This commit is contained in:
Nasreddine Bencherchali
2022-11-03 09:39:48 +01:00
parent 1d37ec5f74
commit 5ee9428e59
6 changed files with 46 additions and 19 deletions
@@ -6,7 +6,7 @@ references:
- Malware Sandbox
author: frack113
date: 2022/03/09
modified: 2022/07/27
modified: 2022/11/02
tags:
- attack.resource_development
- attack.t1587.001
@@ -43,9 +43,16 @@ detection:
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\'
filter_windows_apps:
TargetFilename|contains: '\Microsoft\WindowsApps\'
filter_teams:
Image|startswith: 'C:\Users\'
Image|endswith: '\AppData\Local\Microsoft\Teams\Update.exe'
TargetFilename|startswith: 'C:\Users\'
TargetFilename|endswith:
- '\AppData\Local\Microsoft\Teams\stage\Teams.exe'
- '\AppData\Local\Microsoft\Teams\stage\Squirrel.exe'
condition: selection and not 1 of filter_*
falsepositives:
- Software installers
- Update utilities
#Please contribute to FP to go up the level
#Please contribute to FP to increase the level
level: low
@@ -2,8 +2,8 @@ title: Excel Network Connections
id: 75e33ce3-ae32-4dcc-9aa8-a2a3029d6f84
status: experimental
description: |
Detects an Excel process that opens suspicious network connections to non-private IP addresses, and attempts to cover CVE-2021-42292.
You will likely have to tune this rule for your organization, but it is certainly something you should look for and could have applications for malicious activity beyond CVE-2021-42292.
Detects an Excel process that opens suspicious network connections to non-private IP addresses, and attempts to cover CVE-2021-42292.
You will likely have to tune this rule for your organization, but it is certainly something you should look for and could have applications for malicious activity beyond CVE-2021-42292.
references:
- https://corelight.com/blog/detecting-cve-2021-42292
author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton
@@ -44,9 +44,8 @@ detection:
- '\Avast Software\Avast\AvastSvc.exe'
- '\Ranger\SentinelRanger.exe' # sentinel one
- '\Avast\AvastSvc.exe'
- Image|startswith:
- 'C:\Program Files\SplunkUniversalForwarder\bin\'
- 'C:\Program Files\Mozilla Firefox\firefox.exe'
- Image|startswith: 'C:\Program Files\SplunkUniversalForwarder\bin\'
- Image: 'C:\Program Files\Mozilla Firefox\firefox.exe'
condition: selection and not filter
falsepositives:
- Other Remote Desktop RDP tools
@@ -28,6 +28,8 @@ detection:
# In some cases powershell was invoked with inverted slashes
- '= C:/Windows/System32/WindowsPowerShell/v1.0/powershell'
- '= C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell'
# When MSDT is launched
- '= C:\WINDOWS\System32\sdiagnhost.exe -Embedding '
filter_citrix:
ContextInfo|contains: 'ConfigSyncRun.exe'
filter_adace: # Active Directory Administrative Center Enhancements
@@ -7,6 +7,7 @@ references:
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7
author: frack113
date: 2022/01/12
modified: 2022/11/02
tags:
- attack.persistence
- attack.t1546
@@ -17,9 +18,14 @@ logsource:
detection:
selection:
ScriptBlockText|contains:
- Get-WmiObject
- gwmi
condition: selection
- 'Get-WmiObject'
- 'gwmi'
filter_cl_utility:
Path|endswith: '\CL_Utility.ps1'
ScriptBlockText|contains|all:
- 'function Get-FreeSpace'
- 'SELECT * FROM Win32_LogicalDisk WHERE MediaType=12'
condition: selection and not 1 of filter_*
falsepositives:
- Legitimate PowerShell scripts
level: low
@@ -2,17 +2,17 @@ title: Suspicious In-Memory Module Execution
id: 5f113a8f-8b61-41ca-b90f-d374fa7e4a39
status: experimental
description: |
Detects the access to processes by other suspicious processes which have reflectively loaded libraries in their memory space.
An example is SilentTrinity C2 behaviour. Generally speaking, when Sysmon EventID 10 cannot reference a stack call to a dll loaded from disk (the standard way),
it will display "UNKNOWN" as the module name. Usually this means the stack call points to a module that was reflectively loaded in memory.
Adding to this, it is not common to see such few calls in the stack (ntdll.dll --> kernelbase.dll --> unknown) which essentially means that
most of the functions required by the process to execute certain routines are already present in memory, not requiring any calls to external libraries.
The latter should also be considered suspicious.
Detects the access to processes by other suspicious processes which have reflectively loaded libraries in their memory space.
An example is SilentTrinity C2 behaviour. Generally speaking, when Sysmon EventID 10 cannot reference a stack call to a dll loaded from disk (the standard way),
it will display "UNKNOWN" as the module name. Usually this means the stack call points to a module that was reflectively loaded in memory.
Adding to this, it is not common to see such few calls in the stack (ntdll.dll --> kernelbase.dll --> unknown) which essentially means that
most of the functions required by the process to execute certain routines are already present in memory, not requiring any calls to external libraries.
The latter should also be considered suspicious.
references:
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center/
author: Perez Diego (@darkquassar), oscd.community, Jonhnathan Ribeiro
date: 2019/10/27
modified: 2022/03/16
modified: 2022/11/02
tags:
- attack.privilege_escalation
- attack.defense_evasion
@@ -68,7 +68,6 @@ detection:
- 'C:\WINDOWS\System32\DriverStore\'
- 'C:\Windows\System32\WindowsPowerShell\'
- SourceImage:
- 'C:\Users\\*\AppData\Local\Programs\Microsoft VS Code\Code.exe'
- 'C:\WINDOWS\system32\taskhostw.exe'
- 'C:\WINDOWS\system32\ctfmon.exe'
- 'C:\WINDOWS\system32\NhNotifSys.exe'
@@ -94,7 +93,21 @@ detection:
filter_openwith:
SourceImage: 'C:\Windows\system32\OpenWith.exe'
TargetImage: 'C:\Windows\Explorer.EXE'
condition: ( selection1 or selection2 or selection3 ) and not 1 of filter*
filter_teams_:
SourceImage|startswith: 'C:\Users\'
SourceImage|endswith: '\AppData\Local\Microsoft\Teams\current\Teams.exe'
TargetImage|endswith:
- ':\Windows\Explorer.EXE'
- '\AppData\Local\Microsoft\Teams\Update.exe'
- '\AppData\Local\Microsoft\Teams\current\Teams.exe'
- '\MsMpEng.exe'
filter_wwahost:
SourceImage: 'C:\Windows\System32\WWAHost.exe'
TargetImage: 'C:\Windows\System32\svchost.exe'
filter_sppsvc:
SourceImage: C:\WINDOWS\system32\sppsvc.exe
TargetImage: C:\WINDOWS\system32\SppExtComObj.exe
condition: 1 of selection* and not 1 of filter*
fields:
- ComputerName
- User