mustang Panda https://insights.oem.avira.com/new-wave-of-plugx-targets-hong-kong/ - 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;' # Mustang Panda https://insights.oem.avira.com/new-wave-of-plugx-targets-hong-kong/
- 'Mozilla/5.0 (X11; Linux i686; rv:22.0) Firefox/22.0' # BackdoorDiplomacy https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/ - 'Mozilla/5.0 (X11; Linux i686; rv:22.0) Firefox/22.0' # BackdoorDiplomacy https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/
- 'Mozilla/5.0 Chrome/72.0.3626.109 Safari/537.36' # SideWalk malware used by Sparkling Goblin
condition: selection condition: selection
fields: fields:
- ClientIP - ClientIP

View File

@ -1,6 +1,5 @@
action: global action: global
title: APT29 Google Update Service Install title: APT29 Google Update Service Install
id: c069f460-2b87-4010-8dcf-e45bab362624
description: This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe description: This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
so the service names and executable locations used by APT29 are specific enough to be detected in log files. so the service names and executable locations used by APT29 are specific enough to be detected in log files.
references: references:
@ -26,6 +25,7 @@ falsepositives:
- Unknown - Unknown
level: high level: high
--- ---
id: c069f460-2b87-4010-8dcf-e45bab362624
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows

View File

@ -2,7 +2,7 @@ title: Arbitrary Shell Command Execution Via Settingcontent-Ms
id: 24de4f3b-804c-4165-b442-5a06a2302c7e id: 24de4f3b-804c-4165-b442-5a06a2302c7e
description: The .SettingContent-ms file type was introduced in Windows 10 and allows a user to create "shortcuts" to various Windows 10 setting pages. These files are simply XML and contain paths to various Windows 10 settings binaries. description: The .SettingContent-ms file type was introduced in Windows 10 and allows a user to create "shortcuts" to various Windows 10 setting pages. These files are simply XML and contain paths to various Windows 10 settings binaries.
author: Sreeman author: Sreeman
date: 2020/13/03 date: 2020/03/13
modified: 2021/08/09 modified: 2021/08/09
references: references:
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 - https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

View File

@ -3,7 +3,7 @@ id: 9c7e131a-0f2c-4ae0-9d43-b04f4e266d43
status: experimental status: experimental
description: 'Application Virtualization Utility is included with Microsoft Office.We are able to abuse “AppVLP” to execute shell commands. Normally, this binary is used for Application Virtualization, but we can use it as an abuse binary to circumvent the ASR file path rule folder or to mark a file as a system file' description: 'Application Virtualization Utility is included with Microsoft Office.We are able to abuse “AppVLP” to execute shell commands. Normally, this binary is used for Application Virtualization, but we can use it as an abuse binary to circumvent the ASR file path rule folder or to mark a file as a system file'
author: Sreeman author: Sreeman
date: 2020/13/03 date: 2020/03/13
modified: 2021/06/11 modified: 2021/06/11
tags: tags:
- attack.t1218 - attack.t1218

View File

@ -36,3 +36,6 @@ detection:
falsepositives: falsepositives:
- Some software piracy tools (key generators, cracks) are classified as hack tools - Some software piracy tools (key generators, cracks) are classified as hack tools
level: high level: high
tags:
- attack.resource_development
- attack.t1588

