Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixes & Updates #4577

Merged
merged 45 commits into from
Dec 21, 2023
Merged
Show file tree
Hide file tree
Changes from 44 commits
Commits
Show all changes
45 commits
Select commit Hold shift + click to select a range
8ce18be
fix: #4572
nasbench Nov 15, 2023
47dad80
feat: update batch
nasbench Nov 17, 2023
d4afe62
Update win_security_disable_event_auditing_critical.yml
nasbench Nov 17, 2023
13ca304
feat: update defender rule
nasbench Nov 22, 2023
d508093
feat: more updates
nasbench Nov 22, 2023
705a7b5
Update win_defender_antimalware_platform_expired.yml
nasbench Nov 22, 2023
7b93e1f
quick fix
nasbench Nov 23, 2023
73401bb
feat: small update
nasbench Nov 30, 2023
9af5519
feat: update pipe rules
nasbench Nov 30, 2023
1ee22da
fix: #4613
nasbench Dec 2, 2023
c445b84
fix: #4572
nasbench Nov 15, 2023
80a0406
feat: update batch
nasbench Nov 17, 2023
27041ea
Update win_security_disable_event_auditing_critical.yml
nasbench Nov 17, 2023
d83316f
feat: update defender rule
nasbench Nov 22, 2023
0b0d168
feat: more updates
nasbench Nov 22, 2023
aa22111
Update win_defender_antimalware_platform_expired.yml
nasbench Nov 22, 2023
cb1f9bb
quick fix
nasbench Nov 23, 2023
d6556b4
feat: small update
nasbench Nov 30, 2023
eb03657
feat: update pipe rules
nasbench Nov 30, 2023
4437690
fix: #4613
nasbench Dec 2, 2023
cc7cf2a
Merge branch 'fix-env-stuff' of https://github.com/nasbench/sigma int…
nasbench Dec 4, 2023
b617b8d
fix: susp service rule
nasbench Dec 4, 2023
8d34ade
Merge branch 'SigmaHQ:master' into fix-env-stuff
nasbench Dec 11, 2023
148fdd5
fix: fp found in testing
nasbench Dec 13, 2023
249777f
feat: more updates
nasbench Dec 18, 2023
7578f41
feat: even more updates
nasbench Dec 18, 2023
b35da8c
Update proc_access_win_lsass_susp_source_process.yml
nasbench Dec 18, 2023
d4bdcfb
fix: indentation issues
nasbench Dec 18, 2023
5f9d4bf
fix: more issues fixed
nasbench Dec 18, 2023
5e22b5e
fix: typo/wording
phantinuss Dec 19, 2023
8b463bc
Update rules-placeholder/windows/builtin/security/win_security_admin_…
nasbench Dec 19, 2023
0c99a49
Update rules-threat-hunting/windows/powershell/powershell_classic/pos…
nasbench Dec 19, 2023
04cc9b9
Update rules-threat-hunting/windows/powershell/powershell_script/posh…
nasbench Dec 19, 2023
5853cb8
Update rules/windows/driver_load/driver_load_win_mal_drivers_names.yml
nasbench Dec 19, 2023
7b8f3d8
Update rules/windows/driver_load/driver_load_win_vuln_drivers_names.yml
nasbench Dec 19, 2023
c64c87b
Update rules/windows/network_connection/net_connection_win_susp_malwa…
nasbench Dec 19, 2023
d1ec23e
Update rules/windows/process_creation/proc_creation_win_rundll32_unco…
nasbench Dec 19, 2023
50344e3
Update net_connection_win_susp_malware_callback_ports_uncommon.yml
nasbench Dec 19, 2023
e7f6842
Update win_security_susp_lsass_dump_generic.yml
nasbench Dec 19, 2023
cfe1435
Update proc_creation_win_whoami_priv_discovery.yml
nasbench Dec 19, 2023
62e089c
Update rules/windows/process_creation/proc_creation_win_susp_elevated…
nasbench Dec 19, 2023
9760c73
fix: update description
nasbench Dec 19, 2023
3727eef
chore: rollback change
nasbench Dec 19, 2023
074e384
chore: move to TH
nasbench Dec 19, 2023
9f77c2e
Update rules/windows/process_creation/proc_creation_win_regasm_regsvc…
nasbench Dec 21, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,13 @@ id: df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2
related:
- id: 4976aa50-8f41-45c6-8b15-ab3fc10e79ed
type: derived
status: test
status: deprecated
description: Detects well-known credential dumping tools execution via service execution events
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Florian Roth (Nextron Systems), Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community
date: 2017/03/05
modified: 2022/12/25
modified: 2023/12/11
tags:
- attack.credential_access
- attack.execution
