Merge branch 'SigmaHQ:master' into master

This commit is contained in:
Nasreddine Bencherchali
2022-07-04 18:47:53 +01:00
committed by GitHub
9 changed files with 172 additions and 19 deletions
@@ -0,0 +1,24 @@
title: Device Registration or Join Without MFA
id: 5afa454e-030c-4ab4-9253-a90aa7fcc581
description: Monitor and alert for device registration or join events where MFA was not performed.
author: Michael Epping, '@mepples21'
date: 2022/06/28
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-devices#device-registrations-and-joins-outside-policy
logsource:
product: azure
service: signinlogs
detection:
selection:
ResourceDisplayName: 'Device Registration Service'
conditionalAccessStatus: 'success'
filter_mfa:
AuthenticationRequirement: 'multiFactorAuthentication'
condition: selection and not filter_mfa
falsepositives:
- Unknown
level: medium
status: experimental
tags:
- attack.valid_accounts
- attack.t1078
@@ -0,0 +1,21 @@
title: Sign-ins from Non-Compliant Devices
id: 4f77e1d7-3982-4ee0-8489-abf2d6b75284
description: Monitor and alert for sign-ins where the device was non-compliant.
author: Michael Epping, '@mepples21'
date: 2022/06/28
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-devices#non-compliant-device-sign-in
logsource:
product: azure
service: signinlogs
detection:
selection:
DeviceDetail.isCompliant: 'false'
condition: selection
falsepositives:
- Unknown
level: high
status: experimental
tags:
- attack.valid_accounts
- attack.t1078
@@ -0,0 +1,27 @@
title: Users Added to Global or Device Admin Roles
id: 11c767ae-500b-423b-bae3-b234450736ed
description: Monitor and alert for users added to device admin roles.
author: Michael Epping, '@mepples21'
date: 2022/06/28
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-devices#device-administrator-roles
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: RoleManagement
OperationName|contains|all:
- 'Add'
- 'member to role'
TargetResources|contains:
- '7698a772-787b-4ac8-901f-60d6b08affd2'
- '62e90394-69f5-4237-9190-012177145e10'
condition: selection
falsepositives:
- Unknown
level: high
status: experimental
tags:
- attack.valid_accounts
- attack.t1078
@@ -0,0 +1,26 @@
title: Curl Usage on Windows
id: bbeaed61-1990-4773-bf57-b81dbad7db2d
status: test
description: Detects a curl process start on Windows, which indicates a file download from a remote location or a simple web request to a remote server
author: Florian Roth
references:
- https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464
date: 2022/07/05
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|endswith: '\curl.exe'
- Product: 'The curl executable'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Scripts created by developers and admins
- Administrative activity
level: low
tags:
- attack.command_and_control
- attack.t1105
@@ -1,33 +1,50 @@
title: Suspicious Curl Usage on Windows
id: e218595b-bbe7-4ee5-8a96-f32a24ad3468
status: test
status: experimental
description: Detects a suspicious curl process start on Windows and outputs the requested document to a local file
author: Florian Roth, Nasreddine Bencherchali (updated)
references:
- https://twitter.com/max_mal_/status/1542461200797163522
- https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464
- https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_AA_23.06.2022.txt
date: 2020/07/03
modified: 2022/06/23
modified: 2022/07/05
logsource:
category: process_creation
product: windows
detection:
selection_img:
selection_curl:
- Image|endswith: '\curl.exe'
- Product: 'The curl executable'
selection_cli:
selection_susp_locations:
CommandLine|contains:
- ' -O'
- '\AppData\'
- '\Users\Public\'
- '\Temp'
- '%AppData%'
- '%Temp%'
- '%Public%'
- '\Desktop'
selection_susp_extensions:
CommandLine|endswith:
- '.jpg'
- '.jpeg'
- '.png'
- '.gif'
- '.tmp'
- '.temp'
- '.txt'
selection_susp_remote_name:
CommandLine|contains:
- ' -O' # alias for --remote-name
- '--remote-name'
- '--output'
condition: all of selection*
condition: selection_curl and 1 of selection_susp*
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Scripts created by developers and admins
- Administrative activity
level: medium
- Unknown
level: high
tags:
- attack.command_and_control
- attack.t1105
@@ -6,22 +6,26 @@ author: Sreeman
references:
- https://medium.com/@reegun/curl-exe-is-the-new-rundll32-exe-lolbin-3f79c5f35983
date: 2020/01/13
modified: 2021/11/27
modified: 2022/07/05
logsource:
category: process_creation
product: windows
detection:
condition: selection
selection:
CommandLine|contains|all:
- 'curl'
selection_curl:
- Image|endswith: '\curl.exe'
- Product: 'The curl executable'
selection_susp_flags:
CommandLine|contains:
- ' start '
- '&call '
- '& call '
condition: all of selection*
fields:
- ParentImage
- CommandLine
falsepositives:
- Administrative scripts (installers)
level: medium
level: high
tags:
- attack.execution
- attack.t1218
@@ -4,7 +4,7 @@ status: experimental
description: Detects various anomalies in relation to regsvr32.exe
author: Florian Roth, oscd.community
date: 2019/01/16
modified: 2022/06/20
modified: 2022/07/04
references:
- https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
@@ -52,6 +52,17 @@ detection:
CommandLine|contains:
- '\AppData\Local'
- 'C:\Users\Public'
selection9: # suspicious extensions https://twitter.com/Max_Mal_/status/1542461200797163522/photo/3
Image|endswith: '\regsvr32.exe'
CommandLine|endswith:
- '.jpg'
- '.jpeg'
- '.png'
- '.gif'
- '.bin'
- '.tmp'
- '.temp'
- '.txt'
filter:
CommandLine|contains: '\AppData\Local\Microsoft\Teams'
condition: 1 of selection* and not filter
@@ -0,0 +1,23 @@
title: Disabled Windows Defender Eventlog
id: fcddca7c-b9c0-4ddf-98da-e1e2d18b0157
description: Detects the disabling of the Windows Defender eventlog as seen in relation to Lockbit 3.0 infections
status: experimental
date: 2022/07/04
author: Florian Roth
references:
- https://twitter.com/WhichbufferArda/status/1543900539280293889/photo/2
logsource:
category: registry_set
product: windows
detection:
selection:
EventType: SetValue
TargetObject|contains: '\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Windows Defender/Operational\Enabled'
Details: 'DWORD (0x00000000)'
condition: selection
falsepositives:
- Other Antivirus software installations could cause Windows to disable that eventlog (unknown)
level: high
tags:
- attack.defense_evasion
- attack.t1562.001
@@ -3,7 +3,7 @@ id: 8ffc5407-52e3-478f-9596-0a7371eafe13
description: Detects disabling Windows Defender PUA protection
status: experimental
date: 2021/08/04
modified: 2022/03/26
modified: 2022/07/04
author: Austin Songer @austinsonger
references:
- https://www.tenforums.com/tutorials/32236-enable-disable-microsoft-defender-pua-protection-windows-10-a.html
@@ -13,7 +13,7 @@ logsource:
detection:
selection:
EventType: SetValue
TargetObject|contains: 'HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\PUAProtection'
TargetObject|contains: '\Policies\Microsoft\Windows Defender\PUAProtection'
Details: 'DWORD (0x00000000)'
condition: selection
falsepositives: