diff --git a/rules/windows/file_event/win_fe_csharp_compile_artefact.yml b/rules/windows/file_event/win_fe_csharp_compile_artefact.yml new file mode 100644 index 000000000..1123d72d7 --- /dev/null +++ b/rules/windows/file_event/win_fe_csharp_compile_artefact.yml @@ -0,0 +1,24 @@ +title: Dynamic C Sharp Compile Artefact +id: e4a74e34-ecde-4aab-b2fb-9112dd01aed0 +status: experimental +description: | + When C# is compiled dynamically, a .cmdline file will be created as a part of the process. + Certain processes are not typically observed compiling C# code, but can do so without touching disk. + This can be used to unpack a payload for execution +author: frack113 +references: + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1027.004/T1027.004.md#atomic-test-2---dynamic-c-compile +date: 2022/01/09 +logsource: + product: windows + category: file_event +detection: + selection: + TargetFilename|endswith: '.cmdline' + condition: selection +falsepositives: + - Unknown +level: medium +tags: + - attack.defense_evasion + - attack.t1027.004 diff --git a/rules/windows/powershell/powershell_script/posh_ps_suspicious_iofilestream.yml b/rules/windows/powershell/powershell_script/posh_ps_suspicious_iofilestream.yml new file mode 100644 index 000000000..bbe35a286 --- /dev/null +++ b/rules/windows/powershell/powershell_script/posh_ps_suspicious_iofilestream.yml @@ -0,0 +1,25 @@ +title: Suspicious IO.FileStream +id: 70ad982f-67c8-40e0-a955-b920c2fa05cb +status: experimental +description: open a handle on the drive volume via the \\.\ DOS device path specifier and perform direct access read of the first few bytes of the volume. +date: 2022/01/09 +author: frack113 +references: + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1006/T1006.md +logsource: + product: windows + category: ps_script + definition: Script block logging must be enabled +detection: + selection: + ScriptBlockText|contains|all: + - New-Object + - IO.FileStream + - '"\\.\' + condition: selection +falsepositives: + - Legitimate PowerShell scripts +level: medium +tags: + - attack.defense_evasion + - attack.t1070.003 \ No newline at end of file diff --git a/rules/windows/process_creation/win_pc_iis_http_logging.yml b/rules/windows/process_creation/win_pc_iis_http_logging.yml new file mode 100644 index 000000000..e02dc92da --- /dev/null +++ b/rules/windows/process_creation/win_pc_iis_http_logging.yml @@ -0,0 +1,26 @@ +title: Disable Windows IIS HTTP Logging +id: e4ed6030-ffe5-4e6a-8a8a-ab3c1ab9d94e +status: experimental +description: Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union) +author: frack113 +references: + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md#atomic-test-1---disable-windows-iis-http-logging +date: 2022/01/09 +logsource: + category: process_creation + product: windows +detection: + selection: + Image|endswith: \appcmd.exe + CommandLine|contains|all: + - set + - config + - '/section:httplogging' + - '/dontLog:true' + condition: selection +falsepositives: + - Unknown +level: medium +tags: + - attack.defense_evasion + - attack.t1562.002