Merge pull request #1791 from SigmaHQ/rule-devel

More rules - including the ones for ProxyShell
This commit is contained in:
frack113
2021-08-07 11:49:16 +02:00
committed by GitHub
6 changed files with 117 additions and 8 deletions
+31
View File
@@ -0,0 +1,31 @@
title: Exchange ProxyShell Pattern
id: 23eee45e-933b-49f9-ae1b-df706d2d52ef
status: experimental
description: Detects URP patterns that could be found in ProxyShell exloitation attempts against Exchange servers
references:
- https://youtu.be/5mqid-7zp8k?t=2231
- https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
author: Florian Roth
date: 2020/08/07
tags:
- attack.initial_access
logsource:
category: webserver
detection:
selection1:
c-uri|contains|all:
- '/autodiscover/autodiscover.json?'
- '/powershell'
selection2:
c-uri|contains:
# since we don't know how it will appear in the log files, we'll just use all versions
- 'autodiscover.json?@'
- 'autodiscover.json%3f@'
- '%3f@foo.com'
- 'Email=autodiscover/autodiscover.json'
- 'json?@foo.com'
condition: 1 of them
falsepositives:
- Unknown
level: high
@@ -4,8 +4,9 @@ description: Detects known malicious service installs that appear in cases in wh
author: Florian Roth, Wojciech Lesicki
references:
- https://www.sans.org/webcasts/119395
- https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/
date: 2021/05/26
modified: 2021/06/03
modified: 2021/07/31
tags:
- attack.execution
- attack.privilege_escalation
@@ -17,18 +18,24 @@ logsource:
product: windows
service: system
detection:
selection1:
selection_id:
EventID: 7045
selection2:
selection1:
ServiceFileName|contains|all:
- 'ADMIN$'
- '.exe'
selection3:
selection2:
ServiceFileName|contains|all:
- '%COMSPEC%'
- 'start'
- 'powershell'
condition: selection1 and (selection2 or selection3)
selection3:
ServiceFileName|contains:
- 'powershell -nop -w hidden -encodedcommand'
selection4:
ServiceFileName|base64offset|contains:
- "IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:"
condition: selection_id and (selection1 or selection2 or selection3 or selection4)
falsepositives:
- Unknown
level: critical
@@ -21,9 +21,6 @@ detection:
- 'ddbf5ecca5c8086afde1fb4f551e9e6400e94f4428fe7fb5559da5cffa654cc1'
- '10b30bdee43b3a2ec4aa63375577ade650269d25'
- 'd2fd132ab7bbc6bbb87a84f026fa0244'
condition: selection_image or selection_hash
falsepositives:
- legitimate BIOS driver updates (should be rare)
@@ -0,0 +1,26 @@
title: WinDivert Driver Load
id: 679085d5-f427-4484-9f58-1dc30a7c426d
status: experimental
description: Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows
author: Florian Roth
date: 2021/07/30
references:
- https://reqrypt.org/windivert-doc.html
- https://rastamouse.me/ntlm-relaying-via-cobalt-strike/
tags:
- attack.collection
- attack.defense_evasion
- attack.t1599.001
- attack.t1557.001
logsource:
category: driver_load
product: windows
detection:
selection:
ImageLoaded|contains:
- '\WinDivert.sys'
- '\WinDivert64.sys'
condition: selection
falsepositives:
- legitimate WinDivert driver usage
level: high
@@ -0,0 +1,26 @@
title: Suspicious PowerShell Mailbox Export to Share
id: 889719ef-dd62-43df-86c3-768fb08dc7c0
status: experimental
description: Detects a PowerShell New-MailboxExportRequest that exports a mailbox to a local share, as used in ProxyShell exploitations
references:
- https://youtu.be/5mqid-7zp8k?t=2481
- https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
author: Florian Roth
date: 2021/08/07
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'New-MailboxExport'
- ' -Mailbox '
- ' -FilePath \\127.0.0.1\C$'
condition: selection
falsepositives:
- unknown
level: critical
fields:
- CommandLine
- ParentCommandLine
@@ -0,0 +1,22 @@
title: ADCSPwn Hack Tool
id: cd8c163e-a19b-402e-bdd5-419ff5859f12
description: Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service
author: Florian Roth
references:
- https://github.com/bats3c/ADCSPwn
date: 2021/07/31
tags:
- attack.credential_access
- attack.t1557.001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- ' --adcs '
- ' --port '
condition: selection
falsepositives:
- unlikely
level: critical