View File

@ -1,6 +1,5 @@
action: global action: global
title: CobaltStrike Service Installations title: CobaltStrike Service Installations
id: 5a105d34-05fc-401e-8553-272b45c1522d
description: Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement description: Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement
author: Florian Roth, Wojciech Lesicki author: Florian Roth, Wojciech Lesicki
references: references:
@ -34,6 +33,7 @@ falsepositives:
- Unknown - Unknown
level: critical level: critical
--- ---
id: 5a105d34-05fc-401e-8553-272b45c1522d
logsource: logsource:
product: windows product: windows
service: system service: system
@ -41,6 +41,7 @@ detection:
selection_id: selection_id:
EventID: 7045 EventID: 7045
--- ---
id: d7a95147-145f-4678-b85d-d1ff4a3bb3f6
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation CLIP+ Launcher title: Invoke-Obfuscation CLIP+ Launcher
id: f7385ee2-0e0c-11eb-adc1-0242ac120002
description: Detects Obfuscated use of Clip.exe to execute PowerShell description: Detects Obfuscated use of Clip.exe to execute PowerShell
status: experimental status: experimental
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"' ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: f7385ee2-0e0c-11eb-adc1-0242ac120002
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 21e4b3c1-4985-4aa4-a6c0-f8639590a5f3
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 4edf51e1-cb83-4e1a-bc39-800e396068e3
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation Obfuscated IEX Invocation title: Invoke-Obfuscation Obfuscated IEX Invocation
id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9
description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888" description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
status: experimental status: experimental
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
@ -17,11 +16,12 @@ detection:
- ImagePath|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\[' - ImagePath|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- ImagePath|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\[' - ImagePath|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
- ImagePath|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}' - ImagePath|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
- ImagePath|re: '\*mdr\*\W\s*\)\.Name' - ImagePath|re: '\\*mdr\*\W\s*\)\.Name'
- ImagePath|re: '\$VerbosePreference\.ToString\(' - ImagePath|re: '\$VerbosePreference\.ToString\('
- ImagePath|re: '\String\]\s*\$VerbosePreference' - ImagePath|re: '\String\]\s*\$VerbosePreference'
condition: selection and selection_1 condition: selection and selection_1
--- ---
id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9
logsource: logsource:
product: windows product: windows
service: system service: system
@ -29,6 +29,7 @@ detection:
selection: selection:
EventID: 7045 EventID: 7045
--- ---
id: e75c48bd-3434-4d61-94b7-ddfaa2c08487
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -36,6 +37,7 @@ detection:
selection: selection:
EventID: 6 EventID: 6
--- ---
id: fd0f5778-d3cb-4c9a-9695-66759d04702a
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation STDIN+ Launcher title: Invoke-Obfuscation STDIN+ Launcher
id: 72862bf2-0eb1-11eb-adc1-0242ac120002
description: Detects Obfuscated use of stdin to execute PowerShell description: Detects Obfuscated use of stdin to execute PowerShell
status: experimental status: experimental
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"' ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 72862bf2-0eb1-11eb-adc1-0242ac120002
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: de7fb680-6efa-4bf3-af2c-14b6d33c8e6e
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 0c718a5e-4284-4fb9-b4d9-b9a50b3a1974
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation VAR+ Launcher title: Invoke-Obfuscation VAR+ Launcher
id: 8ca7004b-e620-4ecb-870e-86129b5b8e75
description: Detects Obfuscated use of Environment Variables to execute PowerShell description: Detects Obfuscated use of Environment Variables to execute PowerShell
status: experimental status: experimental
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"' ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"'
condition: all of them condition: all of them
--- ---
id: 8ca7004b-e620-4ecb-870e-86129b5b8e75
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,10 +28,12 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 3e27b010-2cf2-4577-8ef0-3ea44aaea0dc
logsource: logsource:
product: windows product: windows
category: process_creation category: process_creation
--- ---
id: dcf2db1f-f091-425b-a821-c05875b8925a
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation COMPRESS OBFUSCATION title: Invoke-Obfuscation COMPRESS OBFUSCATION
id: 175997c5-803c-4b08-8bb0-70b099f47595
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
status: experimental status: experimental
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend' ImagePath|re: '(?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 175997c5-803c-4b08-8bb0-70b099f47595
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: c70731dd-0097-40ff-b112-f7032f29c16c
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 7a922f1b-2635-4d6c-91ef-af228b198ad3
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation RUNDLL LAUNCHER title: Invoke-Obfuscation RUNDLL LAUNCHER
id: 11b52f18-aaec-4d60-9143-5dd8cc4706b9
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
status: experimental status: experimental
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"' ImagePath|re: '(?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 11b52f18-aaec-4d60-9143-5dd8cc4706b9
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 03b024c6-aad1-4da5-9f60-e9e8c00fa64c
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: f241cf1b-3a6b-4e1a-b4f9-133c00dd95ca
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation Via Stdin title: Invoke-Obfuscation Via Stdin
id: 487c7524-f892-4054-b263-8a0ace63fc25
description: Detects Obfuscated Powershell via Stdin in Scripts description: Detects Obfuscated Powershell via Stdin in Scripts
status: experimental status: experimental
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"' ImagePath|re: '(?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 487c7524-f892-4054-b263-8a0ace63fc25
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 82b66143-53ee-4369-ab02-de2c70cd6352
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 80b708f3-d034-40e4-a6c8-d23b7a7db3d1
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation Via Use Clip title: Invoke-Obfuscation Via Use Clip
id: 63e3365d-4824-42d8-8b82-e56810fefa0c
description: Detects Obfuscated Powershell via use Clip.exe in Scripts description: Detects Obfuscated Powershell via use Clip.exe in Scripts
status: experimental status: experimental
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*' ImagePath|re: '(?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 63e3365d-4824-42d8-8b82-e56810fefa0c
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 1fc02cb5-8acf-4d2c-bf9c-a28b6e0ad851
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 1a0a2ff1-611b-4dac-8216-8a7b47c618a6
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation Via Use MSHTA title: Invoke-Obfuscation Via Use MSHTA
id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4
description: Detects Obfuscated Powershell via use MSHTA in Scripts description: Detects Obfuscated Powershell via use MSHTA in Scripts
status: experimental status: experimental
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"' ImagePath|re: '(?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: a4e82ad2-7430-4ee8-b858-6ad6099773fa
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 9b8d9203-4e0f-4cd9-bb06-4cc4ea6d0e9a
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation Via Use Rundll32 title: Invoke-Obfuscation Via Use Rundll32
id: 641a4bfb-c017-44f7-800c-2aee0184ce9b
description: Detects Obfuscated Powershell via use Rundll32 in Scripts description: Detects Obfuscated Powershell via use Rundll32 in Scripts
status: experimental status: experimental
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"' ImagePath|re: '(?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"'
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 641a4bfb-c017-44f7-800c-2aee0184ce9b
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 4e1518d9-2136-4015-ab49-c31d7c8588e1
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: cd0f7229-d16f-42de-8fe3-fba365fbcb3a
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
id: 14bcba49-a428-42d9-b943-e2ce0f0f7ae6
description: Detects Obfuscated Powershell via VAR++ LAUNCHER description: Detects Obfuscated Powershell via VAR++ LAUNCHER
status: experimental status: experimental
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
@ -21,6 +20,7 @@ detection:
ImagePath|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r ImagePath|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection and selection_eventid condition: selection and selection_eventid
--- ---
id: 14bcba49-a428-42d9-b943-e2ce0f0f7ae6
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 7045 EventID: 7045
--- ---
id: 7b9a650e-6788-4fdf-888d-ec7c0a62810d
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
@ -35,6 +36,7 @@ detection:
selection_eventid: selection_eventid:
EventID: 6 EventID: 6
--- ---
id: 4c54ba8f-73d2-4d40-8890-d9cf1dca3d30
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,9 +1,7 @@
---
action: global action: global
title: Credential Dumping Tools Service Execution title: Credential Dumping Tools Service Execution
description: Detects well-known credential dumping tools execution via service execution events description: Detects well-known credential dumping tools execution via service execution events
author: Florian Roth, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community author: Florian Roth, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community
id: 4976aa50-8f41-45c6-8b15-ab3fc10e79ed
date: 2017/03/05 date: 2017/03/05
modified: 2021/03/18 modified: 2021/03/18
references: references:
@ -44,6 +42,7 @@ falsepositives:
- Legitimate Administrator using credential dumping tool for password recovery - Legitimate Administrator using credential dumping tool for password recovery
level: high level: high
--- ---
id: 4976aa50-8f41-45c6-8b15-ab3fc10e79ed
logsource: logsource:
product: windows product: windows
service: system service: system
@ -51,10 +50,12 @@ detection:
selection: selection:
EventID: 7045 EventID: 7045
--- ---
id: df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
--- ---
id: f0d1feba-4344-4ca9-8121-a6c97bd6df52
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Malicious Service Installations title: Malicious Service Installations
id: 2cfe636e-317a-4bee-9f2c-1066d9f54d1a
description: Detects known malicious service installs that only appear in cases of lateral movement, credential dumping, and other suspicious activities. description: Detects known malicious service installs that only appear in cases of lateral movement, credential dumping, and other suspicious activities.
author: Florian Roth, Daniil Yugoslavskiy, oscd.community (update) author: Florian Roth, Daniil Yugoslavskiy, oscd.community (update)
date: 2017/03/27 date: 2017/03/27
@ -24,6 +23,7 @@ falsepositives:
- Penetration testing - Penetration testing
level: critical level: critical
--- ---
id: 2cfe636e-317a-4bee-9f2c-1066d9f54d1a
logsource: logsource:
product: windows product: windows
service: system service: system
@ -39,6 +39,7 @@ detection:
malsvc_apt29: malsvc_apt29:
ServiceName: 'Java(TM) Virtual Machine Support Service' ServiceName: 'Java(TM) Virtual Machine Support Service'
--- ---
id: cb062102-587e-4414-8efa-dbe3c7bf19c6
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,10 +1,9 @@
action: global
title: Metasploit Or Impacket Service Installation Via SMB PsExec title: Metasploit Or Impacket Service Installation Via SMB PsExec
id: 1a17ce75-ff0d-4f02-9709-2b7bb5618cf0
description: Detects usage of Metasploit SMB PsExec (exploit/windows/smb/psexec) and Impacket psexec.py by triggering on specific service installation description: Detects usage of Metasploit SMB PsExec (exploit/windows/smb/psexec) and Impacket psexec.py by triggering on specific service installation
author: Bartlomiej Czyz, Relativity author: Bartlomiej Czyz, Relativity
date: 2021/01/21 date: 2021/01/21
modified: 2021/07/23 modified: 2021/07/23
action: global
references: references:
- https://bczyz1.github.io/2021/01/30/psexec.html - https://bczyz1.github.io/2021/01/30/psexec.html
tags: tags:
@ -32,6 +31,7 @@ falsepositives:
- Possible, different agents with a 8 character binary and a 4, 8 or 16 character service name - Possible, different agents with a 8 character binary and a 4, 8 or 16 character service name
level: high level: high
--- ---
id: 1a17ce75-ff0d-4f02-9709-2b7bb5618cf0
logsource: logsource:
product: windows product: windows
service: system service: system
@ -39,10 +39,11 @@ detection:
selection: selection:
EventID: 7045 EventID: 7045
--- ---
logsource: id: 6fb63b40-e02a-403e-9ffd-3bcc1d749442
product: windows logsource:
service: security product: windows
detection: service: security
selection: detection:
EventID: 4697 selection:
EventID: 4697

