Merge branch 'master' into nasbench-rule-devel

This commit is contained in:
Nasreddine Bencherchali
2022-10-26 10:39:55 +02:00
committed by GitHub
566 changed files with 4245 additions and 4046 deletions
@@ -0,0 +1,27 @@
title: OpenSSH Server Listening On Socket
id: 3ce8e9a4-bc61-4c9b-8e69-d7e2492a8781
status: experimental
description: Detects scenarios where an attacker enables the OpenSSH server and server starts to listening on SSH socket.
references:
- https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack/tree/master/TA0008-Lateral%20Movement/T1021.004-Remote%20Service%20SSH
- https://winaero.com/enable-openssh-server-windows-10/
- https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse
- https://virtualizationreview.com/articles/2020/05/21/ssh-server-on-windows-10.aspx
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
author: mdecrevoisier
date: 2022/10/25
tags:
- attack.lateral_movement
- attack.t1021.004
logsource:
product: windows
service: openssh
detection:
selection:
EventID: 4
process: sshd
payload|startswith: 'Server listening on '
condition: selection
falsepositives:
- Legitimate administrator activity
level: medium
@@ -14,6 +14,7 @@ tags:
logsource:
category: file_access
product: windows
definition: file_access rules are using the Microsoft-Windows-Kernel-File ETW provider
detection:
selection:
- FileName|contains:
@@ -1,7 +1,9 @@
title: Credential Manager Access
id: 407aecb1-e762-4acf-8c7b-d087bcff3bb6
status: experimental
description: Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::cred" function
description: |
Detects suspicious processes based on name and location that access the windows credential manager and vault.
Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::cred" function
references:
- https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz
- https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
@@ -13,6 +15,7 @@ tags:
logsource:
category: file_access
product: windows
definition: file_access rules are using the Microsoft-Windows-Kernel-File ETW provider
detection:
selection:
FileName|contains:
@@ -1,7 +1,9 @@
title: Suspicious Access To Windows DPAPI Master Keys
id: 46612ae6-86be-4802-bc07-39b59feb1309
status: experimental
description: Detects suspicious processes based on name and location that access the Windows Data Protection API Master keys. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::masterkey" function
description: |
Detects suspicious processes based on name and location that access the Windows Data Protection API Master keys.
Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::masterkey" function
references:
- https://web.archive.org/web/20181130065817/http://www.harmj0y.net/blog/redteaming/operational-guidance-for-offensive-user-dpapi-abuse/
- https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/dpapi-extracting-passwords
@@ -13,6 +15,7 @@ tags:
logsource:
category: file_access
product: windows
definition: file_access rules are using the Microsoft-Windows-Kernel-File ETW provider
detection:
selection:
FileName|contains:
@@ -1,7 +1,9 @@
title: Suspicious Access To Windows Credential History File
id: 7a2a22ea-a203-4cd3-9abf-20eb1c5c6cd2
status: experimental
description: Detects suspicious processes based on name and location that access the Windows Credential History File. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" function
description: |
Detects suspicious processes based on name and location that access the Windows Credential History File.
Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" function
references:
- https://tools.thehacker.recipes/mimikatz/modules/dpapi/credhist
- https://www.passcape.com/windows_password_recovery_dpapi_credhist
@@ -13,6 +15,7 @@ tags:
logsource:
category: file_access
product: windows
definition: file_access rules are using the Microsoft-Windows-Kernel-File ETW provider
detection:
selection:
FileName|endswith: '\Microsoft\Protect\CREDHIST'
@@ -2,13 +2,13 @@ title: File Creation Date Changed to Another Year
id: 558eebe5-f2ba-4104-b339-36f7902bcc1a
status: experimental
description: |
Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system.
Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity.
Attackers may change the file creation time of a backdoor to make it look like it was installed with the operating system.
Note that many processes legitimately change the creation time of a file; it does not necessarily indicate malicious activity.
