change to unsupported status

This commit is contained in:
frack113 2021-10-29 06:53:24 +02:00
parent c49b0d49fa
commit b2d66c41f3
28 changed files with 31 additions and 28 deletions

View File

@ -4,7 +4,7 @@ related:
- id: f7385ee2-0e0c-11eb-adc1-0242ac120002 - id: f7385ee2-0e0c-11eb-adc1-0242ac120002
type: derived type: derived
description: Detects Obfuscated use of Clip.exe to execute PowerShell description: Detects Obfuscated use of Clip.exe to execute PowerShell
status: experimental status: unsupported
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
date: 2020/10/13 date: 2020/10/13
modified: 2021/09/16 modified: 2021/09/16

View File

@ -4,7 +4,7 @@ related:
- id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9 - id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9
type: derived type: derived
description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888" description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
status: experimental status: unsupported
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
date: 2019/11/08 date: 2019/11/08
modified: 2021/09/16 modified: 2021/09/16

View File

@ -4,7 +4,7 @@ related:
- id: 72862bf2-0eb1-11eb-adc1-0242ac120002 - id: 72862bf2-0eb1-11eb-adc1-0242ac120002
type: derived type: derived
description: Detects Obfuscated use of stdin to execute PowerShell description: Detects Obfuscated use of stdin to execute PowerShell
status: experimental status: unsupported
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
date: 2020/10/15 date: 2020/10/15
modified: 2021/09/17 modified: 2021/09/17

View File

@ -4,7 +4,7 @@ related:
- id: 8ca7004b-e620-4ecb-870e-86129b5b8e75 - id: 8ca7004b-e620-4ecb-870e-86129b5b8e75
type: derived type: derived
description: Detects Obfuscated use of Environment Variables to execute PowerShell description: Detects Obfuscated use of Environment Variables to execute PowerShell
status: experimental status: unsupported
author: Jonathan Cheong, oscd.community author: Jonathan Cheong, oscd.community
date: 2020/10/15 date: 2020/10/15
modified: 2021/09/17 modified: 2021/09/17

View File

@ -4,7 +4,7 @@ related:
- id: 175997c5-803c-4b08-8bb0-70b099f47595 - id: 175997c5-803c-4b08-8bb0-70b099f47595
type: derived type: derived
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
status: experimental status: unsupported
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
date: 2020/10/18 date: 2020/10/18
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 11b52f18-aaec-4d60-9143-5dd8cc4706b9 - id: 11b52f18-aaec-4d60-9143-5dd8cc4706b9
type: derived type: derived
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
status: experimental status: unsupported
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
date: 2020/10/18 date: 2020/10/18
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 487c7524-f892-4054-b263-8a0ace63fc25 - id: 487c7524-f892-4054-b263-8a0ace63fc25
type: derived type: derived
description: Detects Obfuscated Powershell via Stdin in Scripts description: Detects Obfuscated Powershell via Stdin in Scripts
status: experimental status: unsupported
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
date: 2020/10/12 date: 2020/10/12
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 63e3365d-4824-42d8-8b82-e56810fefa0c - id: 63e3365d-4824-42d8-8b82-e56810fefa0c
type: derived type: derived
description: Detects Obfuscated Powershell via use Clip.exe in Scripts description: Detects Obfuscated Powershell via use Clip.exe in Scripts
status: experimental status: unsupported
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
date: 2020/10/09 date: 2020/10/09
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4 - id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4
type: derived type: derived
description: Detects Obfuscated Powershell via use MSHTA in Scripts description: Detects Obfuscated Powershell via use MSHTA in Scripts
status: experimental status: unsupported
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
date: 2020/10/09 date: 2020/10/09
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 641a4bfb-c017-44f7-800c-2aee0184ce9b - id: 641a4bfb-c017-44f7-800c-2aee0184ce9b
type: derived type: derived
description: Detects Obfuscated Powershell via use Rundll32 in Scripts description: Detects Obfuscated Powershell via use Rundll32 in Scripts
status: experimental status: unsupported
author: Nikita Nazarov, oscd.community author: Nikita Nazarov, oscd.community
date: 2020/10/09 date: 2020/10/09
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 14bcba49-a428-42d9-b943-e2ce0f0f7ae6 - id: 14bcba49-a428-42d9-b943-e2ce0f0f7ae6
type: derived type: derived
description: Detects Obfuscated Powershell via VAR++ LAUNCHER description: Detects Obfuscated Powershell via VAR++ LAUNCHER
status: experimental status: unsupported
author: Timur Zinniatullin, oscd.community author: Timur Zinniatullin, oscd.community
date: 2020/10/13 date: 2020/10/13
modified: 2021/09/18 modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 8e4cf0e5-aa5d-4dc3-beff-dc26917744a9 - id: 8e4cf0e5-aa5d-4dc3-beff-dc26917744a9
type: derived type: derived
description: Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques description: Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques
status: experimental status: unsupported
author: Daniil Yugoslavskiy, Ian Davis, oscd.community author: Daniil Yugoslavskiy, Ian Davis, oscd.community
date: 2019/10/24 date: 2019/10/24
modified: 2021/09/21 modified: 2021/09/21

