From 57bfdc7a028eb7b6dd2a762dfd053ebddb31f8bf Mon Sep 17 00:00:00 2001 From: Florian Roth Date: Tue, 7 Sep 2021 09:19:23 +0200 Subject: [PATCH] fix: more upper case chars --- .../win_cl_invocation_lolscript.yml | 26 +++++++++++++++++++ .../win_cl_mutexverifiers_lolscript.yml | 26 +++++++++++++++++++ 2 files changed, 52 insertions(+) create mode 100644 rules/windows/process_creation/win_cl_invocation_lolscript.yml create mode 100644 rules/windows/process_creation/win_cl_mutexverifiers_lolscript.yml diff --git a/rules/windows/process_creation/win_cl_invocation_lolscript.yml b/rules/windows/process_creation/win_cl_invocation_lolscript.yml new file mode 100644 index 000000000..04a8b5dd2 --- /dev/null +++ b/rules/windows/process_creation/win_cl_invocation_lolscript.yml @@ -0,0 +1,26 @@ +title: Execution via CL_Invocation.ps1 +id: a0459f02-ac51-4c09-b511-b8c9203fc429 +description: Detects Execution via SyncInvoke in CL_Invocation.ps1 module +status: experimental +author: oscd.community, Natalia Shornikova +date: 2020/10/14 +modified: 2021/05/21 +references: + - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/Cl_invocation.yml + - https://twitter.com/bohops/status/948061991012327424 +tags: + - attack.defense_evasion + - attack.t1216 +logsource: + category: process_creation + product: windows +detection: + selection: + CommandLine|contains|all: + - 'CL_Invocation.ps1' + - 'SyncInvoke' + # Example Commandline: "powershell Import-Module c:\Windows\diagnostics\system\Audio\CL_Invocation.ps1; SyncInvoke c:\Evil.exe" + condition: selection +falsepositives: + - Unknown +level: high diff --git a/rules/windows/process_creation/win_cl_mutexverifiers_lolscript.yml b/rules/windows/process_creation/win_cl_mutexverifiers_lolscript.yml new file mode 100644 index 000000000..4fd2f44c7 --- /dev/null +++ b/rules/windows/process_creation/win_cl_mutexverifiers_lolscript.yml @@ -0,0 +1,26 @@ +title: Execution via CL_Mutexverifiers.ps1 +id: 99465c8f-f102-4157-b11c-b0cddd53b79a +description: Detects Execution via runAfterCancelProcess in CL_Mutexverifiers.ps1 module +status: experimental +author: oscd.community, Natalia Shornikova +date: 2020/10/14 +modified: 2021/05/21 +references: + - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/CL_mutexverifiers.yml + - https://twitter.com/pabraeken/status/995111125447577600 +tags: + - attack.defense_evasion + - attack.t1216 +logsource: + category: process_creation + product: windows +detection: + selection: + CommandLine|contains|all: + - 'CL_Mutexverifiers.ps1' + - 'runAfterCancelProcess' + # Example Commandline: "powershell Import-Module c:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1; runAfterCancelProcess c:\Evil.exe" + condition: selection +falsepositives: + - Unknown +level: high