att&ck tags review: windows/process_creation part 9

This commit is contained in:
grikos
2020-08-29 19:22:09 +03:00
parent 6eadfccc68
commit 6092bfcec1
19 changed files with 56 additions and 42 deletions
@@ -7,13 +7,12 @@ references:
- https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6
tags:
- attack.lateral_movement
- attack.privilege_escalation
- attack.t1076
- attack.t1563.002
- attack.t1076 # an old one
- car.2013-07-002
- attack.t1021.001
author: Florian Roth
date: 2018/03/17
modified: 2018/12/11
modified: 2020/08/29
logsource:
category: process_creation
product: windows
@@ -4,12 +4,15 @@ status: experimental
author: Kirill Kiryanov, oscd.community
description: Detect possible Sysmon driver unload
date: 2019/10/23
modified: 2019/11/07
modified: 2020/08/29
references:
- https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
logsource:
product: windows
category: process_creation
tags:
- attack.defense_evasion
- attack.t1070
detection:
selection:
Image|endswith: '\fltmc.exe'
@@ -6,14 +6,16 @@ references:
- https://twitter.com/subTee/status/1216465628946563073
- https://gist.github.com/am0nsec/8378da08f848424e4ab0cc5b317fdd26
date: 2020/01/13
modified: 2020/08/29
author: Sreeman
tags:
- attack.t1064
- attack.t1211
- attack.t1059
- attack.defense_evasion
- attack.persistence
- attack.t1059.005
- attack.execution
- attack.t1574.002
- attack.t1059 # an old one
- attack.t1064 # an old one
logsource:
product: Windows
detection:
@@ -6,7 +6,12 @@ references:
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/
author: Florian Roth
date: 2019/05/22
modified: 2020/08/29
tags:
- attack.initial_access
- attack.t1190
- attack.lateral_movement
- attack.t1210
- car.2013-07-002
logsource:
product: windows
@@ -19,5 +24,4 @@ detection:
condition: selection and not filter
falsepositives:
- Unknown
level: high
level: high
@@ -3,18 +3,18 @@ id: e66779cc-383e-4224-a3a4-267eeb585c40
description: Detect child processes of automatically elevated instances of Microsoft Connection Manager Profile Installer (cmstp.exe).
status: experimental
author: E.M. Anhaus (orignally from Atomic Blue Detections, Endgame), oscd.community
modified: 2019/11/11
date: 2019/10/24
modified: 2020/08/29
references:
- https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1191/T1191.md
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.execution
- attack.t1191
- attack.t1088
- attack.t1548.002
- attack.t1218
- attack.t1218.003
- attack.t1191 # an old one
- attack.t1088 # an old one
logsource:
category: process_creation
product: windows
@@ -10,8 +10,8 @@ references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1088/T1088.md
tags:
- attack.privilege_escalation
- attack.t1088
- attack.t1548.002
- attack.t1088 # an old one
logsource:
category: process_creation
product: windows
@@ -9,8 +9,8 @@ references:
- https://eqllib.readthedocs.io/en/latest/analytics/532b5ed4-7930-11e9-8f5c-d46d6d62a49e.html
tags:
- attack.privilege_escalation
- attack.t1088
- attack.t1548.002
- attack.t1088 # an old one
logsource:
category: process_creation
product: windows
@@ -5,12 +5,14 @@ references:
- https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
- https://pentestlab.blog/2017/03/30/weak-service-permissions/
tags:
- attack.persistence
- attack.defence_evasion
- attack.privilege_escalation
- attack.t1134
- attack.t1574.011
status: experimental
author: Teymur Kheirkhabarov
date: 2019/10/26
modified: 2019/11/11
modified: 2020/08/29
logsource:
category: process_creation
product: windows
@@ -3,9 +3,7 @@ id: 8f88e3f6-2a49-48f5-a5c4-2f7eedf78710
description: Detects a JAVA process running with remote debugging allowing more than just localhost to connect
author: Florian Roth
date: 2019/01/16
tags:
- attack.discovery
- attack.t1046
modified: 2020/08/29
logsource:
category: process_creation
product: windows
@@ -7,10 +7,10 @@ reference:
date: 2017/01/01
modified: 2019/10/26
tags:
- attack.privilege_escalation
- attack.persistence
- attack.t1100
- attack.t1505.003
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
logsource:
category: process_creation
product: windows
@@ -7,10 +7,10 @@ reference:
- https://ragged-lab.blogspot.com/2020/07/webshells-automating-reconnaissance.html
date: 2020/07/22
tags:
- attack.privilege_escalation
- attack.persistence
- attack.t1100
- attack.t1505.003
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
logsource:
category: process_creation
product: windows
@@ -27,10 +27,10 @@ fields:
- CommandLine
- ParentCommandLine
tags:
- attack.privilege_escalation
- attack.persistence
- attack.t1100
- attack.t1505.003
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
falsepositives:
- Particular web applications may spawn a shell process legitimately
level: high
@@ -8,8 +8,8 @@ author: Teymur Kheirkhabarov
date: 2019/10/23
modified: 2019/11/11
tags:
- attack.discovery
- attack.privilege_escalation
- attack.discovery
- attack.t1033
logsource:
category: process_creation
@@ -6,6 +6,7 @@ references:
- https://github.com/SandboxEscaper/polarbearrepo/tree/master/bearlpe
author: Olaf Hartong
date: 2019/05/22
modified: 2020/08/29
logsource:
category: process_creation
product: windows
@@ -18,8 +19,7 @@ falsepositives:
- Unknown
tags:
- attack.privilege_escalation
- attack.execution
- attack.t1053
- car.2013-08-001
- attack.t1053.005
- attack.t1053 # an old one
- car.2013-08-001
level: high
@@ -12,8 +12,8 @@ logsource:
product: windows
tags:
- attack.persistence
- attack.t1084
- attack.t1546.003
- attack.t1084 # an old one
detection:
selection:
ParentImage: '*\EdgeTransport.exe'
@@ -6,10 +6,12 @@ references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
author: Thomas Patzke
date: 2018/03/07
modified: 2020/08/29
tags:
- attack.execution
- attack.persistence
- attack.t1047
- attack.privilege_escalation
- attack.t1546.003
- attack.t1047 # an old one
logsource:
category: process_creation
product: windows
@@ -7,11 +7,13 @@ references:
- https://any.run/report/68bc255f9b0db6a0d30a8f2dadfbee3256acfe12497bf93943bc1eab0735e45e/a2385d6f-34f7-403c-90d3-b1f9d2a90a5e
author: Markus Neis / @Karneades
date: 2019/04/03
modified: 2020/08/29
tags:
- attack.execution
- attack.defense_evasion
- attack.t1064
- attack.t1047
- attack.t1059.001
- attack.defense_evasion # an old one
- attack.t1064 # an old one
logsource:
category: process_creation
product: windows
@@ -8,11 +8,12 @@ references:
- https://twitter.com/ReaQta/status/1222548288731217921
author: Florian Roth
date: 2020/01/30
modified: 2020/08/29
tags:
- attack.defense_evasion
- attack.execution
- attack.t1088
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1548.002
- attack.t1088 # an old one
logsource:
category: process_creation
product: windows
@@ -22,5 +22,6 @@ falsepositives:
- msxsl.exe is not installed by default so unlikely.
level: medium
tags:
- attack.execution
- attack.defense_evasion
- attack.t1220
- attack.execution # an old one