View File

@ -1,6 +1,5 @@
action: global action: global
title: Meterpreter or Cobalt Strike Getsystem Service Installation title: Meterpreter or Cobalt Strike Getsystem Service Installation
id: 843544a7-56e0-4dcc-a44f-5cc266dd97d6
description: Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation description: Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation
author: Teymur Kheirkhabarov, Ecco, Florian Roth author: Teymur Kheirkhabarov, Ecco, Florian Roth
date: 2019/10/26 date: 2019/10/26
@ -48,6 +47,7 @@ falsepositives:
- Highly unlikely - Highly unlikely
level: critical level: critical
--- ---
id: 843544a7-56e0-4dcc-a44f-5cc266dd97d6
logsource: logsource:
product: windows product: windows
service: system service: system
@ -55,10 +55,12 @@ detection:
selection: selection:
EventID: 7045 EventID: 7045
--- ---
id: d585ab5a-6a69-49a8-96e8-4a726a54de46
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
--- ---
id: ecbc5e16-58e0-4521-9c60-eb9a7ea4ad34
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Moriya Rootkit title: Moriya Rootkit
id: 25b9c01c-350d-4b95-bed1-836d04a4f324
description: Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report description: Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report
status: experimental status: experimental
author: Bhabesh Raj author: Bhabesh Raj
@ -16,6 +15,7 @@ tags:
- attack.privilege_escalation - attack.privilege_escalation
- attack.t1543.003 - attack.t1543.003
--- ---
id: 25b9c01c-350d-4b95-bed1-836d04a4f324
logsource: logsource:
product: windows product: windows
service: system service: system
@ -25,6 +25,7 @@ detection:
ServiceName: ZzNetSvc ServiceName: ZzNetSvc
condition: selection condition: selection
--- ---
id: a1507d71-0b60-44f6-b17c-bf53220fdd88
logsource: logsource:
product: windows product: windows
category: file_event category: file_event

View File

@ -1,6 +1,5 @@
action: global action: global
title: NetNTLM Downgrade Attack title: NetNTLM Downgrade Attack
id: d67572a0-e2ec-45d6-b8db-c100d14b8ef2
description: Detects NetNTLM downgrade attack description: Detects NetNTLM downgrade attack
references: references:
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks - https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
@ -18,6 +17,7 @@ falsepositives:
- Unknown - Unknown
level: critical level: critical
--- ---
id: d67572a0-e2ec-45d6-b8db-c100d14b8ef2
logsource: logsource:
product: windows product: windows
category: registry_event category: registry_event
@ -34,6 +34,7 @@ detection:
--- ---
# Windows Security Eventlog: Process Creation with Full Command Line # Windows Security Eventlog: Process Creation with Full Command Line
id: d3abac66-f11c-4ed0-8acb-50cc29c97eed
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -20,3 +20,6 @@ detection:
falsepositives: falsepositives:
- Unlikely - Unlikely
level: critical level: critical
tags:
- attack.impact
- attack.t1499.001

View File

@ -0,0 +1,26 @@
title: Possible PetitPotam Coerce Authentication Attempt
id: 1ce8c8a3-2723-48ed-8246-906ac91061a6
description: Detect PetitPotam coerced authentication activity.
author: Mauricio Velazco, Michael Haag
date: 2021/09/02
references:
- https://github.com/topotam/PetitPotam
- https://github.com/splunk/security_content/blob/0dd6de32de2118b2818550df9e65255f4109a56d/detections/endpoint/petitpotam_network_share_access_request.yml
tags:
- attack.credential_access
- attack.t1187
logsource:
product: windows
service: security
definition: 'The advanced audit policy setting "Object Access > Detailed File Share" must be configured for Success/Failure'
detection:
selection:
EventID: 5145
ShareName|startswith: '\\'
ShareName|endswith: '\IPC$'
RelativeTargetName: lsarpc
SubjectUserName: ANONYMOUS LOGON
condition: selection
falsepositives:
- Unknown. Feedback welcomed.
level: high

View File

@ -0,0 +1,33 @@
title: PetitPotam Suspicious Kerberos TGT Request
id: 6a53d871-682d-40b6-83e0-b7c1a6c4e3a5
description: Detect suspicious Kerberos TGT requests. Once an attacer obtains a computer
certificate by abusing Active Directory Certificate Services in combination with
PetitPotam, the next step would be to leverage the certificate for malicious purposes.
One way of doing this is to request a Kerberos Ticket Granting Ticket using a tool
like Rubeus. This request will generate a 4768 event with some unusual fields depending
on the environment. This analytic will require tuning, we recommend filtering Account_Name
to the Domain Controller computer accounts.
author: Mauricio Velazco, Michael Haag
date: 2021/09/02
references:
- https://github.com/topotam/PetitPotam
- https://isc.sans.edu/forums/diary/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability/27668/
- https://github.com/splunk/security_content/blob/develop/detections/endpoint/petitpotam_suspicious_kerberos_tgt_request.yml
tags:
- attack.credential_access
- attack.t1187
logsource:
product: windows
service: security
definition: 'The advanced audit policy setting "Account Logon > Kerberos Authentication Service" must be configured for Success/Failure'
detection:
selection:
EventID: 4768
TargetUserName|endswith: '$'
CertThumbprint: '*'
filter_local:
IpAddress: '::1'
condition: selection and not filter_local
falsepositives:
- False positives are possible if the environment is using certificates for authentication. We recommend filtering Account_Name to the Domain Controller computer accounts.
level: high

View File

@ -1,6 +1,5 @@
action: global action: global
title: PowerShell Scripts Installed as Services title: PowerShell Scripts Installed as Services
id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
description: Detects powershell script installed as a Service description: Detects powershell script installed as a Service
status: experimental status: experimental
author: oscd.community, Natalia Shornikova author: oscd.community, Natalia Shornikova
@ -21,6 +20,7 @@ falsepositives:
- Unknown - Unknown
level: high level: high
--- ---
id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
logsource: logsource:
product: windows product: windows
service: system service: system
@ -28,6 +28,7 @@ detection:
service_creation: service_creation:
EventID: 7045 EventID: 7045
--- ---
id: 46deb5e1-28c9-4905-b2df-51cdcc9e6073
logsource: logsource:
product: windows product: windows
service: sysmon service: sysmon
@ -35,6 +36,7 @@ detection:
service_creation: service_creation:
EventID: 6 EventID: 6
--- ---
id: 2a926e6a-4b81-4011-8a96-e36cc8c04302
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,8 +1,7 @@
action: global action: global
title: Windows PowerShell Web Request title: Windows PowerShell Web Request
id: 9fc51a3c-81b3-4fa7-b35f-7c02cf10fd2d
status: experimental status: experimental
description: Detects the use of various web request methods (including aliases) via Windows PowerShell description: Detects the use of various web request methods (including aliases) via Windows PowerShell command
references: references:
- https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/ - https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/
- https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell - https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell
@ -19,6 +18,7 @@ falsepositives:
- Use of Get-Command and Get-Help modules to reference Invoke-WebRequest and Start-BitsTransfer. - Use of Get-Command and Get-Help modules to reference Invoke-WebRequest and Start-BitsTransfer.
level: medium level: medium
--- ---
id: 9fc51a3c-81b3-4fa7-b35f-7c02cf10fd2d
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows
@ -32,6 +32,7 @@ detection:
- 'Net.WebClient' - 'Net.WebClient'
- 'Start-BitsTransfer' - 'Start-BitsTransfer'
--- ---
id: 1139d2e2-84b1-4226-b445-354492eba8ba
logsource: logsource:
product: windows product: windows
service: powershell service: powershell