references:
- https://www.inversecos.com/2022/04/defence-evasion-technique-timestomping.html
author: frack113, Florian Roth
date: 2022/08/12
modified: 2022/09/09
modified: 2022/10/25
tags:
- attack.t1070.006
- attack.defense_evasion
@@ -33,6 +33,10 @@ detection:
- TargetFilename|endswith:
- '.tmp'
- '.temp'
gen_filter_tiworker:
Image|startswith: 'C:\WINDOWS\'
Image|endswith: '\TiWorker.exe'
TargetFilename|endswith: '.cab'
condition: (( selection1 and not filter1 ) or ( selection2 and not filter2 )) and not 1 of gen_filter*
falsepositives:
- Changes made to or by the local NTP service
@@ -1,11 +1,11 @@
title: Unusual File Modification by dns.exe
id: 9f383dc0-fdeb-4d56-acbc-9f9f4f8f20f3
status: experimental
author: Tim Rauch
date: 2022/09/27
description: Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
references:
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns.exe.html
author: Tim Rauch
date: 2022/09/27
tags:
- attack.initial_access
- attack.t1133
@@ -2,10 +2,13 @@ title: Delete Log from Application
id: b1decb61-ed83-4339-8e95-53ea51901720
status: experimental
description: Deletion of log files is a known anti-forensic technique
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.004/T1070.004.md
author: frack113
date: 2022/01/16
tags:
- attack.defense_evasion
- attack.t1070.004
logsource:
product: windows
category: file_delete
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Unknown
level: low
tags:
- attack.defense_evasion
- attack.t1070.004
@@ -2,11 +2,14 @@ title: Deletes Backup Files
id: 06125661-3814-4e03-bfa2-1e4411c60ac3
status: experimental
description: Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-6---windows---delete-backup-files
author: frack113
date: 2022/01/02
modified: 2022/06/02
tags:
- attack.impact
- attack.t1490
logsource:
product: windows
category: file_delete
@@ -26,6 +29,3 @@ detection:
falsepositives:
- Legitime usage
level: medium
tags:
- attack.impact
- attack.t1490
@@ -2,7 +2,6 @@ title: Prefetch File Deletion
id: 0a1f9d29-6465-4776-b091-7f43b26e4c89
status: experimental
description: Detects the deletion of a prefetch file (AntiForensic)
level: high
author: Cedric MAURUGEON
date: 2021/09/29
modified: 2022/05/27
@@ -24,3 +23,4 @@ detection:
condition: selection and not exception
falsepositives:
- Unknown
level: high
@@ -2,12 +2,15 @@ title: Sysinternals SDelete File Deletion
id: 6ddab845-b1b8-49c2-bbf7-1a11967f64bc
status: test
description: A General detection to trigger for the deletion of files by Sysinternals SDelete. It looks for the common name pattern used to rename files.
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/9
- https://threathunterplaybook.com/evals/apt29/detections/4.B.4_83D62033-105A-4A02-8B75-DAB52D8D51EC.html
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/05/02
modified: 2022/09/21
tags:
- attack.defense_evasion
- attack.t1070.004
logsource:
product: windows
category: file_delete
@@ -22,6 +25,3 @@ detection:
falsepositives:
- Legitime usage of SDelete
level: medium
tags:
- attack.defense_evasion
- attack.t1070.004
@@ -1,11 +1,11 @@
title: Unusual File Deletion by dns.exe
id: 8f0b1fb1-9bd4-4e74-8cdf-a8de4d2adfd0
status: experimental
author: Tim Rauch
date: 2022/09/27
description: Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
references:
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns.exe.html
author: Tim Rauch
date: 2022/09/27
tags:
- attack.initial_access
- attack.t1133
@@ -6,12 +6,12 @@ references:
- https://www.elastic.co/guide/en/security/current/webserver-access-logs-deleted.html
author: Tim Rauch
date: 2022/09/16
logsource:
category: file_delete
product: windows
tags:
- attack.defense_evasion
- attack.t1070
logsource:
category: file_delete
product: windows
detection:
selection:
FileName|startswith: 'C:\inetpub\logs\LogFiles\'
@@ -20,4 +20,4 @@ detection:
falsepositives:
- During uninstallation of the IIS service
- During log rotation
level: medium
level: medium
@@ -2,25 +2,25 @@ title: Suspicious File Event With Teams Objects
id: 6902955a-01b7-432c-b32a-6f5f81d8f624
status: experimental
description: Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.
author: '@SerkinValery'
references:
- https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/
- https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
- https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/
- https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
author: '@SerkinValery'
date: 2022/09/16
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- '\Microsoft\Teams\Cookies'
- '\Microsoft\Teams\Local Storage\leveldb'
filter:
Image|contains: '\Microsoft\Teams\current\Teams.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high
tags:
- attack.credential_access
- attack.t1528
- attack.credential_access
- attack.t1528
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- '\Microsoft\Teams\Cookies'
- '\Microsoft\Teams\Local Storage\leveldb'
filter:
Image|contains: '\Microsoft\Teams\current\Teams.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high
@@ -2,12 +2,15 @@ title: Suspicious Unattend.xml File Access
id: 1a3d42dd-3763-46b9-8025-b5f17f340dfb
status: experimental
description: |
Attempts to access unattend.xml, where credentials are commonly stored, within the Panther directory where installation logs are stored.
