mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
4 rules to cover ART
This commit is contained in:
parent
454ba2b576
commit
dcaacd07bf
@ -0,0 +1,27 @@
|
||||
title: Direct Run key modification
|
||||
description: Detects direct Run key modification for persistence using reg.exe.
|
||||
status: test
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1060/T1060.yaml
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1060
|
||||
date: 2019/10/25
|
||||
modified: 2019/10/25
|
||||
author: Victor Sergeev, oscd.community
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\reg.exe'
|
||||
CommandLine:
|
||||
- '*add*Microsoft\Windows\CurrentVersion\Run*'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Admin scripts
|
||||
level: high
|
@ -0,0 +1,27 @@
|
||||
title: Suspicious netsh Dll persistence
|
||||
description: Detects pesitence via netsh helper
|
||||
status: test
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1060/T1060.yaml
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1060
|
||||
date: 2019/10/25
|
||||
modified: 2019/10/25
|
||||
author: Victor Sergeev, oscd.community
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\netsh.exe'
|
||||
CommandLine:
|
||||
- '*add*helper*'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Unkown
|
||||
level: high
|
@ -0,0 +1,28 @@
|
||||
title: Suspicious service path modification
|
||||
description: Detects service path modification to powershell/cmd
|
||||
status: test
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1031/T1031.yaml
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1031
|
||||
date: 2019/10/21
|
||||
modified: 2019/10/21
|
||||
author: Victor Sergeev, oscd.community
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\sc.exe'
|
||||
CommandLine:
|
||||
- '*config*binpath*powershell*'
|
||||
- '*config*binpath*cmd*'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
27
rules/windows/sysmon/sysmon_runkey_from_powershell.yml
Normal file
27
rules/windows/sysmon/sysmon_runkey_from_powershell.yml
Normal file
@ -0,0 +1,27 @@
|
||||
title: Autorun key modification from powershell/cmd
|
||||
description: Detects possible persistence from powershell/cmd scripts
|
||||
status: test
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1060/T1060.yaml
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1060
|
||||
date: 2019/10/21
|
||||
modified: 2019/10/21
|
||||
author: Victor Sergeev, oscd.community
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 13
|
||||
Image:
|
||||
- '*\powershell.exe'
|
||||
- '*\cmd.exe'
|
||||
TargetObject:
|
||||
- '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\*'
|
||||
- '*\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\\*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Admin scripts
|
||||
level: medium
|
Loading…
Reference in New Issue
Block a user