View File

@ -1,6 +1,5 @@
action: global action: global
title: Root Certificate Installed title: Root Certificate Installed
id: 42821614-9264-4761-acfc-5772c3286f76
status: experimental status: experimental
description: Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. description: Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
references: references:
@ -16,6 +15,7 @@ falsepositives:
detection: detection:
condition: 1 of them condition: 1 of them
--- ---
id: 42821614-9264-4761-acfc-5772c3286f76
logsource: logsource:
product: windows product: windows
service: powershell service: powershell
@ -31,6 +31,7 @@ detection:
- 'Import-Certificate' - 'Import-Certificate'
- 'Cert:\LocalMachine\Root' - 'Cert:\LocalMachine\Root'
--- ---
id: 46591fae-7a4c-46ea-aec3-dff5e6d785dc
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows

View File

@ -21,3 +21,6 @@ detection:
falsepositives: falsepositives:
- Unknown - Unknown
level: critical level: critical
tags:
- attack.privilege_escalation
- attack.t1548

View File

@ -0,0 +1,22 @@
title: Atera Agent Installation
id: 87261fb2-69d0-42fe-b9de-88c6b5f65a43
status: experimental
description: Detects successful installation of Atera Remote Monitoring & Management (RMM) agent as recently found to be used by Conti operators
references:
- https://www.advintel.io/post/secret-backdoor-behind-conti-ransomware-operation-introducing-atera-agent
date: 2021/09/01
author: Bhabesh Raj
level: high
logsource:
service: application
product: windows
tags:
- attack.t1219
detection:
selection:
EventID: 1033
Source: MsiInstaller
Message|contains: AteraAgent
condition: selection
falsepositives:
- Legitimate Atera agent installation

View File

@ -1,6 +1,5 @@
action: global action: global
title: Detected Windows Software Discovery title: Detected Windows Software Discovery
id: 2650dd1a-eb2a-412d-ac36-83f06c4f2282
description: Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable. description: Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable.
status: experimental status: experimental
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
@ -17,6 +16,7 @@ falsepositives:
detection: detection:
condition: 1 of them condition: 1 of them
--- ---
id: 2650dd1a-eb2a-412d-ac36-83f06c4f2282
logsource: logsource:
product: windows product: windows
service: powershell service: powershell
@ -30,6 +30,7 @@ detection:
- 'select-object' - 'select-object'
- 'format-table' - 'format-table'
--- ---
id: e13f668e-7f95-443d-98d2-1816a7648a7b
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows

View File

@ -1,6 +1,5 @@
action: global action: global
title: Abusable Invoke-ATHRemoteFXvGPUDisablementCommand title: Abusable Invoke-ATHRemoteFXvGPUDisablementCommand
id: a6fc3c46-23b8-4996-9ea2-573f4c4d88c5
status: experimental status: experimental
author: frack113 author: frack113
date: 2021/07/13 date: 2021/07/13
@ -20,6 +19,7 @@ falsepositives:
- Unknown - Unknown
level: medium level: medium
--- ---
id: a6fc3c46-23b8-4996-9ea2-573f4c4d88c5
logsource: logsource:
product: windows product: windows
category: process_creation category: process_creation
@ -34,6 +34,7 @@ detection:
- '-RemoteFXvGPUDisablementFilePath' - '-RemoteFXvGPUDisablementFilePath'
condition: selection_cmd and selection_opt condition: selection_cmd and selection_opt
--- ---
id: f65e22f9-819e-4f96-9c7b-498364ae7a25
logsource: logsource:
product: windows product: windows
service: powershell-classic service: powershell-classic
@ -49,6 +50,7 @@ detection:
- '-RemoteFXvGPUDisablementFilePath' - '-RemoteFXvGPUDisablementFilePath'
condition: selection_cmd and selection_opt condition: selection_cmd and selection_opt
--- ---
id: 38a7625e-b2cb-485d-b83d-aff137d859f4
logsource: logsource:
product: windows product: windows
service: powershell service: powershell

View File

@ -1,6 +1,5 @@
action: global action: global
title: Eventlog Cleared title: Eventlog Cleared
id: d99b79d2-0a6f-4f46-ad8b-260b6e17f982
related: related:
- id: f2f01843-e7b8-4f95-a35a-d23584476423 - id: f2f01843-e7b8-4f95-a35a-d23584476423
type: obsoletes type: obsoletes
@ -21,6 +20,7 @@ falsepositives:
- System provisioning (system reset before the golden image creation) - System provisioning (system reset before the golden image creation)
level: high level: high
--- ---
id: d99b79d2-0a6f-4f46-ad8b-260b6e17f982
logsource: logsource:
product: windows product: windows
service: security service: security
@ -31,6 +31,7 @@ detection:
- 1102 - 1102
condition: selection condition: selection
--- ---
id: a62b37e0-45d3-48d9-a517-90c1a1b0186b
logsource: logsource:
product: windows product: windows
service: system service: system

View File

@ -25,3 +25,6 @@ fields:
- User - User
falsepositives: falsepositives:
- Account fallback reasons (after failed login with specific account) - Account fallback reasons (after failed login with specific account)
tags:
- attack.credential_access
- attack.t1110.001

View File

@ -1,6 +1,5 @@
action: global action: global
title: Failed Logins with Different Accounts from Single Source System title: Failed Logins with Different Accounts from Single Source System
id: e98374a6-e2d9-4076-9b5c-11bdb2569995
description: Detects suspicious failed logins with different user accounts from a single source system description: Detects suspicious failed logins with different user accounts from a single source system
author: Florian Roth author: Florian Roth
date: 2017/01/10 date: 2017/01/10
@ -19,6 +18,7 @@ falsepositives:
- Workstations with frequently changing users - Workstations with frequently changing users
level: medium level: medium
--- ---
id: e98374a6-e2d9-4076-9b5c-11bdb2569995
detection: detection:
selection1: selection1:
EventID: EventID:
@ -28,6 +28,7 @@ detection:
WorkstationName: '*' WorkstationName: '*'
condition: selection1 | count(TargetUserName) by WorkstationName > 3 condition: selection1 | count(TargetUserName) by WorkstationName > 3
--- ---
id: 6309ffc4-8fa2-47cf-96b8-a2f72e58e538
detection: detection:
selection2: selection2:
EventID: 4776 EventID: 4776

View File

@ -25,7 +25,7 @@ detection:
keywords: keywords:
- 'MsMpEng.exe' - 'MsMpEng.exe'
- 'mpengine.dll' - 'mpengine.dll'
condition: 1 of selection* and keywords condition: 1 of selection* and all of keywords
falsepositives: falsepositives:
- MsMpEng.exe can crash when C:\ is full - MsMpEng.exe can crash when C:\ is full
level: high level: high