If these files exist, their contents will be displayed. They are used to store credentials/answers during the unattended windows install process
author: frack113
Attempts to access unattend.xml, where credentials are commonly stored, within the Panther directory where installation logs are stored.
If these files exist, their contents will be displayed. They are used to store credentials/answers during the unattended windows install process
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
author: frack113
date: 2021/12/19
tags:
- attack.credential_access
- attack.t1552.001
logsource:
product: windows
category: file_event
@@ -18,6 +21,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.credential_access
- attack.t1552.001
@@ -2,16 +2,19 @@ title: Anydesk Temporary Artefact
id: 0b9ad457-2554-44c1-82c2-d56a99c42377
status: experimental
description: |
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-2---anydesk-files-detected-test-on-windows
author: frack113
date: 2022/02/11
tags:
- attack.command_and_control
- attack.t1219
logsource:
category: file_event
product: windows
category: file_event
product: windows
detection:
selection:
TargetFilename|contains:
@@ -22,6 +25,3 @@ detection:
falsepositives:
- Legitimate use
level: medium
tags:
- attack.command_and_control
- attack.t1219
@@ -1,11 +1,17 @@
title: Suspicious Binary Writes Via AnyDesk
id: 2d367498-5112-4ae5-a06a-96e7bc33a211
status: experimental
description: Detects anydesk writing binaries files to disk other than "gcapi.dll". According to RedCanary research it's highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll, which is a legitimate DLL that's part of the Google Chrome web browser used to interact with the Google Cloud API. (See reference section for more details)
author: Nasreddine Bencherchali
description: |
Detects anydesk writing binaries files to disk other than "gcapi.dll".
According to RedCanary research it's highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll,
which is a legitimate DLL that's part of the Google Chrome web browser used to interact with the Google Cloud API. (See reference section for more details)
references:
- https://redcanary.com/blog/misbehaving-rats/
author: Nasreddine Bencherchali
date: 2022/09/28
tags:
- attack.command_and_control
- attack.t1219
logsource:
product: windows
category: file_event
@@ -21,6 +27,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.command_and_control
- attack.t1219
@@ -4,8 +4,7 @@ related:
- id: 7453575c-a747-40b9-839b-125a0aae324b
type: derived
status: stable
description: A sigma rule detecting an unidetefied attacker who used phishing emails to target high profile orgs on November 2018. The Actor shares some TTPs with
YYTRIUM/APT29 campaign in 2016.
description: A sigma rule detecting an unidetefied attacker who used phishing emails to target high profile orgs on November 2018. The Actor shares some TTPs with YYTRIUM/APT29 campaign in 2016.
references:
- https://twitter.com/DrunkBinary/status/1063075530180886529
author: '@41thexplorer, Microsoft Defender ATP'
@@ -19,6 +18,6 @@ logsource:
category: file_event
detection:
selection:
TargetFilename|contains: 'ds7002.lnk'
TargetFilename|contains: 'ds7002.lnk'
condition: selection
level: high
level: high
@@ -1,10 +1,10 @@
title: BloodHound Collection Files
id: 02773bed-83bf-469f-b7ff-e676e7d78bab
description: Detects default file names outputted by the BloodHound collection tool SharpHound
status: experimental
author: C.J. May
description: Detects default file names outputted by the BloodHound collection tool SharpHound
references:
- https://academy.hackthebox.com/course/preview/active-directory-bloodhound/bloodhound--data-collection
author: C.J. May
date: 2022/08/09
modified: 2022/08/09
tags:
@@ -1,10 +1,10 @@
title: CrackMapExec File Creation Patterns
id: 9433ff9c-5d3f-4269-99f8-95fc826ea489
description: Detects suspicious file creation patterns found in logs when CrackMapExec is used
status: experimental
author: Florian Roth
description: Detects suspicious file creation patterns found in logs when CrackMapExec is used
references:
- https://mpgn.gitbook.io/crackmapexec/smb-protocol/obtaining-credentials/dump-lsass
author: Florian Roth
date: 2022/03/12
modified: 2022/05/27
tags:
@@ -55,4 +55,4 @@ detection:
condition: 1 of selection*
falsepositives:
- Unknown
level: high
level: high
@@ -2,12 +2,15 @@ title: New Shim Database Created in the Default Directory
id: ee63c85c-6d51-4d12-ad09-04e25877a947
status: experimental
description: |
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims.
