Merge pull request #3216 from nasbench/master

DFIR Report - SELECT XMRig FROM SQLServer (New Rules)
This commit is contained in:
Florian Roth
2022-07-12 17:40:44 +02:00
committed by GitHub
7 changed files with 198 additions and 0 deletions
@@ -0,0 +1,28 @@
title: MSSQL XPCmdshell Suspicious Execution
id: 7f103213-a04e-4d59-8261-213dddf22314
status: experimental
description: Detects when the MSSQL "xp_cmdshell" stored procedure is used to execute commands
author: Nasreddine Bencherchali
references:
- https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
date: 2022/07/12
logsource:
product: windows
service: application
definition: MSSQL audit policy to monitor for 'xp_cmdshell' must be enabled in order to recieve this event in the application log (Follow this tutorial https://dba.stackexchange.com/questions/103183/is-there-any-way-to-monitor-execution-of-xp-cmdshell-in-sql-server-2012)
warning: The 'data' field used in the detection section is the container for the event data as a whole. You may have to adapt the rule for your backend accordingly
detection:
selection:
Provider_Name: 'MSSQLSERVER'
EventID: 33205
Data|contains|all:
# You can modify this to include specific commands
- 'object_name:xp_cmdshell'
- 'statement:EXEC'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.execution
@@ -0,0 +1,25 @@
title: MSSQL XPCmdshell Option Change
id: d08dd86f-681e-4a00-a92c-1db218754417
status: experimental
description: Detects when the MSSQL "xp_cmdshell" stored procedure setting is changed
author: Nasreddine Bencherchali
references:
- https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
date: 2022/07/12
logsource:
product: windows
service: application
warning: The 'data' field used in the detection section is the container for the event data as a whole. You may have to adapt the rule for your backend accordingly
detection:
selection:
Provider_Name: 'MSSQLSERVER'
EventID: 15457
Data|contains: 'xp_cmdshell'
condition: selection
falsepositives:
- Legitimate enable/disable of the setting
- Note that since the event contain the change for both values. This means that this will trigger on both enable and disable
level: high
tags:
- attack.execution
@@ -0,0 +1,28 @@
title: Suspicious CMD Shell Redirect
id: 8e0bb260-d4b2-4fff-bb8d-3f82118e6892
status: experimental
description: Detects inline windows shell commands redirecting output via the ">" symbol to a suspicous location
author: Nasreddine Bencherchali
references:
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
date: 2022/07/12
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\cmd.exe'
CommandLine|contains|all:
# Add more suspicious locations as you find them
- ' > %USERPROFILE%\'
- ' > %APPDATA%\'
- ' > \Users\Public\'
- ' > C:\Users\Public\'
- ' > %TEMP%\'
condition: selection
falsepositives:
- Legitimate admin scripts
level: medium
tags:
- attack.execution
- attack.t1218
@@ -0,0 +1,25 @@
title: Base64 MZ Header In CommandLine
id: 22e58743-4ac8-4a9f-bf19-00a0428d8c5f
status: experimental
description: Detects encoded base64 MZ header in the commandline
author: Nasreddine Bencherchali
references:
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
date: 2022/07/12
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'TVqQAAMAAAAEAAAA' # MZ..........
- 'TVpQAAIAAAAEAA8A'
- 'TVqAAAEAAAAEABAA'
- 'TVoAAAAAAAAAAAAA'
- 'TVpTAQEAAAAEAAAA'
condition: selection
falsepositives:
- Unlikley
level: high
tags:
- attack.execution
@@ -0,0 +1,30 @@
title: Net.exe User Account Creation - Never Expire
id: b9f0e6f5-09b4-4358-bae4-08408705bd5c
related:
- id: cd219ff3-fa99-45d4-8380-a7d15116c6dc
type: derived
status: test
description: Detects creation of local users via the net.exe command with the option "never expire"
author: Nasreddine Bencherchali
references:
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
date: 2022/07/12
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\net.exe'
- '\net1.exe'
CommandLine|contains|all:
- 'user'
- 'add'
- 'expires:never'
condition: selection
falsepositives:
- Unlikley
level: high
tags:
- attack.persistence
- attack.t1136.001
@@ -0,0 +1,39 @@
title: Suspicious Mofcomp Execution
id: 1dd05363-104e-4b4a-b963-196a534b03a1
status: experimental
description: |
Detects execution of the "mofcomp" utility as a child of a suspicious shell or script running utility or by having a supsicious path in the commandline.
The "mofcomp" utility parses a file containing MOF statements and adds the classes and class instances defined in the file to the WMI repository.
Attackers abuse this utility to install malicious MOF scripts
author: Nasreddine Bencherchali
references:
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
- https://github.com/The-DFIR-Report/Sigma-Rules/blob/75260568a7ffe61b2458ca05f6f25914efb44337/win_mofcomp_execution.yml
- https://docs.microsoft.com/en-us/windows/win32/wmisdk/mofcomp
date: 2022/07/12
logsource:
category: process_creation
product: windows
detection:
selection_img:
Image|endswith: '\mofcomp.exe'
selection_case:
- ParentImage|endswith:
- '\cmd.exe'
- '\powershell.exe'
- '\wsl.exe'
- '\wscript.exe'
- '\cscript.exe'
- CommandLine|contains:
- '\AppData\Local\Temp'
- '\Users\Public\'
- '\WINDOWS\Temp\'
- '%temp%'
- '%appdata%'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
tags:
- attack.execution
- attack.t1218
@@ -0,0 +1,23 @@
title: Hide User Account Via Special Accounts Reg Key
id: f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd
description: Detects when an attacker set the registry key "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" to "0" in order to hide user account.
author: Nasreddine Bencherchali
date: 2022/07/12
status: experimental
references:
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
logsource:
category: registry_set
product: windows
detection:
selection:
EventType: SetValue
TargetObject|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Details: DWORD (0x00000000)
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1564.002