Add win_vhdmp_mount_iso

This commit is contained in:
frack113
2023-01-09 10:19:41 +01:00
parent 0fc5066fa2
commit 9b550f6858
18 changed files with 109 additions and 4 deletions
@@ -0,0 +1,23 @@
title: Windows Iso Mount
id: ff7ff483-79ab-4434-bbbb-6e1b2b5b0cce
status: experimental
description: Detects a ISO file has been mount in explorer
references:
- https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/
author: frack113
date: 2023/01/09
tags:
- attack.initial_access
logsource:
product: windows
service: vhdmp
detection:
selection:
EventID:
- 1
- 12
- 25
condition: selection
falsepositives:
- Unknown
level: medium
+2 -1
View File
@@ -86,7 +86,8 @@
"dns-server":[],
"printservice-admin":[],
"msexchange-management":[],
"applocker":[]
"applocker":[],
"vhdmp":[]
}
},
"linux":{
+5
View File
@@ -114,4 +114,9 @@ logsources:
service: bitlocker
conditions:
EventLog: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
EventLog: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: logstash-*
+5
View File
@@ -114,6 +114,11 @@ logsources:
service: bitlocker
conditions:
log_name: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
log_name: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: <winlogbeat-{now/d}>
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
+5
View File
@@ -114,6 +114,11 @@ logsources:
service: bitlocker
conditions:
logname: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
logname: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: winlogbeat-*
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
+5
View File
@@ -142,6 +142,11 @@ logsources:
service: bitlocker
conditions:
channel: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
channel: 'Microsoft-Windows-VHDMP-Operational'
linux:
product: linux
index: posix
+7 -1
View File
@@ -192,4 +192,10 @@ logsources:
product: windows
service: ldap_debug
conditions:
Provider_Name: 'Microsoft-Windows-LDAP-Client/Debug'
Provider_Name: 'Microsoft-Windows-LDAP-Client/Debug'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
Provider_Name: 'Microsoft-Windows-VHDMP-Operational'
+5
View File
@@ -128,6 +128,11 @@ logsources:
service: bits-client
conditions:
event_channel: "Microsoft-Windows-Bits-Client/Operational"
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
event_channel: 'Microsoft-Windows-VHDMP-Operational'
windows-network-connection:
product: windows
category: network_connection
+5
View File
@@ -114,6 +114,11 @@ logsources:
service: bitlocker
conditions:
event_source: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
event_source: 'Microsoft-Windows-VHDMP-Operational'
fieldmappings:
EventID: event_id
FailureCode: result_code
+5
View File
@@ -135,4 +135,9 @@ logsources:
service: bitlocker
conditions:
Channel: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
Channel: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: logstash-*
+6 -1
View File
@@ -155,4 +155,9 @@ logsources:
product: windows
service: bitlocker
conditions:
LogName: 'Microsoft-Windows-BitLocker/BitLocker Management'
LogName: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
LogName: 'Microsoft-Windows-VHDMP-Operational'
+5
View File
@@ -176,5 +176,10 @@ logsources:
service: windefend
conditions:
source: 'WinEventLog:Microsoft-Windows-Windows Defender/Operational'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
source: 'Microsoft-Windows-VHDMP-Operational'
fieldmappings:
EventID: EventCode
+5
View File
@@ -145,6 +145,11 @@ logsources:
service: bitlocker
conditions:
source: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
source: 'Microsoft-Windows-VHDMP-Operational'
apache:
service: apache
index: WEBSERVER
+5
View File
@@ -419,6 +419,11 @@ logsources:
service: bitlocker
sources:
- 'WinEventLog:Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp:
product: windows
service: vhdmp
sources:
- 'Microsoft-Windows-VHDMP-Operational'
apache:
category: webserver
sources:
@@ -159,6 +159,11 @@ logsources:
service: bitlocker
conditions:
winlog.channel: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
winlog_channel: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: winlogbeat-*
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'
+5
View File
@@ -122,6 +122,11 @@ logsources:
service: bitlocker
conditions:
log_name: 'Microsoft-Windows-BitLocker/BitLocker Management'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
log_name: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: winlogbeat-*
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
+5
View File
@@ -148,6 +148,11 @@ logsources:
service: bitlocker
conditions:
winlog.channel: 'bitlocker'
windows-vhdmp-operational:
product: windows
service: vhdmp
conditions:
winlog_channel: 'Microsoft-Windows-VHDMP-Operational'
defaultindex: winlogbeat-*
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'
+6 -1
View File
@@ -113,4 +113,9 @@ logsources:
product: windows
service: bits-client
conditions:
Channel: 'Microsoft-Windows-Bits-Client/Operational'
Channel: 'Microsoft-Windows-Bits-Client/Operational'
windows-vhdmp-Operational:
product: windows
service: vhdmp
conditions:
Channel: 'Microsoft-Windows-VHDMP-Operational'