The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.
author: frack113
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims.
The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backward compatibility of software as the operating system codebase changes over time.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.011/T1546.011.md#atomic-test-2---new-shim-database-files-created-in-the-default-shim-database-directory
author: frack113
date: 2021/12/29
tags:
- attack.persistence
- attack.t1547.009
logsource:
product: windows
category: file_event
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.persistence
- attack.t1547.009
@@ -2,13 +2,16 @@ title: Suspicious Screensaver Binary File Creation
id: 97aa2e88-555c-450d-85a6-229bcd87efb8
status: experimental
description: |
Adversaries may establish persistence by executing malicious content triggered by user inactivity.
Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension
author: frack113
Adversaries may establish persistence by executing malicious content triggered by user inactivity.
Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.002/T1546.002.md
author: frack113
date: 2021/12/29
modified: 2022/01/10
tags:
- attack.persistence
- attack.t1546.002
logsource:
product: windows
category: file_event
@@ -23,6 +26,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.persistence
- attack.t1546.002
@@ -2,12 +2,15 @@ title: Creation Exe for Service with Unquoted Path
id: 8c3c76ca-8f8b-4b1d-aaf3-81aebcd367c9
status: experimental
description: |
Adversaries may execute their own malicious payloads by hijacking vulnerable file path references.
Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.
author: frack113
Adversaries may execute their own malicious payloads by hijacking vulnerable file path references.
Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.009/T1574.009.md
author: frack113
date: 2021/12/30
tags:
- attack.persistence
- attack.t1547.009
logsource:
product: windows
category: file_event
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.t1547.009
@@ -2,51 +2,51 @@ title: Cred Dump Tools Dropped Files
id: 8fbf3271-1ef6-4e94-8210-03c2317947f6
status: test
description: Files with well-known filenames (parts of credential dump software or files produced by them) creation
author: Teymur Kheirkhabarov, oscd.community
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Teymur Kheirkhabarov, oscd.community
date: 2019/11/01
modified: 2022/09/21
logsource:
category: file_event
product: windows
detection:
selection:
- TargetFilename|contains:
- '\pwdump'
- '\kirbi'
- '\pwhashes'
- '\wce_ccache'
- '\wce_krbtkts'
- '\fgdump-log'
- TargetFilename|endswith:
- '\test.pwd'
- '\lsremora64.dll'
- '\lsremora.dll'
- '\fgexec.exe'
- '\wceaux.dll'
- '\SAM.out'
- '\SECURITY.out'
- '\SYSTEM.out'
- '\NTDS.out'
- '\DumpExt.dll'
- '\DumpSvc.exe'
- '\cachedump64.exe'
- '\cachedump.exe'
- '\pstgdump.exe'
- '\servpw.exe'
- '\servpw64.exe'
- '\pwdump.exe'
- '\procdump64.exe'
- '\Dumpy.exe'
condition: selection
falsepositives:
- Legitimate Administrator using tool for password recovery
level: high
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003.002
- attack.t1003.003
- attack.t1003.004
- attack.t1003.005
- attack.credential_access
- attack.t1003.001
- attack.t1003.002
- attack.t1003.003
- attack.t1003.004
- attack.t1003.005
logsource:
category: file_event
product: windows
detection:
selection:
- TargetFilename|contains:
- '\pwdump'
- '\kirbi'
- '\pwhashes'
- '\wce_ccache'
- '\wce_krbtkts'
- '\fgdump-log'
- TargetFilename|endswith:
- '\test.pwd'
- '\lsremora64.dll'
- '\lsremora.dll'
- '\fgexec.exe'
- '\wceaux.dll'
- '\SAM.out'
- '\SECURITY.out'
- '\SYSTEM.out'
- '\NTDS.out'
- '\DumpExt.dll'
- '\DumpSvc.exe'
- '\cachedump64.exe'
- '\cachedump.exe'
- '\pstgdump.exe'
- '\servpw.exe'
- '\servpw64.exe'
- '\pwdump.exe'
- '\procdump64.exe'
- '\Dumpy.exe'
condition: selection
falsepositives:
- Legitimate Administrator using tool for password recovery
level: high
@@ -2,13 +2,16 @@ title: Dynamic C Sharp Compile Artefact
id: e4a74e34-ecde-4aab-b2fb-9112dd01aed0
status: experimental
description: |
When C# is compiled dynamically, a .cmdline file will be created as a part of the process.
