change to unsupported status

This commit is contained in:
frack113 2021-10-29 06:53:24 +02:00
parent c49b0d49fa
commit b2d66c41f3
28 changed files with 31 additions and 28 deletions

View File

@ -4,7 +4,7 @@ related:
- id: f7385ee2-0e0c-11eb-adc1-0242ac120002
type: derived
description: Detects Obfuscated use of Clip.exe to execute PowerShell
status: experimental
status: unsupported
author: Jonathan Cheong, oscd.community
date: 2020/10/13
modified: 2021/09/16

View File

@ -4,7 +4,7 @@ related:
- id: 51aa9387-1c53-4153-91cc-d73c59ae1ca9
type: derived
description: "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
status: experimental
status: unsupported
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
date: 2019/11/08
modified: 2021/09/16

View File

@ -4,7 +4,7 @@ related:
- id: 72862bf2-0eb1-11eb-adc1-0242ac120002
type: derived
description: Detects Obfuscated use of stdin to execute PowerShell
status: experimental
status: unsupported
author: Jonathan Cheong, oscd.community
date: 2020/10/15
modified: 2021/09/17

View File

@ -4,7 +4,7 @@ related:
- id: 8ca7004b-e620-4ecb-870e-86129b5b8e75
type: derived
description: Detects Obfuscated use of Environment Variables to execute PowerShell
status: experimental
status: unsupported
author: Jonathan Cheong, oscd.community
date: 2020/10/15
modified: 2021/09/17

View File

@ -4,7 +4,7 @@ related:
- id: 175997c5-803c-4b08-8bb0-70b099f47595
type: derived
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
status: experimental
status: unsupported
author: Timur Zinniatullin, oscd.community
date: 2020/10/18
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 11b52f18-aaec-4d60-9143-5dd8cc4706b9
type: derived
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
status: experimental
status: unsupported
author: Timur Zinniatullin, oscd.community
date: 2020/10/18
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 487c7524-f892-4054-b263-8a0ace63fc25
type: derived
description: Detects Obfuscated Powershell via Stdin in Scripts
status: experimental
status: unsupported
author: Nikita Nazarov, oscd.community
date: 2020/10/12
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 63e3365d-4824-42d8-8b82-e56810fefa0c
type: derived
description: Detects Obfuscated Powershell via use Clip.exe in Scripts
status: experimental
status: unsupported
author: Nikita Nazarov, oscd.community
date: 2020/10/09
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4
type: derived
description: Detects Obfuscated Powershell via use MSHTA in Scripts
status: experimental
status: unsupported
author: Nikita Nazarov, oscd.community
date: 2020/10/09
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 641a4bfb-c017-44f7-800c-2aee0184ce9b
type: derived
description: Detects Obfuscated Powershell via use Rundll32 in Scripts
status: experimental
status: unsupported
author: Nikita Nazarov, oscd.community
date: 2020/10/09
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 14bcba49-a428-42d9-b943-e2ce0f0f7ae6
type: derived
description: Detects Obfuscated Powershell via VAR++ LAUNCHER
status: experimental
status: unsupported
author: Timur Zinniatullin, oscd.community
date: 2020/10/13
modified: 2021/09/18

View File

@ -4,7 +4,7 @@ related:
- id: 8e4cf0e5-aa5d-4dc3-beff-dc26917744a9
type: derived
description: Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques
status: experimental
status: unsupported
author: Daniil Yugoslavskiy, Ian Davis, oscd.community
date: 2019/10/24
modified: 2021/09/21

View File

@ -39,4 +39,4 @@ detection:
falsepositives:
- Legitimate domain name requested, which should be added to whitelist
level: high
status: experimental
status: unsupported

View File

@ -34,4 +34,4 @@ detection:
falsepositives:
- Legitimate domain name requested, which should be added to whitelist
level: high
status: experimental
status: unsupported

View File

@ -1,6 +1,6 @@
title: Possible DNS Rebinding
id: ec5b8711-b550-4879-9660-568aaae2c3ea
status: experimental
status: unsupported
description: 'Detects DNS-answer with TTL <10.'
date: 2019/10/25
author: Ilyas Ochkov, oscd.community

View File

@ -1,7 +1,7 @@
title: MSI Spawned Cmd and Powershell Spawned Processes
id: 38cf8340-461b-4857-bf99-23a41f772b18
description: This rule will looks for Windows Installer service (msiexec.exe) spawned command line and/or powershell that spawned other processes
status: experimental
status: unsupported
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
date: 2020/10/13
references:

View File

@ -3,7 +3,7 @@ id: 078235c5-6ec5-48e7-94b2-f8b5474379ea
description: This rule will looks any process with low privilege launching Windows Installer service (msiexec.exe) that tries to install MSI packages with SYSTEM privilege
#look for MSI start by low privilege user, write the process guid to the suspicious_guid variable
#look for child process from the suspicious_guid, alert if it's Windows Installer trying to install package with SYSTEM privilege
status: experimental
status: unsupported
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
date: 2020/10/13
references:

View File

@ -11,7 +11,7 @@ description: Detects process reimaging defense evasion technique
# Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec.
# Rule logic is currently not supported by SIGMA.
# Sysmon v.10.0 or newer is required for proper detection.
status: experimental
status: unsupported
author: Alexey Balandin, oscd.community
references:
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/in-ntdll-i-trust-process-reimaging-and-endpoint-security-solution-bypass/

View File

@ -1,7 +1,7 @@
title: Stored Credentials in Fake Files
id: 692b979c-f747-41dc-ad72-1f11c01b110e
description: Search for accessing of fake files with stored credentials
status: experimental
status: unsupported
author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
date: 2020/10/05
references:

View File

@ -12,6 +12,7 @@ tags:
date: 2017/11/01
modified: 2020/08/23
author: Thomas Patzke
status: unsupported
logsource:
product: windows
service: system

View File

@ -31,4 +31,4 @@ detection:
falsepositives:
- Legitimate administrator adding new domain controller to already existing domain
level: medium
status: experimental
status: unsupported

View File

@ -27,4 +27,4 @@ detection:
falsepositives:
- Legitimate administrator adding new domain controller to already existing domain
level: medium
status: experimental
status: unsupported

View File

@ -6,7 +6,7 @@ references:
tags:
- attack.privilege_escalation
- attack.t1068
status: experimental
status: unsupported
author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule)
date: 2019/06/03
logsource:

View File

@ -35,3 +35,4 @@ detection:
falsepositives:
- Penetration testing
level: critical
status: unsupported

View File

@ -35,3 +35,4 @@ fields:
falsepositives:
- Possible, different agents with a 8 character binary and a 4, 8 or 16 character service name
level: high
status: unsupported

View File

@ -8,7 +8,7 @@ tags:
- attack.privilege_escalation
- attack.t1134 # an old one
- attack.t1134.002
status: experimental
status: unsupported
author: Teymur Kheirkhabarov
date: 2019/10/26
modified: 2020/09/01

View File

@ -1,6 +1,6 @@
title: Remote Schtasks Creation
id: cf349c4b-99af-40fa-a051-823aa2307a84
status: experimental
status: unsupported
description: Detects remote execution via scheduled task creation or update on the destination host
author: Jai Minton, oscd.community
date: 2020/10/05

View File

@ -1,7 +1,7 @@
action: global
title: Remote Service Creation
id: 4a3a2b96-d7fc-4cb9-80e4-4a545fe95f46
status: experimental
status: unsupported
description: Detects remote execution via service creation on the destination host
author: Jai Minton, oscd.community
date: 2020/10/05