View File

@ -39,4 +39,4 @@ detection:
falsepositives: falsepositives:
- Legitimate domain name requested, which should be added to whitelist - Legitimate domain name requested, which should be added to whitelist
level: high level: high
status: experimental status: unsupported

View File

@ -34,4 +34,4 @@ detection:
falsepositives: falsepositives:
- Legitimate domain name requested, which should be added to whitelist - Legitimate domain name requested, which should be added to whitelist
level: high level: high
status: experimental status: unsupported

View File

@ -1,6 +1,6 @@
title: Possible DNS Rebinding title: Possible DNS Rebinding
id: ec5b8711-b550-4879-9660-568aaae2c3ea id: ec5b8711-b550-4879-9660-568aaae2c3ea
status: experimental status: unsupported
description: 'Detects DNS-answer with TTL <10.' description: 'Detects DNS-answer with TTL <10.'
date: 2019/10/25 date: 2019/10/25
author: Ilyas Ochkov, oscd.community author: Ilyas Ochkov, oscd.community

View File

@ -1,7 +1,7 @@
title: MSI Spawned Cmd and Powershell Spawned Processes title: MSI Spawned Cmd and Powershell Spawned Processes
id: 38cf8340-461b-4857-bf99-23a41f772b18 id: 38cf8340-461b-4857-bf99-23a41f772b18
description: This rule will looks for Windows Installer service (msiexec.exe) spawned command line and/or powershell that spawned other processes description: This rule will looks for Windows Installer service (msiexec.exe) spawned command line and/or powershell that spawned other processes
status: experimental status: unsupported
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
date: 2020/10/13 date: 2020/10/13
references: references:

View File

@ -3,7 +3,7 @@ id: 078235c5-6ec5-48e7-94b2-f8b5474379ea
description: This rule will looks any process with low privilege launching Windows Installer service (msiexec.exe) that tries to install MSI packages with SYSTEM privilege description: This rule will looks any process with low privilege launching Windows Installer service (msiexec.exe) that tries to install MSI packages with SYSTEM privilege
#look for MSI start by low privilege user, write the process guid to the suspicious_guid variable #look for MSI start by low privilege user, write the process guid to the suspicious_guid variable
#look for child process from the suspicious_guid, alert if it's Windows Installer trying to install package with SYSTEM privilege #look for child process from the suspicious_guid, alert if it's Windows Installer trying to install package with SYSTEM privilege
status: experimental status: unsupported
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
date: 2020/10/13 date: 2020/10/13
references: references:

View File

@ -11,7 +11,7 @@ description: Detects process reimaging defense evasion technique
# Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec. # Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec.
# Rule logic is currently not supported by SIGMA. # Rule logic is currently not supported by SIGMA.
# Sysmon v.10.0 or newer is required for proper detection. # Sysmon v.10.0 or newer is required for proper detection.
status: experimental status: unsupported
author: Alexey Balandin, oscd.community author: Alexey Balandin, oscd.community
references: references:
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/in-ntdll-i-trust-process-reimaging-and-endpoint-security-solution-bypass/ - https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/in-ntdll-i-trust-process-reimaging-and-endpoint-security-solution-bypass/