View File

@ -1,6 +1,5 @@
action: global action: global
title: Zip A Folder With PowerShell For Staging In Temp title: Zip A Folder With PowerShell For Staging In Temp
id: 85a8e5ba-bd03-4bfb-bbfa-a4409a8f8b98
status: experimental status: experimental
author: frack113 author: frack113
date: 2021/07/20 date: 2021/07/20
@ -14,6 +13,7 @@ falsepositives:
- Unknown - Unknown
level: medium level: medium
--- ---
id: 85a8e5ba-bd03-4bfb-bbfa-a4409a8f8b98
logsource: logsource:
product: windows product: windows
category: process_creation category: process_creation
@ -26,6 +26,7 @@ detection:
- '$env:TEMP\' - '$env:TEMP\'
condition: selection condition: selection
--- ---
id: 71ff406e-b633-4989-96ec-bc49d825a412
logsource: logsource:
product: windows product: windows
service: powershell-classic service: powershell-classic
@ -39,6 +40,7 @@ detection:
- '$env:TEMP\' - '$env:TEMP\'
condition: selection condition: selection
--- ---
id: b7a3c9a3-09ea-4934-8864-6a32cacd98d9
logsource: logsource:
product: windows product: windows
service: powershell service: powershell

View File

@ -1,6 +1,5 @@
action: global action: global
title: Tap Driver Installation title: Tap Driver Installation
id: 8e4cf0e5-aa5d-4dc3-beff-dc26917744a9
description: Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques description: Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques
status: experimental status: experimental
author: Daniil Yugoslavskiy, Ian Davis, oscd.community author: Daniil Yugoslavskiy, Ian Davis, oscd.community
@ -16,6 +15,7 @@ detection:
ImagePath|contains: 'tap0901' ImagePath|contains: 'tap0901'
condition: selection condition: selection
--- ---
id: 8e4cf0e5-aa5d-4dc3-beff-dc26917744a9
logsource: logsource:
product: windows product: windows
service: system service: system
@ -23,10 +23,12 @@ detection:
selection: selection:
EventID: 7045 EventID: 7045
--- ---
id: 8bd47424-53e9-41ea-8a6a-a1f97b1bb0eb
logsource: logsource:
product: windows product: windows
category: driver_load category: driver_load
--- ---
id: 9c8afa4d-0022-48f0-9456-3712466f9701
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -1,6 +1,5 @@
action: global action: global
title: Dumpert Process Dumper title: Dumpert Process Dumper
id: 2704ab9e-afe2-4854-a3b1-0c0706d03578
description: Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory description: Detects the use of Dumpert process dumper, which dumps the lsass.exe process memory
author: Florian Roth author: Florian Roth
references: references:
@ -16,6 +15,7 @@ falsepositives:
- Very unlikely - Very unlikely
level: critical level: critical
--- ---
id: 2704ab9e-afe2-4854-a3b1-0c0706d03578
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows
@ -24,6 +24,7 @@ detection:
Imphash: '09D278F9DE118EF09163C6140255C690' Imphash: '09D278F9DE118EF09163C6140255C690'
condition: selection condition: selection
--- ---
id: 93d94efc-d7ad-4161-ad7d-1638c4f908d8
logsource: logsource:
category: file_event category: file_event
product: windows product: windows

View File

@ -15,3 +15,6 @@ detection:
falsepositives: falsepositives:
- unknown - unknown
level: high level: high
tags:
- attack.command_and_control
- attack.t1219

View File

@ -0,0 +1,25 @@
title: UAC Bypass Using Cleanmgr Temp File Creation
id: 6a8a8a65-15ac-4722-adb7-c93c213c180a
description: Detects the pattern of UAC bypass using cleanmgr.exe to create temporary files (UACMe 63)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
Image: 'C:\Windows\system32\cleanmgr.exe'
TargetFilename|startswith: 'C:\Users\'
TargetFilename|contains: '\AppData\Local\Temp\'
TargetFilename|endswith: '.dll'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,23 @@
title: UAC Bypass Using Consent and Comctl32 - File
id: 62ed5b55-f991-406a-85d9-e8e8fdf18789
description: Detects the pattern of UAC Bypass using consent.exe and comctl32.dll (UACMe 22)
author: Christian Burkard
date: 2021/08/23
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith: 'C:\Windows\System32\consent.exe.@'
TargetFilename|endswith: '\comctl32.dll'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,23 @@
title: UAC Bypass Using .NET Code Profiler on MMC
id: 93a19907-d4f9-4deb-9f91-aac4692776a6
description: Detects the pattern of UAC Bypass using .NET Code Profiler and mmc.exe DLL hijacking (UACMe 39)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith: '\AppData\Local\Temp\pe386.dll'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,25 @@
title: UAC Bypass Using IEInstal - File
id: bdd8157d-8e85-4397-bb82-f06cc9c71dbb
description: Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
Image: 'C:\Program Files\Internet Explorer\IEInstal.exe'
TargetFilename|startswith: 'C:\Users\'
TargetFilename|contains: '\AppData\Local\Temp\'
TargetFilename|endswith: 'consent.exe'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,23 @@
title: UAC Bypass Using MSConfig Token Modification - File
id: 41bb431f-56d8-4691-bb56-ed34e390906f
description: Detects the pattern of UAC Bypass using a msconfig GUI hack (UACMe 55)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith: '\AppData\Local\Temp\pkgmgr.exe'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,23 @@
title: UAC Bypass Using NTFS Reparse Point - File
id: 7fff6773-2baa-46de-a24a-b6eec1aba2d1
description: Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith: '\AppData\Local\Temp\api-ms-win-core-kernel32-legacy-l1.DLL'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,25 @@
title: UAC Bypass Abusing Winsat Path Parsing - File
id: 155dbf56-e0a4-4dd0-8905-8a98705045e8
description: Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe (UACMe 52)
author: Christian Burkard
date: 2021/08/30
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith:
- '\AppData\Local\Temp\system32\winsat.exe'
- '\AppData\Local\Temp\system32\winmm.dll'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -0,0 +1,26 @@
title: UAC Bypass Using Windows Media Player - File
id: 68578b43-65df-4f81-9a9b-92f32711a951
description: Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)
author: Christian Burkard
date: 2021/08/23
status: experimental
references:
- https://github.com/hfiref0x/UACME
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
category: file_event
product: windows
detection:
selection1:
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith: '\AppData\Local\Temp\OskSupport.dll'
selection2:
Image: 'C:\Windows\system32\DllHost.exe'
TargetFilename: 'C:\Program Files\Windows Media Player\osk.exe'
condition: 1 of selection*
falsepositives:
- Unknown
level: high

View File

@ -23,7 +23,7 @@ detection:
ImageLoaded|endswith: ImageLoaded|endswith:
- '\dbghelp.dll' - '\dbghelp.dll'
- '\dbgcore.dll' - '\dbgcore.dll'
Image|endswith: Image|endswith:
- '\msbuild.exe' - '\msbuild.exe'
- '\cmd.exe' - '\cmd.exe'
- '\svchost.exe' - '\svchost.exe'
@ -53,7 +53,7 @@ detection:
Signed: "FALSE" Signed: "FALSE"
filter: filter:
Image|contains: 'Visual Studio' Image|contains: 'Visual Studio'
condition: (signedprocess AND NOT filter) OR (unsignedprocess AND NOT filter) condition: (signedprocess and not filter) or (unsignedprocess and not filter)
fields: fields:
- ComputerName - ComputerName
- User - User

