Fix FP In Testing

This commit is contained in:
Nasreddine Bencherchali
2022-10-07 13:26:33 +02:00
parent 5710507a2a
commit 8dbd03ff32
5 changed files with 119 additions and 80 deletions
@@ -50,4 +50,6 @@ detection:
falsepositives:
- Antivirus, Anti-Spyware, Anti-Malware Software
- Backup software
- Software installed on other partitions other than "C:\"
- Searching software such as "everything.exe" that are installed and are not located in one of the "filter_programfile" filter entries
level: medium
@@ -4,36 +4,42 @@ id: 647c7b9e-d784-4fda-b9a0-45c565a7b729
description: Detects use of Cobalt Strike commands accidentally entered in the CMD shell
author: _pete_0, TheDFIRReport
references:
- https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf
- https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/
- https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/
- https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf
- https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/
- https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/
date: 2022/05/06
modified: 2022/05/06
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|startswith:
- 'cmd.exe'
- 'c:\windows\system32\cmd.exe'
CommandLine|contains:
- psinject
- spawnas
- make_token
- remote-exec
- rev2self
- dcsync
- logonpasswords
- execute-assembly
- getsystem
Image|endswith: '\cmd.exe'
condition: selection
fields:
- CommandLine
falsepositives:
- Unknown
level: high
modified: 2022/10/07
tags:
- attack.execution
- attack.t1059.003
- attack.execution
- attack.t1059.003
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|startswith:
- 'cmd.exe'
- 'c:\windows\system32\cmd.exe'
CommandLine|contains:
- psinject
- spawnas
- make_token
- remote-exec
- rev2self
- dcsync
- logonpasswords
- execute-assembly
- getsystem
Image|endswith: '\cmd.exe'
filter_vscode:
# This FP could occure when VSCode is installed and a search/or string selection is made to look for one of these detections mentioned above
ParentImage|endswith: \AppData\Local\Programs\Microsoft VS Code\Code.exe # This is the default install location please add your custom one to avoid FP
CommandLine|contains|all:
- '/d /s /c '
- 'checkfilenameiocs --ioc-path '
condition: selection and not 1 of filter_*
fields:
- CommandLine
falsepositives:
- Unknown
level: high
@@ -4,55 +4,61 @@ status: test
description: Detection well-known mimikatz command line arguments
author: Teymur Kheirkhabarov, oscd.community, David ANDRE (additional keywords), Tim Shelton
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- https://tools.thehacker.recipes/mimikatz/modules
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- https://tools.thehacker.recipes/mimikatz/modules
date: 2019/10/22
modified: 2022/02/07
modified: 2022/10/07
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003.002
- attack.t1003.004
- attack.t1003.005
- attack.t1003.006
- attack.credential_access
- attack.t1003.001
- attack.t1003.002
- attack.t1003.004
- attack.t1003.005
- attack.t1003.006
logsource:
category: process_creation
product: windows
category: process_creation
product: windows
detection:
selection_1:
CommandLine|contains:
- DumpCreds
- invoke-mimikatz
module_names:
CommandLine|contains:
- rpc
- token
- crypto
- dpapi
- sekurlsa
- kerberos
- lsadump
- privilege
- process
- vault
mimikatz_separator:
CommandLine|contains: '::'
function_names: # To cover functions from modules that are not in module_names (likely too generic)
CommandLine|contains:
- 'aadcookie' #misc module
- 'detours' #misc module
- 'memssp' #misc module
- 'mflt' #misc module
- 'ncroutemon' #misc module
- 'ngcsign' #misc module
- 'printnightmare' #misc module
- 'skeleton' #misc module
- 'preshutdown' #service module
- 'mstsc' #ts module
- 'multirdp' #ts module
filter_1:
CommandLine|contains: 'function Convert-GuidToCompressedGuid'
condition: ( selection_1 or (module_names and mimikatz_separator) or (function_names and mimikatz_separator) ) and not 1 of filter*
selection_1:
CommandLine|contains:
- DumpCreds
- invoke-mimikatz
module_names:
CommandLine|contains:
- rpc
- token
- crypto
- dpapi
- sekurlsa
- kerberos
- lsadump
- privilege
- process
- vault
mimikatz_separator:
CommandLine|contains: '::'
function_names: # To cover functions from modules that are not in module_names (likely too generic)
CommandLine|contains:
- 'aadcookie' #misc module
- 'detours' #misc module
- 'memssp' #misc module
- 'mflt' #misc module
- 'ncroutemon' #misc module
- 'ngcsign' #misc module
- 'printnightmare' #misc module
- 'skeleton' #misc module
- 'preshutdown' #service module
- 'mstsc' #ts module
- 'multirdp' #ts module
filter_1:
CommandLine|contains: 'function Convert-GuidToCompressedGuid'
filter_vscode:
# This FP could occure when VSCode is installed and a search/or string selection is made to look for one of these detections mentioned above
ParentImage|endswith: \AppData\Local\Programs\Microsoft VS Code\Code.exe # This is the default install location please add your custom one to avoid FP
CommandLine|contains|all:
- '/d /s /c '
- 'checkfilenameiocs --ioc-path '
condition: ( selection_1 or (module_names and mimikatz_separator) or (function_names and mimikatz_separator) ) and not 1 of filter*
falsepositives:
- Legitimate Administrator using tool for password recovery
- Legitimate Administrator using tool for password recovery
level: medium
@@ -6,7 +6,7 @@ references:
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
author: omkar72
date: 2020/10/25
modified: 2022/09/29
modified: 2022/10/07
tags:
- attack.defense_evasion
- attack.t1202
@@ -18,11 +18,33 @@ detection:
ParentImage|endswith: '\conhost.exe'
filter_provider:
Provider_Name: 'SystemTraceProvider-Process' # FPs with Aurora
# Note that some of these git events occure because of a sppofed parent image
filter_git:
# Example FP:
# ParentCommandLine: "C:\Program Files\Git\cmd\git.exe" show --textconv :path/to/file
# ParentCommandLine: "C:\Program Files\Git\cmd\git.exe" cat-file -s 4ca60c8a054f7eaa05f0438a8292762f2015d228
Image|endswith: '\git.exe'
ParentCommandLine|contains: ' show '
ParentCommandLine|contains:
- ' show --textconv '
- ' cat-file -s '
filter_git_show:
# Example FP:
# GrandparentCommandLine: git.exe cat-file -s 4ca60c8a054f7eaa05f0438a8292762f2015d258
# ParentCommandLine: \??\C:\WINDOWS\system32\conhost.exe 0x4
# ParentImage: C:\Windows\System32\conhost.exe
# CommandLine: git.exe show --textconv :path/to/file
ParentCommandLine|contains: 'C:\WINDOWS\system32\conhost.exe 0x4'
CommandLine|contains:
- ' show --textconv '
- ' cat-file -s '
filter_image_conhost:
# Example FP:
# ParentCommandLine: "C:\Program Files\Git\cmd\git.exe" cat-file -s 4ca60c8a054f7eaa05f0438a8292762f2015d228
ParentCommandLine|contains: ' cat-file -s '
Image: C:\Windows\System32\conhost.exe
filter_image_conhost2:
ParentCommandLine: \??\C:\WINDOWS\system32\conhost.exe 0x4
Image: C:\Windows\System32\conhost.exe
condition: selection and not 1 of filter_*
fields:
- Image
@@ -4,7 +4,7 @@ status: experimental
description: Checks whether the image specified in a process creation event doesn't refer to an .exe file (caused by process ghosting or other unorthodox methods to start a process)
author: Max Altgelt
date: 2021/12/09
modified: 2022/09/20
modified: 2022/10/07
references:
- https://pentestlaboratories.com/2021/12/08/process-ghosting/
tags:
@@ -83,6 +83,9 @@ detection:
- '\LocalState\rootfs\'
filter_lzma_exe:
Image|endswith: '\LZMA_EXE'
filter_windows_helper:
ParentImage: C:\Windows\Temp\
Image|startswith: 'C:\Windows\Temp\Helper\'
condition: not known_image_extension and not 1 of filter*
falsepositives:
- Unknown