More FP tuning
This commit is contained in:
@@ -4,7 +4,7 @@ status: experimental
|
||||
description: Detects shellcode injection by Metasploit's migrate and Empire's psinject
|
||||
author: Bhabesh Raj
|
||||
date: 2022/03/11
|
||||
modified: 2022/09/21
|
||||
modified: 2022/10/20
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
@@ -41,10 +41,18 @@ detection:
|
||||
GrantedAccess: 0x1F3FFF
|
||||
CallTrace|startswith: 'C:\Windows\System32\ntdll.dll'
|
||||
filter_dell_specifc:
|
||||
SourceImage: C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe
|
||||
TargetImage: C:\Windows\Explorer.EXE
|
||||
SourceImage: 'C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe'
|
||||
TargetImage: 'C:\Windows\Explorer.EXE'
|
||||
GrantedAccess: 0x1F3FFF
|
||||
CallTrace|startswith: 'C:\Windows\System32\ntdll.dll'
|
||||
filter_visual_studio:
|
||||
SourceImage:
|
||||
- 'C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\IDE\PerfWatson2.exe'
|
||||
- 'C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\PerfWatson2.exe'
|
||||
TargetImage:
|
||||
- 'C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\IDE\devenv.exe'
|
||||
- 'C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\devenv.exe'
|
||||
CallTrace|startswith: 'C:\Windows\System32\ntdll.dll'
|
||||
condition: selection and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Empire's csharp_exe payload uses 0x1f3fff for process enumeration as well
|
||||
|
||||
+6
-2
@@ -10,7 +10,7 @@ references:
|
||||
- https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand
|
||||
- https://docs.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code
|
||||
date: 2020/05/02
|
||||
modified: 2022/09/21
|
||||
modified: 2022/10/20
|
||||
logsource:
|
||||
product: windows
|
||||
category: registry_delete
|
||||
@@ -44,9 +44,13 @@ detection:
|
||||
Image|contains: 'peazip'
|
||||
# We don't use the HKCR anchor as it could be logged as a different variation (HKEY_CLASSES_ROOT)
|
||||
TargetObject|contains: '\PeaZip.'
|
||||
filter_everything:
|
||||
Image|endswith: '\Everything.exe'
|
||||
# We don't use the HKCR anchor as it could be logged as a different variation (HKEY_CLASSES_ROOT)
|
||||
TargetObject|contains: '\Everything.'
|
||||
condition: selection and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
- Legitimate software (un)installations are known to cause some false positives. Please add them as a filter when encountered
|
||||
level: medium
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
|
||||
+2
-2
@@ -12,7 +12,7 @@ references:
|
||||
- https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d # a list with registry keys
|
||||
- https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/
|
||||
date: 2019/10/25
|
||||
modified: 2022/10/18
|
||||
modified: 2022/10/20
|
||||
logsource:
|
||||
category: registry_set
|
||||
product: windows
|
||||
@@ -135,7 +135,7 @@ detection:
|
||||
Details: 'C:\Program Files\Aurora-Agent\tools\aurora-dashboard.exe'
|
||||
filter_everything:
|
||||
TargetObject|endswith: '\Microsoft\Windows\CurrentVersion\Run\Everything'
|
||||
Details: '"C:\Program Files\Everything\Everything.exe" -startup'
|
||||
Details|endswith: '\Everything\Everything.exe" -startup' # We remove the starting part as it could be installed in different locations
|
||||
condition: all of current_version_* and not 1 of filter_*
|
||||
fields:
|
||||
- SecurityID
|
||||
|
||||
Reference in New Issue
Block a user