Merge pull request #2046 from frack113/fix_Class

Fix invalid registry _Class
This commit is contained in:
frack113
2021-09-19 09:28:46 +02:00
committed by GitHub
4 changed files with 29 additions and 27 deletions
@@ -4,39 +4,42 @@ status: experimental
description: Detects registry keys created in OceanLotus (also known as APT32) attacks
references:
- https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/
- https://github.com/eset/malware-ioc/tree/master/oceanlotus
tags:
- attack.defense_evasion
- attack.t1112
author: megan201296, Jonhnathan Ribeiro
date: 2019/04/14
modified: 2021/09/13
modified: 2021/09/17
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject:
- 'HKCU\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
ioc_1:
TargetObject: 'HKCU\SOFTWARE\Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
ioc_2:
TargetObject|startswith:
- HKCU\SOFTWARE\App\
- HKLM\SOFTWARE\App\
TargetObject|contains:
- AppXbf13d4ea2945444d8b13e2121cb6b663\
- AppX70162486c7554f7f80f481985d67586d\
- AppX37cc7fdccd644b4f85f4b22d5a3f105a\
TargetObject|endswith:
# covers HKU\* and HKLM..
- '\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\Application'
- '\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\DefaultIcon'
- '\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\Application'
- '\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\DefaultIcon'
- '\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\Application'
- '\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\DefaultIcon'
- Application
- DefaultIcon
selection2:
TargetObject|startswith:
- 'HKCU\'
TargetObject|contains:
# HKCU\SOFTWARE\Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\
- '_Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\'
- 'Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\'
# HKCU\SOFTWARE\Classes\AppX3bbba44c6cae4d9695755183472171e2\
- '_Classes\AppX3bbba44c6cae4d9695755183472171e2\'
- 'Classes\AppX3bbba44c6cae4d9695755183472171e2\'
# HKCU\SOFTWARE\Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\
- '_Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\'
- '_Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
condition: selection or selection2
- 'Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\'
- 'Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
condition: ioc_1 or ioc_2 or selection2
falsepositives:
- Unknown
level: critical
@@ -6,7 +6,7 @@ references:
- https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
author: Kutepov Anton, oscd.community
date: 2019/10/23
modified: 2019/11/07
modified: 2021/09/17
tags:
- attack.persistence
- attack.t1122 # an old one
@@ -19,7 +19,7 @@ detection:
EventType: 'CreateKey' # don't want DeleteKey events
TargetObject|contains|all:
- 'HKU\'
- '_Classes\CLSID\'
- 'Classes\CLSID\'
- '\TreatAs'
condition: selection
falsepositives:
@@ -7,17 +7,15 @@ references:
- https://github.com/hfiref0x/UACME
author: Omer Yampel, Christian Burkard
date: 2017/03/17
modified: 2021/08/31
modified: 2021/09/17
logsource:
category: registry_event
product: windows
detection:
selection1:
# usrclass.dat is mounted on HKU\USERSID_Classes\...
TargetObject|startswith: 'HKU\'
TargetObject|endswith: '_Classes\exefile\shell\runas\command\isolatedCommand'
TargetObject|endswith: Software\Classes\exefile\shell\runas\command\isolatedCommand
selection2:
TargetObject|endswith: '-1???_Classes\Folder\shell\open\command\SymbolicLinkValue'
TargetObject|endswith: Software\Classes\Folder\shell\open\command\SymbolicLinkValue
Details|contains: '-1???\Software\Classes\'
condition: 1 of selection*
tags:
@@ -3,6 +3,7 @@ id: 152f3630-77c1-4284-bcc0-4cc68ab2f6e7
description: Detects the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 33 or 62)
author: Christian Burkard
date: 2021/08/30
modified: 2021/09/17
status: experimental
references:
- https://github.com/hfiref0x/UACME
@@ -17,14 +18,14 @@ logsource:
product: windows
detection:
selection1:
TargetObject|endswith: '_Classes\ms-settings\shell\open\command\SymbolicLinkValue'
TargetObject|endswith: 'Classes\ms-settings\shell\open\command\SymbolicLinkValue'
Details|contains: '\Software\Classes\{'
selection2:
TargetObject|endswith: '_Classes\ms-settings\shell\open\command\DelegateExecute'
TargetObject|endswith: 'Classes\ms-settings\shell\open\command\DelegateExecute'
selection3:
TargetObject|endswith:
- '_Classes\ms-settings\shell\open\command\(Default)'
- '_Classes\exefile\shell\open\command\(Default)'
- 'Classes\ms-settings\shell\open\command\(Default)'
- 'Classes\exefile\shell\open\command\(Default)'
filter_sel3:
Details: '(Empty)'
condition: selection1 or selection2 or (selection3 and not filter_sel3)