mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 17:35:19 +00:00
Auto stash before rebase of "Neo23x0/master"
This commit is contained in:
parent
6cc1770351
commit
d2e605fc5c
32
rules/apt/apt_empiremonkey.yml
Normal file
32
rules/apt/apt_empiremonkey.yml
Normal file
@ -0,0 +1,32 @@
|
||||
---
|
||||
action: global
|
||||
title: Empire Monkey
|
||||
description: Detects EmpireMonkey APT reported Activity
|
||||
references:
|
||||
- https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
|
||||
tags:
|
||||
- attack.t1086
|
||||
- attack.execution
|
||||
date: 2019/04/02
|
||||
author: Markus Neis
|
||||
detection:
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Very Unlikely
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_cutil:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Image:
|
||||
- '*\cutil.exe'
|
||||
selection_regsvr32:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Description:
|
||||
- Microsoft(C) Registerserver
|
||||
|
55
rules/windows/process_creation/win_susp_squirrel_lolbin.yml
Normal file
55
rules/windows/process_creation/win_susp_squirrel_lolbin.yml
Normal file
@ -0,0 +1,55 @@
|
||||
title: Squirrel Lolbin
|
||||
status: experimental
|
||||
description: Detects Possible Squirrel Packages Manager as Lolbin
|
||||
references:
|
||||
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
|
||||
tags:
|
||||
- attack.execution
|
||||
author: Karneades / Markus Neis
|
||||
falsepositives:
|
||||
- 1Clipboard
|
||||
- Beaker Browser
|
||||
- Caret
|
||||
- Collectie
|
||||
- Discord
|
||||
- Figma
|
||||
- Flow
|
||||
- Ghost
|
||||
- GitHub Desktop
|
||||
- GitKraken
|
||||
- Hyper
|
||||
- Insomnia
|
||||
- JIBO
|
||||
- Kap
|
||||
- Kitematic
|
||||
- Now Desktop
|
||||
- Postman
|
||||
- PostmanCanary
|
||||
- Rambox
|
||||
- Simplenote
|
||||
- Skype
|
||||
- Slack
|
||||
- SourceTree
|
||||
- Stride
|
||||
- Svgsus
|
||||
- WebTorrent
|
||||
- WhatsApp
|
||||
- WordPress.com
|
||||
- atom
|
||||
- gitkraken
|
||||
- slack
|
||||
- teams
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\update.exe' # Check if folder Name matches executed binary \\(?P<first>[^\\]*)\\Update.*Start.{2}(?P<second>\1)\.exe (example: https://regex101.com/r/SGSQGz/2)
|
||||
CommandLine:
|
||||
- '*--processStart*.exe*'
|
||||
- '*–createShortcut*.exe*'
|
||||
condition: selection
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user