View File

@ -1,6 +1,5 @@
action: global action: global
title: Time Travel Debugging Utility Usage title: Time Travel Debugging Utility Usage
id: e76c8240-d68f-4773-8880-5c6f63595aaf
description: Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe. description: Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
references: references:
- https://lolbas-project.github.io/lolbas/Binaries/Tttracer/ - https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
@ -19,6 +18,7 @@ falsepositives:
- Legitimate usage by software developers/testers - Legitimate usage by software developers/testers
level: high level: high
--- ---
id: e76c8240-d68f-4773-8880-5c6f63595aaf
logsource: logsource:
product: windows product: windows
category: image_load category: image_load
@ -29,6 +29,7 @@ detection:
- '\ttdwriter.dll' - '\ttdwriter.dll'
- '\ttdloader.dll' - '\ttdloader.dll'
--- ---
id: 0b4ae027-2a2d-4b93-8c7e-962caaba5b2a
logsource: logsource:
product: windows product: windows
category: process_creation category: process_creation

View File

@ -0,0 +1,19 @@
title: APT PRIVATELOG Image Load Pattern
id: 33a2d1dd-f3b0-40bd-8baf-7974468927cc
status: experimental
description: Detects an image load pattern as seen when a tool named PRIVATELOG is used and rarely observed under legitimate circumstances
references:
- https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
author: Florian Roth
date: 2021/09/07
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith: '\svchost.exe'
ImageLoaded|endswith: '\clfsw32.dll'
condition: selection
falsepositives:
- Rarely observed
level: high

View File

@ -23,3 +23,5 @@ fields:
falsepositives: falsepositives:
- Unlikely - Unlikely
level: high level: high
tags:
- attack.execution

View File

@ -72,3 +72,6 @@ fields:
falsepositives: falsepositives:
- Unlikely - Unlikely
level: high level: high
tags:
- attack.resource_development
- attack.t1588

View File

@ -1,6 +1,5 @@
action: global action: global
title: Blue Mockingbird title: Blue Mockingbird
id: c3198a27-23a0-4c2c-af19-e5328d49680e
status: experimental status: experimental
description: Attempts to detect system changes made by Blue Mockingbird description: Attempts to detect system changes made by Blue Mockingbird
references: references:
@ -17,6 +16,7 @@ level: high
detection: detection:
condition: 1 of them condition: 1 of them
--- ---
id: c3198a27-23a0-4c2c-af19-e5328d49680e
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows
@ -27,6 +27,7 @@ detection:
- 'sc config' - 'sc config'
- 'wercplsupporte.dll' - 'wercplsupporte.dll'
--- ---
id: ce239692-aa94-41b3-b32f-9cab259c96ea
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows
@ -35,6 +36,7 @@ detection:
Image|endswith: '\wmic.exe' Image|endswith: '\wmic.exe'
CommandLine|endswith: 'COR_PROFILER' CommandLine|endswith: 'COR_PROFILER'
--- ---
id: 92b0b372-a939-44ed-a11b-5136cf680e27
logsource: logsource:
product: windows product: windows
category: registry_event category: registry_event

View File

@ -26,3 +26,6 @@ falsepositives:
- Unknown - Unknown
- UAC bypass method used by other malware - UAC bypass method used by other malware
level: critical level: critical
tags:
- attack.execution
- attack.t1204

View File

@ -24,3 +24,6 @@ detection:
falsepositives: falsepositives:
- Unlikely - Unlikely
level: critical level: critical
tags:
- attack.execution
- attack.t1204

View File

@ -1,6 +1,5 @@
action: global action: global
title: Regsvr32 Network Activity title: Regsvr32 Network Activity
id: c7e91a02-d771-4a6d-a700-42587e0b1095
description: Detects network connections and DNS queries initiated by Regsvr32.exe description: Detects network connections and DNS queries initiated by Regsvr32.exe
references: references:
- https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/ - https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
@ -31,10 +30,12 @@ falsepositives:
- unknown - unknown
level: high level: high
--- ---
id: c7e91a02-d771-4a6d-a700-42587e0b1095
logsource: logsource:
category: network_connection category: network_connection
product: windows product: windows
--- ---
id: 36e037c4-c228-4866-b6a3-48eb292b9955
logsource: logsource:
category: dns_query category: dns_query
product: windows product: windows

View File

@ -31,3 +31,6 @@ detection:
falsepositives: falsepositives:
- unknown - unknown
level: high level: high
tags:
- attack.command_and_control
- attack.t1105

View File

@ -17,4 +17,7 @@ detection:
condition: selection condition: selection
falsepositives: falsepositives:
- unlikely - unlikely
level: high level: high
tags:
- attack.execution
- attack.t1059

View File

@ -1,6 +1,5 @@
action: global action: global
title: Windows Defender Threat Detection Disabled title: Windows Defender Threat Detection Disabled
id: fe34868f-6e0e-4882-81f6-c43aa8f15b62
description: Detects disabling Windows Defender threat protection description: Detects disabling Windows Defender threat protection
date: 2020/07/28 date: 2020/07/28
modified: 2021/07/05 modified: 2021/07/05
@ -16,7 +15,8 @@ tags:
falsepositives: falsepositives:
- Administrator actions - Administrator actions
level: high level: high
--- ---
id: fe34868f-6e0e-4882-81f6-c43aa8f15b62
logsource: logsource:
product: windows product: windows
service: windefend service: windefend
@ -35,6 +35,7 @@ detection:
Details: 'DWORD (0x00000001)' Details: 'DWORD (0x00000001)'
condition: 1 of them condition: 1 of them
--- ---
id: a64e4198-c1c8-46a5-bc9c-324c86455fd4
logsource: logsource:
product: windows product: windows
category: registry_event category: registry_event
@ -45,6 +46,7 @@ detection:
Details: 'DWORD (0x00000001)' Details: 'DWORD (0x00000001)'
condition: tamper_registry condition: tamper_registry
--- ---
id: 6c0a7755-6d31-44fa-80e1-133e57752680
logsource: logsource:
product: windows product: windows
category: system category: system

View File

@ -1,6 +1,5 @@
action: global action: global
title: Windows Defender Exclusions Added title: Windows Defender Exclusions Added
id: 1321dc4e-a1fe-481d-a016-52c45f0c8b4f
description: Detects the Setting of Windows Defender Exclusions description: Detects the Setting of Windows Defender Exclusions
date: 2021/07/06 date: 2021/07/06
author: Christian Burkard author: Christian Burkard
@ -15,24 +14,22 @@ falsepositives:
- Administrator actions - Administrator actions
level: medium level: medium
--- ---
id: 1321dc4e-a1fe-481d-a016-52c45f0c8b4f
logsource: logsource:
product: windows product: windows
service: windefend service: windefend
detection: detection:
selection1: selection1:
EventID: EventID: 5007
- 5007 New Value|contains: '\Microsoft\Windows Defender\Exclusions'
New Value|contains:
- '\Microsoft\Windows Defender\Exclusions'
condition: selection1 condition: selection1
--- ---
id: a982fc9c-6333-4ffb-a51d-addb04e8b529
logsource: logsource:
product: windows product: windows
category: registry_event category: registry_event
detection: detection:
selection2: selection2:
EventID: EventID: 13
- 13 TargetObject|contains: '\Microsoft\Windows Defender\Exclusions'
TargetObject|contains:
- '\Microsoft\Windows Defender\Exclusions'
condition: selection2 condition: selection2

