Merge pull request #1418 from SigmaHQ/rule-devel

Fixing false positives with newest OSCD rules
This commit is contained in:
Florian Roth
2021-04-09 17:26:02 +02:00
committed by GitHub
7 changed files with 11 additions and 11 deletions
+3 -2
View File
@@ -4,9 +4,10 @@ status: experimental
description: Detects suspicious DNS queries known from Cobalt Strike beacons
author: Florian Roth
date: 2018/05/10
modified: 2020/08/27
modified: 2021/03/24
references:
- https://www.icebrg.io/blog/footprints-of-fin7-tracking-actor-patterns
- https://www.sekoia.io/en/hunting-and-detecting-cobalt-strike/
logsource:
category: dns
detection:
@@ -17,7 +18,7 @@ detection:
condition: selection
falsepositives:
- Unknown
level: high
level: critical
tags:
- attack.command_and_control
- attack.t1071 # an old one
@@ -17,7 +17,7 @@ falsepositives:
level: high
detection:
selection_1:
- ImagePath|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c|\/r'
- ImagePath|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection and selection_1
---
logsource:
@@ -26,7 +26,7 @@ detection:
CommandLine|re: '.*{.*{.*{.*{.*{.*'
selection4:
Image|endswith: '\powershell.exe'
CommandLine|re: '.*^.*^.*^.*^.*^.*'
CommandLine|re: '.*\^.*\^.*\^.*\^.*\^.*'
selection5:
Image|endswith: '\powershell.exe'
CommandLine|re: '.*`.*`.*`.*`.*`.*'
@@ -17,10 +17,10 @@ logsource:
detection:
selection_1:
EventID: 4104
ScriptBlockText|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c|\/r'
ScriptBlockText|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c/c' # FPs with |\/r
selection_2:
EventID: 4103
Payload|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c|\/r'
Payload|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection_1 or selection_2
falsepositives:
- Unknown
@@ -33,5 +33,5 @@ fields:
- Image
falsepositives:
- System administrator Usage
- Penetration test
level: high
- Penetration test
level: medium
@@ -16,7 +16,7 @@ logsource:
product: windows
detection:
selection:
CommandLine|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c|\/r'
CommandLine|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection
falsepositives:
- Unknown
@@ -11,8 +11,7 @@ tags:
- attack.collection
- attack.t1560.001
- attack.exfiltration # an old one
- attack.t1002 # an old one
- attack.t1002 # an old one
logsource:
category: process_creation
product: windows