feat: more rules updates

This commit is contained in:
Nasreddine Bencherchali
2023-02-14 19:15:35 +01:00
parent 4f59a13d46
commit 2ef681291a
20 changed files with 48 additions and 13 deletions
@@ -1,12 +1,16 @@
title: SCM DLL Sideload
id: bc3cc333-48b9-467a-9d1f-d44ee594ef48
status: experimental
related:
- id: 602a1f13-c640-4d73-b053-be9a2fa58b77
type: similar
status: deprecated
description: Detects DLL sideloading of DLLs that are loaded by the SCM for some services (IKE, IKEEXT, SessionEnv) which do not exists on a typical modern system
references:
- https://decoded.avast.io/martinchlumecky/png-steganography/
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/12/01
modified: 2023/02/14
tags:
- attack.defense_evasion
- attack.persistence
@@ -1,7 +1,7 @@
title: Creation Of Non-Existent DLLs In System Folders
id: df6ecb8b-7822-4f4b-b412-08f524b4576c
related:
- id: 6b98b92b-4f00-4f62-b4fe-4d1920215771
- id: 6b98b92b-4f00-4f62-b4fe-4d1920215771 # ImageLoad rule
type: similar
status: experimental
description: Detects the creation of system dlls that are not present on the system. Usually to achieve dll hijacking
@@ -30,6 +30,8 @@ detection:
- 'C:\Windows\System32\TSMSISrv.dll'
- 'C:\Windows\System32\TSVIPSrv.dll'
- 'C:\Windows\System32\wow64log.dll'
- 'C:\Windows\System32\WptsExtensions.dll'
- 'C:\Windows\System32\wbem\wbemcomn.dll'
filter:
Image|startswith: 'C:\Windows\System32\'
condition: selection and not filter
@@ -1,7 +1,7 @@
title: Potential DLL Sideloading Of Non-Existent DLLs From System Folders
id: 6b98b92b-4f00-4f62-b4fe-4d1920215771
related:
- id: df6ecb8b-7822-4f4b-b412-08f524b4576c
- id: df6ecb8b-7822-4f4b-b412-08f524b4576c # FileEvent rule
type: similar
status: experimental
description: Detects DLL sideloading of system dlls that are not present on the system by default. Usually to achieve techniques such as UAC bypass and privilege escalation
@@ -2,9 +2,11 @@ title: Svchost DLL Search Order Hijack
id: 602a1f13-c640-4d73-b053-be9a2fa58b77
status: test
description: |
IKEEXT and SessionEnv service, as they call LoadLibrary on files that do not exist within C:\Windows\System32\ by default.
An attacker can place their malicious logic within the PROCESS_ATTACH block of their library and restart the aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote machine.
Detects DLL sideloading of DLLs that are loaded by the SCM for some services (IKE, IKEEXT, SessionEnv) which do not exists on a typical modern system
IKEEXT and SessionEnv service, as they call LoadLibrary on files that do not exist within C:\Windows\System32\ by default.
An attacker can place their malicious logic within the PROCESS_ATTACH block of their library and restart the aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote machine.
references:
- https://decoded.avast.io/martinchlumecky/png-steganography/
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
author: SBousseaden
date: 2019/10/28
@@ -1,4 +1,4 @@
title: SharpEvtMute EvtMuteHook Load
title: HackTool - SharpEvtMute Execution
id: bedfc8ad-d1c7-4e37-a20e-e2b0dbee759c
status: experimental
description: Detects the use of SharpEvtHook, a tool to tamper with Windows event logs
@@ -6,6 +6,7 @@ references:
- https://github.com/bats3c/EvtMute
author: Florian Roth (Nextron Systems)
date: 2022/09/07
modified: 2023/02/14
tags:
- attack.defense_evasion
- attack.t1562.002
@@ -1,7 +1,7 @@
title: Arbitrary Command Execution Using WSL
id: dec44ca7-61ad-493c-bfd7-8819c5faa09b
related:
- id: 2267fe65-0681-42ad-9a6d-46553d3f3480
- id: 2267fe65-0681-42ad-9a6d-46553d3f3480 # Generic susp child processes rules
type: similar
status: test
description: Detects Possible usage of Windows Subsystem for Linux (WSL) binary as a LOLBIN to execute arbitrary linux and windows commands
@@ -1,11 +1,12 @@
title: Launch WebBrowserPassView Executable
title: PUA - WebBrowserPassView Execution
id: d0dae994-26c6-4d2d-83b5-b3c8b79ae513
status: experimental
description: Detect use of WebBrowserPassView.exe
description: Detect execution of WebBrowserPassView.exe. A password recovery tool that reveals the passwords stored by the following Web browsers, Internet Explorer (Version 4.0 - 11.0), Mozilla Firefox (All Versions), Google Chrome, Safari, and Opera
references:
- https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1555.003/T1555.003.md
author: frack113
date: 2022/08/20
modified: 2023/02/14
tags:
- attack.credential_access
- attack.t1555.003
@@ -8,7 +8,7 @@ related:
- id: cd5c8085-4070-4e22-908d-a5b3342deb74
type: obsoletes
status: test
description: Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) viq CommandLine
description: Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via CommandLine
references:
- https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/
- https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell
@@ -7,7 +7,7 @@ references:
- https://twitter.com/nas_bench/status/1550836225652686848
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/07/25
modified: 2023/01/22
modified: 2023/02/14
tags:
- attack.execution
- attack.persistence
@@ -16,7 +16,9 @@ logsource:
product: windows
detection:
selection_parent:
ParentImage|endswith: '\WindowsTerminal.exe'
ParentImage|endswith:
- '\WindowsTerminal.exe'
- '\wt.exe'
selection_susp:
- Image|endswith:
# Add more LOLBINS
@@ -1,7 +1,7 @@
title: WSL Child Process Anomaly
id: 2267fe65-0681-42ad-9a6d-46553d3f3480
related:
- id: dec44ca7-61ad-493c-bfd7-8819c5faa09b
- id: dec44ca7-61ad-493c-bfd7-8819c5faa09b # LOLBIN Rule
type: derived
status: experimental
description: Detects uncommon or suspicious child processes spawning from a WSL process. This could indicate an attempt to evade parent/child relationship detections or persistence attempts via cron using WSL
@@ -0,0 +1,23 @@
title: Windows Binary Executed From WSL
id: ed825c86-c009-4014-b413-b76003e33d35
status: experimental
description: Detects execution of windows binaries from wihthin a WSL instance. This could be used to avoid parent/child relationship detections or similar
references:
- Internal Research
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023/02/14
tags:
- attack.execution
- attack.defense_evasion
- attack.t1202
logsource:
category: process_creation
product: windows
detection:
selection:
Image|re: '[a-zA-Z]:\\'
CurrentDirectory|contains: '\\\\wsl.localhost' # Note: programs not supporting UNC paths (example: cmd.exe). Will default to another location
condition: selection
falsepositives:
- Unknown
level: medium