View File

@ -20,3 +20,6 @@ detection:
falsepositives: falsepositives:
- unlikely - unlikely
level: high level: high
tags:
- attack.execution
- attack.t1059

View File

@ -0,0 +1,23 @@
title: Remove Exported Mailbox from Exchange Webserver
id: 09570ae5-889e-43ea-aac0-0e1221fb3d95
status: experimental
description: Detects removal of an exported Exchange mailbox which could be to cover tracks from ProxyShell exploit
references:
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxyshell_rce.rb#L430
author: Christian Burkard
date: 2021/08/27
logsource:
service: msexchange-management
product: windows
detection:
command:
- 'Remove-MailboxExportRequest'
- ' -Identity '
- ' -Confirm "False"'
condition: all of command
falsepositives:
- unknown
level: high
tags:
- attack.defense_evasion
- attack.t1070

View File

@ -1,6 +1,5 @@
action: global action: global
title: PsExec Tool Execution title: PsExec Tool Execution
id: 42c575ea-e41e-41f1-b248-8093c3e82a28
status: experimental status: experimental
description: Detects PsExec service installation and execution events (service and Sysmon) description: Detects PsExec service installation and execution events (service and Sysmon)
author: Thomas Patzke author: Thomas Patzke
@ -28,6 +27,7 @@ falsepositives:
- unknown - unknown
level: low level: low
--- ---
id: 42c575ea-e41e-41f1-b248-8093c3e82a28
logsource: logsource:
product: windows product: windows
service: system service: system
@ -40,6 +40,7 @@ detection:
EventID: 7036 EventID: 7036
ServiceName: 'PSEXESVC' ServiceName: 'PSEXESVC'
--- ---
id: fa91cc36-24c9-41ce-b3c8-3bbc3f2f67ba
logsource: logsource:
category: process_creation category: process_creation
product: windows product: windows
@ -50,6 +51,7 @@ detection:
- 'NT AUTHORITY\SYSTEM' - 'NT AUTHORITY\SYSTEM'
- 'AUTORITE NT\Sys' # French language settings - 'AUTORITE NT\Sys' # French language settings
--- ---
id: f3f3a972-f982-40ad-b63c-bca6afdfad7c
logsource: logsource:
category: pipe_created category: pipe_created
product: windows product: windows
@ -57,6 +59,7 @@ detection:
sysmon_pipecreated: sysmon_pipecreated:
PipeName: '\PSEXESVC' PipeName: '\PSEXESVC'
--- ---
id: 259e5a6a-b8d2-4c38-86e2-26c5e651361d
logsource: logsource:
category: file_event category: file_event
product: windows product: windows

View File

@ -1,6 +1,5 @@
action: global action: global
title: WMI Persistence title: WMI Persistence
id: 0b7889b4-5577-4521-a60a-3376ee7f9f7b
status: experimental status: experimental
description: Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs. description: Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.
author: Florian Roth, Gleb Sukhodolskiy, Timur Zinniatullin oscd.community author: Florian Roth, Gleb Sukhodolskiy, Timur Zinniatullin oscd.community
@ -18,6 +17,7 @@ falsepositives:
- Unknown (data set is too small; further testing needed) - Unknown (data set is too small; further testing needed)
level: medium level: medium
--- ---
id: 0b7889b4-5577-4521-a60a-3376ee7f9f7b
logsource: logsource:
product: windows product: windows
service: wmi #native windows detection service: wmi #native windows detection
@ -34,6 +34,7 @@ detection:
EventID: 5859 EventID: 5859
condition: (wmi_filter_to_consumer_binding and consumer_keywords) or (wmi_filter_registration) condition: (wmi_filter_to_consumer_binding and consumer_keywords) or (wmi_filter_registration)
--- ---
id: f033f3f3-fd24-4995-97d8-a3bb17550a88
logsource: logsource:
product: windows product: windows
service: security service: security

View File

@ -16,7 +16,7 @@ tags:
logsource: logsource:
product: windows product: windows
category: pipe_created category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself.' definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself or use this extended version that logs the Named Pipes used in this Sigma repo (https://github.com/Neo23x0/sysmon-config)'
detection: detection:
selection_MSSE: selection_MSSE:
PipeName|contains|all: PipeName|contains|all:

View File

@ -6,7 +6,7 @@ references:
- https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575 - https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
- https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752 - https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752
date: 2021/07/30 date: 2021/07/30
modifed: 2021/08/26 modified: 2021/09/02
author: Florian Roth author: Florian Roth
tags: tags:
- attack.defense_evasion - attack.defense_evasion
@ -15,34 +15,28 @@ tags:
logsource: logsource:
product: windows product: windows
category: pipe_created category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself.' definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself or use this extended version that logs the Named Pipes used in this Sigma repo (https://github.com/Neo23x0/sysmon-config)'
detection: detection:
selection: selection:
- PipeName|re: '\\mojo\.5688\.8052\.183894939787088877[0-9a-f]{2}' - PipeName|re: '\\\\mojo\.5688\.8052\.(?:183894939787088877|35780273329370473)[0-9a-f]{2}'
- PipeName|re: '\\mojo\.5688\.8052\.35780273329370473[0-9a-f]{2}' - PipeName|re: '\\\\wkssvc_?[0-9a-f]{2}'
- PipeName|re: '\\wkssvc[0-9a-f]{2}' - PipeName|re: '\\\\ntsvcs[0-9a-f]{2}'
- PipeName|re: '\\wkssvc_[0-9a-f]{2}' - PipeName|re: '\\\\DserNamePipe[0-9a-f]{2}'
- PipeName|re: '\\ntsvcs[0-9a-f]{2}' - PipeName|re: '\\\\SearchTextHarvester[0-9a-f]{2}'
- PipeName|re: '\\DserNamePipe[0-9a-f]{2}' - PipeName|re: '\\\\mypipe\-(?:f|h)[0-9a-f]{2}'
- PipeName|re: '\\SearchTextHarvester[0-9a-f]{2}' - PipeName|re: '\\\\windows\.update\.manager[0-9a-f]{2,3}'
- PipeName|re: '\\mypipe\-f[0-9a-f]{2}' - PipeName|re: '\\\\ntsvcs_[0-9a-f]{2}'
- PipeName|re: '\\mypipe\-h[0-9a-f]{2}' - PipeName|re: '\\\\scerpc_?[0-9a-f]{2}'
- PipeName|re: '\\windows\.update\.manager[0-9a-f]{2}' - PipeName|re: '\\\\PGMessagePipe[0-9a-f]{2}'
- PipeName|re: '\\windows\.update\.manager[0-9a-f]{3}' - PipeName|re: '\\\\MsFteWds[0-9a-f]{2}'
- PipeName|re: '\\ntsvcs_[0-9a-f]{2}' - PipeName|re: '\\\\f4c3[0-9a-f]{2}'
- PipeName|re: '\\scerpc_[0-9a-f]{2}' - PipeName|re: '\\\\fullduplex_[0-9a-f]{2}'
- PipeName|re: '\\scerpc[0-9a-f]{2}' - PipeName|re: '\\\\msrpc_[0-9a-f]{4}'
- PipeName|re: '\\PGMessagePipe[0-9a-f]{2}' - PipeName|re: '\\\\win\\\\msrpc_[0-9a-f]{2}'
- PipeName|re: '\\MsFteWds[0-9a-f]{2}' - PipeName|re: '\\\\f53f[0-9a-f]{2}'
- PipeName|re: '\\f4c3[0-9a-f]{2}' - PipeName|re: '\\\\rpc_[0-9a-f]{2}'
- PipeName|re: '\\fullduplex_[0-9a-f]{2}' - PipeName|re: '\\\\spoolss_[0-9a-f]{2}'
- PipeName|re: '\\msrpc_[0-9a-f]{4}' - PipeName|re: '\\\\Winsock2\\\\CatalogChangeListener-[0-9a-f]{3}-0,'
- PipeName|re: '\\win\\msrpc_[0-9a-f]{2}'
- PipeName|re: '\\f53f[0-9a-f]{2}'
- PipeName|re: '\\rpc_[0-9a-f]{2}'
- PipeName|re: '\\spoolss_[0-9a-f]{2}'
- PipeName|re: '\\windows\.update\.manager[0-9a-f]{3}'
- PipeName|re: '\\Winsock2\\CatalogChangeListener-[0-9a-f]{3}-0,'
condition: selection condition: selection
falsepositives: falsepositives:
- Unknown - Unknown

View File

@ -34,6 +34,7 @@ detection:
- '\Posh*' #PoshC2 default - '\Posh*' #PoshC2 default
- '\jaccdpqnvbrrxlaf' #PoshC2 default - '\jaccdpqnvbrrxlaf' #PoshC2 default
- '\csexecsvc' #CSEXEC default - '\csexecsvc' #CSEXEC default
- '\6e7645c4-32c5-4fe3-aabf-e94c2f4370e7' # LiquidSnake https://github.com/RiccardoAncarani/LiquidSnake
condition: selection condition: selection
tags: tags:
- attack.defense_evasion - attack.defense_evasion

View File

@ -15,7 +15,7 @@ tags:
logsource: logsource:
product: windows product: windows
category: pipe_created category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself.' definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself or use this extended version that logs the Named Pipes used in this Sigma repo (https://github.com/Neo23x0/sysmon-config)'
detection: detection:
selection_malleable_profiles: selection_malleable_profiles:
- PipeName|startswith: - PipeName|startswith:

View File

@ -0,0 +1,19 @@
title: WMI Event Consumer Created Named Pipe
id: 493fb4ab-cdcc-4c4f-818c-0e363bd1e4bb
status: experimental
description: Detects the WMI Event Consumer service scrcons.exe creating a named pipe
references:
- https://github.com/RiccardoAncarani/LiquidSnake
date: 2021/09/01
author: Florian Roth
logsource:
product: windows
category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). In the current popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config) this is not there, you have to add it yourself or use this extended version that logs the Named Pipes used in this Sigma repo (https://github.com/Neo23x0/sysmon-config)'
detection:
selection:
Image|endswith: '\scrcons.exe'
condition: selection
falsepositives:
- Unknown
level: high

View File

@ -1,6 +1,5 @@
action: global action: global
title: Alternate PowerShell Hosts title: Alternate PowerShell Hosts
id: 64e8e417-c19a-475a-8d19-98ea705394cc
description: Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe description: Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe
status: test status: test
date: 2019/08/11 date: 2019/08/11
@ -18,6 +17,7 @@ falsepositives:
- Citrix ConfigSync.ps1 - Citrix ConfigSync.ps1
level: medium level: medium
--- ---
id: 64e8e417-c19a-475a-8d19-98ea705394cc
logsource: logsource:
product: windows product: windows
service: powershell service: powershell
@ -30,6 +30,7 @@ detection:
ContextInfo|contains: 'powershell.exe' # Host Application=...powershell.exe or Application hote=...powershell.exe in French Win10 event ContextInfo|contains: 'powershell.exe' # Host Application=...powershell.exe or Application hote=...powershell.exe in French Win10 event
condition: selection and not filter condition: selection and not filter
--- ---
id: d7326048-328b-4d5e-98af-86e84b17c765
logsource: logsource:
product: windows product: windows
service: powershell-classic service: powershell-classic

View File

@ -1,8 +1,9 @@
title: PrintNightmare Powershell Exploitation title: PrintNightmare Powershell Exploitation
id: 6d3f1399-a81c-4409-aff3-1ecfe9330baf id: 6d3f1399-a81c-4409-aff3-1ecfe9330baf
status: experimental status: test
description: Detects Commandlet name for PrintNightmare exploitation. description: Detects Commandlet name for PrintNightmare exploitation.
date: 2021/08/09 date: 2021/08/09
modified: 2021/08/31
references: references:
- https://github.com/calebstewart/CVE-2021-1675 - https://github.com/calebstewart/CVE-2021-1675
author: Max Altgelt, Tobias Michalski author: Max Altgelt, Tobias Michalski
@ -13,8 +14,10 @@ logsource:
detection: detection:
selection: selection:
EventID: 4104 EventID: 4104
ScriptBlockText: Invoke-Nightmare ScriptBlockText|contains: Invoke-Nightmare
condition: selection condition: selection
falsepositives: falsepositives:
- Unknown - Unknown
level: high level: high
tags:
- attack.privilege_escalation

View File

@ -23,7 +23,7 @@ detection:
- ScriptBlockText|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\[' - ScriptBlockText|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- ScriptBlockText|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\[' - ScriptBlockText|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
- ScriptBlockText|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}' - ScriptBlockText|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
- ScriptBlockText|re: '\*mdr\*\W\s*\)\.Name' - ScriptBlockText|re: '\\\\*mdr\\\\*\W\s*\)\.Name'
- ScriptBlockText|re: '\$VerbosePreference\.ToString\(' - ScriptBlockText|re: '\$VerbosePreference\.ToString\('
- ScriptBlockText|re: '\String\]\s*\$VerbosePreference' - ScriptBlockText|re: '\String\]\s*\$VerbosePreference'
selection_3: selection_3:
@ -33,7 +33,7 @@ detection:
- Payload|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\[' - Payload|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- Payload|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\[' - Payload|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
- Payload|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}' - Payload|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
- Payload|re: '\*mdr\*\W\s*\)\.Name' - Payload|re: '\\\\*mdr\\\\*\W\s*\)\.Name'
- Payload|re: '\$VerbosePreference\.ToString\(' - Payload|re: '\$VerbosePreference\.ToString\('
- Payload|re: '\String\]\s*\$VerbosePreference' - Payload|re: '\String\]\s*\$VerbosePreference'
condition: ( selection_1 and selection_2 ) or ( selection_3 and selection_4 ) condition: ( selection_1 and selection_2 ) or ( selection_3 and selection_4 )

View File

@ -4,6 +4,7 @@ status: experimental
description: Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging. description: Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.
references: references:
- http://www.powertheshell.com/ntfsstreams/ - http://www.powertheshell.com/ntfsstreams/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.004/T1564.004.md
tags: tags:
- attack.defense_evasion - attack.defense_evasion
- attack.t1564.004 - attack.t1564.004

Some files were not shown because too many files have changed in this diff Show More