Merge pull request #1264 from omkar72/sdev-1

Adding 2 rules - Conhost & office test registry persistence
This commit is contained in:
Florian Roth 2020-12-21 18:28:59 +01:00 committed by GitHub
commit f20f346a6a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 48 additions and 0 deletions

View File

@ -0,0 +1,25 @@
title: Conhost Parent Proces Executions
id: 7dc2dedd-7603-461a-bc13-15803d132355
status: experimental
description: Detects the conhost execution as parent process. Can be used to evaded defense mechanism.
references:
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
author: omkar72
date: 2020/10/25
tags:
- attack.defense_evasion
- attack.t1202
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\conhost.exe'
condition: selection
fields:
- Image
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely, conhost is a child less process
level: medium

View File

@ -0,0 +1,23 @@
title: Office Application Startup - Office Test
id: 3d27f6dd-1c74-4687-b4fa-ca849d128d1c
status: experimental
description: Detects the addition of office test registry that allows a user to specify an arbitrary DLL that will be executed everytime an Office application is started
references:
- https://attack.mitre.org/techniques/T1137/002/
author: omkar72
tags:
- attack.persistence
- attack.t1137.002
date: 2020/10/25
logsource:
category: registry_event
product: windows
detection:
selection_registry:
TargetObject:
- 'HKEY_CURRENT_USER\Software\Microsoft\Office test\Special\Perf'
- 'HKEY_LOCAL_MACHINE\Software\Microsoft\Office test\Special\Perf'
condition: selection_registry
falsepositives:
- Unlikely
level: medium