Merge pull request #1266 from omkar72/ryuk

modifying couple of rules
This commit is contained in:
Florian Roth
2020-12-13 19:05:54 +01:00
committed by GitHub
4 changed files with 66 additions and 5 deletions
@@ -0,0 +1,26 @@
title: Psexec Accepteula Condition
id: 730fc21b-eaff-474b-ad23-90fd265d4988
description: Detect ed user accept agreement execution in psexec commandline
status: experimental
author: omkar72
- https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
date: 2020/10/30
tags:
- attack.execution
- attack.t1569
- attack.t1021
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\psexec.exe'
CommandLine|contains: 'accepteula'
condition: selection
fields:
- ComputerName
- User
- CommandLine
falsepositives:
- Administrative scripts.
level: medium
@@ -2,9 +2,12 @@ title: Suspicious Reconnaissance Activity
id: d95de845-b83c-4a9a-8a6a-4fc802ebf6c0
status: experimental
description: Detects suspicious command line activity on Windows systems
author: Florian Roth
author: Florian Roth, omkar72
date: 2019/01/16
modified: 2020/08/28
modified: 2020/10/30
references:
- https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/
- https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
tags:
- attack.discovery
- attack.t1087.001
@@ -18,6 +21,7 @@ detection:
CommandLine:
- net group "domain admins" /domain
- net localgroup administrators
- net group "enterprise admins" /domain
condition: selection
fields:
- CommandLine
@@ -2,12 +2,14 @@ title: Domain Trust Discovery
id: 3bad990e-4848-4a78-9530-b427d854aac0
description: Identifies execution of nltest.exe and dsquery.exe for domain trust discovery. This technique is used by attackers to enumerate Active Directory trusts.
status: experimental
author: E.M. Anhaus (orignally from Atomic Blue Detections, Tony Lambert), oscd.community
author: E.M. Anhaus (orignally from Atomic Blue Detections, Tony Lambert), oscd.community, omkar72
date: 2019/10/24
modified: 2019/11/11
modified: 2020/10/30
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1482/T1482.md
- https://eqllib.readthedocs.io/en/latest/analytics/03e231a6-74bc-467a-acb1-e5676b0fb55e.html
- https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
- https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/
tags:
- attack.discovery
- attack.t1482
@@ -17,7 +19,10 @@ logsource:
detection:
selection:
- Image|endswith: '\nltest.exe'
CommandLine|contains: 'domain_trusts'
CommandLine|contains:
- 'domain_trusts'
- 'all_trusts'
- '/dclist'
- Image|endswith: '\dsquery.exe'
CommandLine|contains: 'trustedDomain'
condition: selection
@@ -0,0 +1,26 @@
title: WINEKEY Registry Modification
id: b98968aa-dbc0-4a9c-ac35-108363cbf8d5
description: Detects potential malicious modification of run keys by winekey or team9 backdoor
date: 2020/10/30
author: omkar72
references:
- https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
tags:
- attack.persistence
- attack.t1547
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|endswith:
- 'Software\Microsoft\Windows\CurrentVersion\Run\Backup Mgr'
condition: selection
fields:
- ComputerName
- Image
- EventType
- TargetObject
falsepositives:
- Unknown
level: high