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,13 @@ id: 46deb5e1-28c9-4905-b2df-51cdcc9e6073
related:
- id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
type: derived
status: test
status: deprecated
description: Detects powershell script installed as a Service
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
author: oscd.community, Natalia Shornikova
date: 2020/10/06
modified: 2022/10/09
modified: 2023/12/11
tags:
- attack.execution
- attack.t1569.002
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
title: Powershell File and Directory Discovery
id: d23f2ba5-9da0-4463-8908-8ee47f614bb9
status: test
status: deprecated
description: |
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors,
Expand All @@ -9,7 +9,7 @@ references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1083/T1083.md
author: frack113
date: 2021/12/15
modified: 2022/12/25
modified: 2023/12/11
tags:
- attack.discovery
- attack.t1083
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
title: Suspicious Get-WmiObject
id: 0332a266-b584-47b4-933d-a00b103e1b37
status: test
status: deprecated
description: The infrastructure for management data and operations that enables local and remote management of Windows personal computers and servers
references:
- https://attack.mitre.org/datasources/DS0005/
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7
author: frack113
date: 2022/01/12
modified: 2022/11/02
modified: 2023/12/11
tags:
- attack.persistence
- attack.t1546
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
title: Windows Defender Threat Detection Disabled
id: fe34868f-6e0e-4882-81f6-c43aa8f15b62
status: stable
status: deprecated
description: Detects disabling Windows Defender threat protection
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
author: Ján Trenčanský, frack113
date: 2020/07/28
modified: 2022/12/06
modified: 2023/11/22
tags:
- attack.defense_evasion
- attack.t1562.001
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
title: Security Event Log Cleared
id: a122ac13-daf8-4175-83a2-72c387be339d
status: test
status: deprecated
description: Checks for event id 1102 which indicates the security event log was cleared.
references:
- https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/SecurityEventLogCleared.yaml
author: Saw Winn Naung
date: 2021/08/15
modified: 2022/12/25
modified: 2023/12/06
tags:
- attack.t1070.001
logsource:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,12 @@
title: New Service Uses Double Ampersand in Path
id: ca83e9f3-657a-45d0-88d6-c1ac280caf53
status: test
status: deprecated
description: Detects a service installation that uses a suspicious double ampersand used in the image path value
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2022/07/05
modified: 2023/11/15
tags:
- attack.defense_evasion
- attack.t1027
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ references:
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4964
author: frack113
date: 2022/10/14
modified: 2022/10/22
modified: 2023/12/14
tags:
- attack.defense_evasion
- attack.lateral_movement
Expand All @@ -24,12 +24,11 @@ detection:
EventID:
- 4672
- 4964
filter:
SubjectUserSid: S-1-5-18
# Level can be upgrade to medium with a filter
# filter_valid_account:
# SubjectUserName: set valid internal naming pattern or a list a valid account
condition: selection and not filter
filter_main_local_system:
SubjectUserSid: 'S-1-5-18'
filter_main_valid_account:
SubjectUserName|expand: '%Admins_Workstations%' # Set valid internal naming pattern or a list a valid account
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: low
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ author: Nasreddine Bencherchali (Nextron Systems)
date: 2023/09/07
tags:
- attack.defense_evasion
- detection.threat_hunting
logsource:
category: file_event
product: windows
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,41 +8,42 @@ references:
- https://github.com/surya-dev-singh/AmsiBypass-OpenSession
author: frack113
date: 2023/03/12
modified: 2023/06/01
modified: 2023/12/18
tags:
- attack.defense_evasion
- attack.impact
- attack.t1490
- detection.threat_hunting
logsource:
category: image_load
product: windows
detection:
selection:
ImageLoaded|endswith: '\amsi.dll'
filter_main_exact:
Image:
- 'C:\Windows\explorer.exe'
- 'C:\Windows\Sysmon64.exe'
Image|endswith:
- ':\Windows\explorer.exe'
- ':\Windows\Sysmon64.exe'
filter_main_generic:
Image|startswith:
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
- 'C:\Windows\System32\'
- 'C:\Windows\SysWOW64\'
- 'C:\Windows\WinSxS\'
Image|contains:
- ':\Program Files (x86)\'
- ':\Program Files\'
- ':\Windows\System32\'
- ':\Windows\SysWOW64\'
- ':\Windows\WinSxS\'
filter_optional_defender:
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
Image|contains: ':\ProgramData\Microsoft\Windows Defender\Platform\'
Image|endswith: '\MsMpEng.exe'
filter_main_dotnet:
Image|startswith:
- 'C:\Windows\Microsoft.NET\Framework\'
- 'C:\Windows\Microsoft.NET\Framework64\'
Image|contains:
- ':\Windows\Microsoft.NET\Framework\'
- ':\Windows\Microsoft.NET\Framework64\'
Image|endswith: '\ngentask.exe'
filter_main_null:
Image: null
filter_main_empty:
Image: ''
condition: selection and not 1 of filter_*
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
- Legitimate third party apps installed in "ProgramData" and "AppData" might generate some false positives. Apply additional filters accordingly
level: low
Original file line number Diff line number Diff line change
@@ -1,15 +1,16 @@
title: WMI Module Loaded By Non Uncommon Process
title: WMI Module Loaded By Uncommon Process
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
status: test
description: Detects a WMI modules being loaded by an uncommon process
description: Detects WMI modules being loaded by an uncommon process
references:
- https://threathunterplaybook.com/hunts/windows/190811-WMIModuleLoad/notebook.html
author: Roberto Rodriguez @Cyb3rWard0g
date: 2019/08/10
modified: 2023/11/27
modified: 2023/12/11
tags:
- attack.execution
- attack.t1047
- detection.threat_hunting
logsource:
category: image_load
product: windows
Expand All @@ -27,13 +28,13 @@ detection:
- '\wmiutils.dll'
filter_main_generic:
Image|contains:
- ':\Program Files (x86)\'
- ':\Program Files\'
- ':\Windows\explorer.exe'
- ':\Windows\Sysmon.exe'
- ':\Windows\Sysmon64.exe'
- ':\Windows\Microsoft.NET\Framework\'
- ':\Windows\Microsoft.NET\Framework64\'
- ':\Windows\System32\'
- ':\Windows\SysWOW64\'
- '\Microsoft\Teams\current\Teams.exe'
- '\Microsoft\Teams\Update.exe'
filter_optional_other:
Image|endswith:
- '\WindowsAzureGuestAgent.exe'
Expand All @@ -44,15 +45,14 @@ detection:
- '\thor64.exe'
filter_optional_defender:
Image|endswith: '\MsMpEng.exe'
filter_optional_dotnet:
Image|contains:
- ':\Windows\Microsoft.NET\Framework\'
- ':\Windows\Microsoft.NET\Framework64\'
Image|endswith: '\ngentask.exe'
filter_optional_programfiles:
filter_optional_teams:
Image|contains:
- ':\Program Files\'
- ':\Program Files (x86)\'
- '\Microsoft\Teams\current\Teams.exe'
- '\Microsoft\Teams\Update.exe'
filter_optional_sysmon:
Image|endswith:
- ':\Windows\Sysmon.exe'
- ':\Windows\Sysmon64.exe'
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,11 @@ references:
- https://threathunterplaybook.com/hunts/windows/190815-RemoteServiceInstallation/notebook.html
author: Roberto Rodriguez @Cyb3rWard0g
date: 2019/08/11
modified: 2023/11/03
modified: 2023/12/11
tags:
- attack.execution
- attack.t1059.001
- detection.threat_hunting
logsource:
product: windows
category: ps_classic_start
Expand All @@ -22,12 +23,13 @@ detection:
# Note: Powershell Logging Data is localized. Meaning that "HostApplication" field will be translated to a different field on a non english layout. This rule doesn't take this into account due to the sheer ammount of possibilities. It's up to the user to add these cases.
