Merge pull request #3020 from nasbench/master

Rule Update (Batch 2)
This commit is contained in:
Florian Roth
2022-05-18 07:05:34 +02:00
committed by GitHub
15 changed files with 141 additions and 49 deletions
@@ -5,8 +5,10 @@ description: Detects the creation of known powershell scripts for exploitation
author: Markus Neis
references:
- https://raw.githubusercontent.com/Neo23x0/sigma/f35c50049fa896dff91ff545cb199319172701e8/rules/windows/powershell/powershell_malicious_commandlets.yml
- https://github.com/PowerShellMafia/PowerSploit
- https://github.com/NetSPI/PowerUpSQL
date: 2018/04/07
modified: 2021/11/27
modified: 2022/05/13
logsource:
category: file_event
product: windows
@@ -108,6 +110,11 @@ detection:
- '\Invoke-ReverseDNSLookup.ps1'
- '\Invoke-SMBScanner.ps1'
- '\Invoke-Mimikittenz.ps1'
- '\PowerUpSQL.ps1'
- '\Get-ComputerDetail.ps1'
- '\Find-AVSignature.ps1'
- '\Get-GPPAutologon.ps1'
- '\Get-MicrophoneAudio.ps1'
condition: selection
falsepositives:
- Unknown
@@ -0,0 +1,24 @@
title: Suspicious File Download via CertOC.exe
id: 70ad0861-d1fe-491c-a45f-fa48148a300d
description: Detects when a user downloads file by using CertOC.exe
status: experimental
author: Nasreddine Bencherchali
date: 2022/05/16
references:
- https://lolbas-project.github.io/lolbas/Binaries/Certoc/
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\certoc.exe'
- OriginalFileName: 'CertOC.exe'
selection_cli:
CommandLine|contains: '-GetCACAPS'
condition: all of selection*
falsepositives:
- Unknown
level: high
tags:
- attack.command_and_control
- attack.t1105
@@ -4,25 +4,27 @@ description: Detects when a user installs certificates by using CertOC.exe to lo
status: experimental
author: Austin Songer @austinsonger
date: 2021/10/23
modified: 2022/05/16
references:
- https://twitter.com/sblmsrsn/status/1445758411803480072?s=20
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\certoc.exe'
selection_img:
- Image|endswith: '\certoc.exe'
- OriginalFileName: 'CertOC.exe'
selection_cli:
CommandLine|contains|all:
- '-LoadDLL'
- '.dll'
condition: selection
condition: all of selection*
fields:
- CommandLine
- ParentCommandLine
tags:
- attack.defense_evasion
- attack.t1218
level: medium
falsepositives:
- Unknown
- Unknown
level: medium
@@ -7,7 +7,7 @@ references:
- https://technet.microsoft.com/en-us/library/cc754243(v=ws.11).aspx
author: jmallette, Florian Roth
date: 2019/01/16
modified: 2022/04/21
modified: 2022/05/16
tags:
- attack.credential_access
- attack.t1003.005
@@ -15,12 +15,14 @@ logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\cmdkey.exe'
selection_img:
- Image|endswith: '\cmdkey.exe'
- OriginalFileName: 'cmdkey.exe'
selection_cli:
CommandLine|contains:
- ' /list'
- ' -list'
condition: selection
condition: all of selection*
fields:
- CommandLine
- ParentCommandLine
@@ -9,12 +9,15 @@ tags:
- attack.t1567
author: frack113
date: 2021/11/26
modified: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
lolbas:
CommandLine|contains: ConfigSecurityPolicy.exe
- CommandLine|contains: ConfigSecurityPolicy.exe
- Image|endswith: '\ConfigSecurityPolicy.exe'
- OriginalFileName: 'ConfigSecurityPolicy.exe'
remote:
CommandLine|contains:
- 'https://'
@@ -2,13 +2,15 @@ title: LOLBAS Data Exfiltration by DataSvcUtil.exe
id: e290b10b-1023-4452-a4a9-eb31a9013b3a
status: experimental
author: Ialle Teixeira @teixeira0xfffff, Austin Songer @austinsonger
date: 2021/09/30
description: Detects when a user performs data exfiltration by using DataSvcUtil.exe
date: 2021/09/30
modified: 2022/05/16
references:
- https://gist.github.com/teixeira0xfffff/837e5bfed0d1b0a29a7cb1e5dbdd9ca6
- https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe
- https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/generating-the-data-service-client-library-wcf-data-services
- https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/how-to-add-a-data-service-reference-wcf-data-services
- https://lolbas-project.github.io/lolbas/Binaries/DataSvcUtil/
tags:
- attack.exfiltration
- attack.t1567
@@ -16,12 +18,15 @@ logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
selection_cli:
CommandLine|contains:
- '/in:'
- '/out:'
Image|endswith: '\DataSvcUtil.exe'
condition: selection
- '/uri:'
selection_img:
- Image|endswith: '\DataSvcUtil.exe'
- OriginalFileName: 'DataSvcUtil.exe'
condition: all of selection*
fields:
- ComputerName
- User
@@ -4,18 +4,21 @@ status: experimental
description: Extexport.exe loads dll and is execute from other folder the original path
references:
- https://lolbas-project.github.io/lolbas/Binaries/Extexport/
tags:
- attack.defense_evasion
- attack.t1218
author: frack113
date: 2021/11/26
modified: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
lolbas:
CommandLine|contains: Extexport.exe
condition: lolbas
- CommandLine|contains: Extexport.exe
- Image|endswith: '\Extexport.exe'
- OriginalFileName: 'extexport.exe'
condition: lolbas
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1218
@@ -9,20 +9,23 @@ tags:
- attack.t1105
author: frack113
date: 2021/11/26
modified: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
lolbas:
CommandLine|contains|all:
- extrac32.exe
- .cab
options:
CommandLine|contains:
selection_lolbas:
- CommandLine|contains: extrac32.exe
- Image|endswith: '\extrac32.exe'
- OriginalFileName: 'extrac32.exe'
selection_archive:
ommandLine|contains: '.cab'
selection_options:
CommandLine|contains:
- /C
- /Y
- ' \\'
condition: lolbas and options
condition: all of selection_*
falsepositives:
- Unknown
level: medium
@@ -0,0 +1,23 @@
title: Abusing IEExec To Download Payloads
id: 9801abb8-e297-4dbf-9fbd-57dde0e830ad
status: experimental
description: Detects execution of the IEExec utility to download payloads
references:
- https://lolbas-project.github.io/lolbas/Binaries/Ieexec/
author: Nasreddine Bencherchali
date: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
lolbas:
- Image|endswith: '\IEExec.exe'
- OriginalFileName: 'IEExec.exe'
remote:
CommandLine|contains:
- 'https://'
- 'http://'
condition: lolbas and remote
falsepositives:
- Unknown
level: high
@@ -6,17 +6,19 @@ references:
- https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/
- https://lolbas-project.github.io/lolbas/Binaries/Gpscript/
author: frack113
date: 2022/05/02
date: 2022/05/16
logsource:
product: windows
category: process_creation
detection:
selection:
Image|endswith: '\gpscript.exe'
CommandLine|contains:
selection_img:
- Image|endswith: '\gpscript.exe'
- OriginalFileName: 'GPSCRIPT.EXE'
selection_cli:
CommandLine|contains:
- ' /logon'
- ' /startup'
condition: selection
condition: all of selection*
falsepositives:
- Legitimate uses of logon scripts distributed via group policy
level: medium
@@ -7,12 +7,14 @@ references:
- https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
author: frack113
date: 2022/05/07
modified: 2022/05/16
logsource:
product: windows
category: process_creation
detection:
lolbin:
Image|endswith: '\ie4uinit.exe'
- Image|endswith: '\ie4uinit.exe'
- OriginalFileName: 'IE4UINIT.EXE'
filter_correct:
CurrentDirectory:
- 'c:\windows\system32\'
@@ -7,13 +7,15 @@ references:
- https://www.echotrail.io/insights/search/ilasm.exe
author: frack113
date: 2022/05/07
modified: 2022/05/16
logsource:
product: windows
category: process_creation
detection:
selection:
Image|endswith: '\Ilasm.exe'
condition: selection
- Image|endswith: '\ilasm.exe'
- OriginalFileName: 'ilasm.exe'
condition: selection
falsepositives:
- Unknown
level: medium
@@ -4,7 +4,7 @@ status: stable
description: Shadow Copies deletion using operating systems utilities
author: Florian Roth, Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades)
date: 2019/10/22
modified: 2021/10/24
modified: 2022/05/16
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- https://blog.talosintelligence.com/2017/05/wannacry.html
@@ -23,28 +23,38 @@ logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith:
selection1_img:
- Image|endswith:
- '\powershell.exe'
- '\wmic.exe'
- '\vssadmin.exe'
- '\diskshadow.exe'
- OriginalFileName:
- 'PowerShell.EXE'
- 'wmic.exe'
- 'VSSADMIN.EXE'
- 'diskshadow.exe'
selection1_cli:
CommandLine|contains|all:
- shadow # will match "delete shadows" and "shadowcopy delete" and "shadowstorage"
- delete
selection2:
Image|endswith: '\wbadmin.exe'
selection2_img:
- Image|endswith: '\wbadmin.exe'
- OriginalFileName: 'WBADMIN.EXE'
selection2_cli:
CommandLine|contains|all:
- delete
- catalog
- quiet # will match -quiet or /quiet
selection3:
Image|endswith: '\vssadmin.exe'
selection3_img:
- Image|endswith: '\vssadmin.exe'
- OriginalFileName: 'VSSADMIN.EXE'
selection3_cli:
CommandLine|contains|all:
- resize
- shadowstorage
- unbounded
condition: 1 of selection*
condition: (all of selection1*) or (all of selection2*) or (all of selection3*)
fields:
- CommandLine
- ParentCommandLine
@@ -8,13 +8,15 @@ references:
- https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
- https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
date: 2020/10/05
modified: 2021/11/27
modified: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
selectionFindstr:
CommandLine|contains: findstr
- CommandLine|contains: findstr
- Image|endswith: 'findstr.exe'
- OriginalFileName: 'FINDSTR.EXE'
selection_V_L:
CommandLine|contains|all:
- /V
@@ -1,13 +1,14 @@
title: Bypass UAC via CMSTP
id: e66779cc-383e-4224-a3a4-267eeb585c40
status: test
description: Detect child processes of automatically elevated instances of Microsoft Connection Manager Profile Installer (cmstp.exe).
description: Detect commandline usage of Microsoft Connection Manager Profile Installer (cmstp.exe) to install specially formatted local .INF files
author: E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
references:
- https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1191/T1191.md
- https://lolbas-project.github.io/lolbas/Binaries/Cmstp/
date: 2019/10/24
modified: 2022/05/13
modified: 2022/05/16
logsource:
category: process_creation
product: windows
@@ -19,6 +20,7 @@ detection:
CommandLine|contains:
- '/s'
- '/au'
- '/ni'
condition: all of selection*
fields:
- ComputerName