Lolbas rule

This commit is contained in:
frack113
2022-05-28 16:54:45 +02:00
parent 195be1b3d8
commit 5b2ab692dc
3 changed files with 70 additions and 0 deletions
@@ -0,0 +1,23 @@
title: Pubprn.vbs Proxy Execution
id: 1fb76ab8-fa60-4b01-bddd-71e89bf555da
description: Detects the use of a Micorsoft signed script to execute commands.
status: experimental
references:
- https://lolbas-project.github.io/lolbas/Scripts/Pubprn/
author: frack113
date: 2022/05/21
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- '\pubprn.vbs'
- 'script:'
condition: selection
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1216.001
@@ -0,0 +1,23 @@
title: UtilityFunctions.ps1 Proxy Dll
id: 0403d67d-6227-4ea8-8145-4e72db7da120
description: Detects the use of a Micorsoft signed script execute Managed DLL with PowerShell .
status: experimental
references:
- https://lolbas-project.github.io/lolbas/Scripts/UtilityFunctions/
author: frack113
date: 2022/05/21
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'UtilityFunctions.ps1'
- 'RegSnapin '
condition: selection
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1216
@@ -0,0 +1,24 @@
title: Lolbas OneDriveStandaloneUpdater.exe Set Download
id: 3aff0be0-7802-4a7e-a4fa-c60c74bc5e1d
description: |
Detect set url for OneDriveStandaloneUpdater.exe to download a file from the Internet without executing any anomalous executables with suspicious arguments
Executable was store in C:\Users\redacted\AppData\Local\Microsoft\OneDrive\StandaloneUpdaterreSignInSettingsConfig.json
status: experimental
date: 2022/05/28
references:
- https://lolbas-project.github.io/lolbas/Binaries/OneDriveStandaloneUpdater/
author: frack113
logsource:
category: registry_set
product: windows
detection:
selection:
EventType: SetValue
TargetObject|contains: '\SOFTWARE\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.command_and_control
- attack.t1105