filter_main_ps:
Data|contains:
- 'HostApplication=?:/Windows/System32/WindowsPowerShell/v1.0/powershell' # In some cases powershell was invoked with inverted slashes
- 'HostApplication=?:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell' # In some cases powershell was invoked with inverted slashes
- 'HostApplication=?:\Windows\System32\sdiagnhost.exe'
- 'HostApplication=?:\Windows\System32\WindowsPowerShell\v1.0\powershell'
- 'HostApplication=?:\Windows\SysWOW64\sdiagnhost.exe'
- 'HostApplication=?:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell'
- 'HostApplication=powershell'
- 'HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell'
- 'HostApplication=C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell'
# In some cases powershell was invoked with inverted slashes
- 'HostApplication=C:/Windows/System32/WindowsPowerShell/v1.0/powershell'
- 'HostApplication=C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell'
filter_optional_citrix:
Data|contains: 'Citrix\ConfigSync\ConfigSync.ps1'
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
title: Use Remove-Item to Delete File
title: Use Of Remove-Item to Delete File - ScriptBlock
id: b8af5f36-1361-4ebe-9e76-e36128d947bf
status: test
description: Powershell Remove-Item with -Path to delete a file or a folder with "-Recurse"
description: PowerShell Remove-Item with -Path to delete a file or a folder with "-Recurse"
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.004/T1070.004.md
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Remove-Item?view=powershell-5.1&viewFallbackFrom=powershell-7
Expand All @@ -11,20 +11,22 @@ modified: 2022/03/17
tags:
- attack.defense_evasion
- attack.t1070.004
- detection.threat_hunting
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains|all:
- Remove-Item
- '-Path '
filter_reg:
ScriptBlockText|contains:
- 'HKCU:\'
- 'HKLM:\'
condition: selection and not filter_reg
- 'Remove-Item -Path '
- 'del -Path '
- 'erase -Path '
- 'rd -Path '
- 'ri -Path '
- 'rm -Path '
- 'rmdir -Path '
condition: selection
falsepositives:
- Legitimate PowerShell scripts
level: low
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ tags:
- attack.credential_access
- attack.t1003.001
- attack.s0002
- detection.threat_hunting
logsource:
category: process_access
product: windows
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,25 +9,26 @@ references:
- https://github.com/med0x2e/vba2clr
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/10/13
modified: 2023/02/04
modified: 2023/12/19
tags:
- attack.execution
- attack.defense_evasion
- detection.threat_hunting
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage|endswith: '\svchost.exe'
Image|endswith:
- '\winword.exe'
- '\eqnedt32.exe'
- '\excel.exe'
- '\powerpnt.exe'
- '\msaccess.exe'
- '\mspub.exe'
- '\eqnedt32.exe'
- '\powerpnt.exe'
- '\visio.exe'
condition: all of selection*
- '\winword.exe'
condition: selection
falsepositives:
- Legitimate usage of office automation via scripting
level: medium
Loading