View File

@ -1,7 +1,7 @@
title: Stored Credentials in Fake Files title: Stored Credentials in Fake Files
id: 692b979c-f747-41dc-ad72-1f11c01b110e id: 692b979c-f747-41dc-ad72-1f11c01b110e
description: Search for accessing of fake files with stored credentials description: Search for accessing of fake files with stored credentials
status: experimental status: unsupported
author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
date: 2020/10/05 date: 2020/10/05
references: references:

View File

@ -11,7 +11,8 @@ tags:
- attack.t1543.003 - attack.t1543.003
date: 2017/11/01 date: 2017/11/01
modified: 2020/08/23 modified: 2020/08/23
author: Thomas Patzke author: Thomas Patzke
status: unsupported
logsource: logsource:
product: windows product: windows
service: system service: system

View File

@ -31,4 +31,4 @@ detection:
falsepositives: falsepositives:
- Legitimate administrator adding new domain controller to already existing domain - Legitimate administrator adding new domain controller to already existing domain
level: medium level: medium
status: experimental status: unsupported

View File

@ -27,4 +27,4 @@ detection:
falsepositives: falsepositives:
- Legitimate administrator adding new domain controller to already existing domain - Legitimate administrator adding new domain controller to already existing domain
level: medium level: medium
status: experimental status: unsupported

View File

@ -6,7 +6,7 @@ references:
tags: tags:
- attack.privilege_escalation - attack.privilege_escalation
- attack.t1068 - attack.t1068
status: experimental status: unsupported
author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule) author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule)
date: 2019/06/03 date: 2019/06/03
logsource: logsource:

View File

@ -34,4 +34,5 @@ detection:
condition: selection and 1 of malsvc_* condition: selection and 1 of malsvc_*
falsepositives: falsepositives:
- Penetration testing - Penetration testing
level: critical level: critical
status: unsupported

View File

@ -34,4 +34,5 @@ fields:
- ServiceFileName - ServiceFileName
falsepositives: falsepositives:
- Possible, different agents with a 8 character binary and a 4, 8 or 16 character service name - Possible, different agents with a 8 character binary and a 4, 8 or 16 character service name
level: high level: high
status: unsupported

View File

@ -8,7 +8,7 @@ tags:
- attack.privilege_escalation - attack.privilege_escalation
- attack.t1134 # an old one - attack.t1134 # an old one
- attack.t1134.002 - attack.t1134.002
status: experimental status: unsupported
author: Teymur Kheirkhabarov author: Teymur Kheirkhabarov
date: 2019/10/26 date: 2019/10/26
modified: 2020/09/01 modified: 2020/09/01

View File

@ -1,6 +1,6 @@
title: Remote Schtasks Creation title: Remote Schtasks Creation
id: cf349c4b-99af-40fa-a051-823aa2307a84 id: cf349c4b-99af-40fa-a051-823aa2307a84
status: experimental status: unsupported
description: Detects remote execution via scheduled task creation or update on the destination host description: Detects remote execution via scheduled task creation or update on the destination host
author: Jai Minton, oscd.community author: Jai Minton, oscd.community
date: 2020/10/05 date: 2020/10/05

View File

@ -1,7 +1,7 @@
action: global action: global
title: Remote Service Creation title: Remote Service Creation
id: 4a3a2b96-d7fc-4cb9-80e4-4a545fe95f46 id: 4a3a2b96-d7fc-4cb9-80e4-4a545fe95f46
status: experimental status: unsupported
description: Detects remote execution via service creation on the destination host description: Detects remote execution via service creation on the destination host
author: Jai Minton, oscd.community author: Jai Minton, oscd.community
date: 2020/10/05 date: 2020/10/05