Certain processes are not typically observed compiling C# code, but can do so without touching disk.
This can be used to unpack a payload for execution
author: frack113
When C# is compiled dynamically, a .cmdline file will be created as a part of the process.
Certain processes are not typically observed compiling C# code, but can do so without touching disk.
This can be used to unpack a payload for execution
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027.004/T1027.004.md#atomic-test-2---dynamic-c-compile
author: frack113
date: 2022/01/09
tags:
- attack.defense_evasion
- attack.t1027.004
logsource:
product: windows
category: file_event
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Unknown
level: low
tags:
- attack.defense_evasion
- attack.t1027.004
@@ -1,13 +1,12 @@
title: CVE-2021-1675 Print Spooler Exploitation Filename Pattern
id: 2131cfb3-8c12-45e8-8fa0-31f5924e9f07
description: Detects the default filename used in PoC code against print spooler vulnerability CVE-2021-1675
author: Florian Roth
status: experimental
level: critical
description: Detects the default filename used in PoC code against print spooler vulnerability CVE-2021-1675
references:
- https://github.com/hhlxf/PrintNightmare
- https://github.com/afwu/PrintNightmare
- https://github.com/cube0x0/CVE-2021-1675
author: Florian Roth
date: 2021/06/29
modified: 2021/12/01
tags:
@@ -28,3 +27,4 @@ fields:
- TargetFilename
falsepositives:
- Unknown
level: critical
@@ -1,7 +1,10 @@
title: CVE-2021-26858 Exchange Exploitation
id: b06335b3-55ac-4b41-937e-16b7f5d57dfd
status: test
description: Detects possible successful exploitation for vulnerability described in CVE-2021-26858 by looking for | creation of non-standard files on disk by Exchange Servers Unified Messaging service | which could indicate dropping web shells or other malicious content
description: |
Detects possible successful exploitation for vulnerability described in CVE-2021-26858 by looking for
creation of non-standard files on disk by Exchange Servers Unified Messaging service
which could indicate dropping web shells or other malicious content
references:
- https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
author: Bhabesh Raj
@@ -25,9 +28,9 @@ detection:
- '.cfg'
- 'cleanup.bin'
condition: selection and not filter
falsepositives:
- Unknown
level: high
fields:
- ComputerName
- TargetFilename
falsepositives:
- Unknown
level: high
@@ -2,11 +2,11 @@ title: InstallerFileTakeOver LPE CVE-2021-41379 File Create Event
id: 3be82d5d-09fe-4d6a-a275-0d40d234d324
status: experimental
description: Detects signs of the exploitation of LPE CVE-2021-41379 that include an msiexec process that creates an elevation_service.exe file
author: Florian Roth
date: 2021/11/22
references:
- https://github.com/klinix5/InstallerFileTakeOver
- https://www.zerodayinitiative.com/advisories/ZDI-21-1308/
author: Florian Roth
date: 2021/11/22
tags:
- attack.privilege_escalation
- attack.t1068
@@ -2,11 +2,14 @@ title: CVE-2021-44077 POC Default Dropped File
id: 7b501acf-fa98-4272-aa39-194f82edc8a3
status: experimental
description: Detects the creation of "msiexec.exe" in the "bin" directory of the ManageEngine SupportCenter Plus (Related to CVE-2021-44077) and public POC available (See references section)
author: Nasreddine Bencherchali
references:
- https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/
- https://github.com/horizon3ai/CVE-2021-44077/blob/b7a48e25824e8ead95e028475c7fd0e107e6e6bf/exploit.py
author: Nasreddine Bencherchali
date: 2022/06/06
tags:
- attack.execution
- cve.2021.44077
logsource:
category: file_event
product: windows
@@ -17,6 +20,3 @@ detection:
falsepositives:
- Unlikely
level: high
tags:
- attack.execution
- cve.2021.44077
@@ -1,27 +1,26 @@
title: CVE-2022-24527 Microsoft Connected Cache LPE
id: e0a41412-c69a-446f-8e6e-0e6d7483dad7
description: Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache
author: Florian Roth
status: experimental
description: Detects files created during the local privilege exploitation of CVE-2022-24527 Microsoft Connected Cache
references:
- https://www.rapid7.com/blog/post/2022/04/12/cve-2022-24527-microsoft-connected-cache-local-privilege-escalation-fixed/
- https://www.rapid7.com/blog/post/2022/04/12/cve-2022-24527-microsoft-connected-cache-local-privilege-escalation-fixed/
author: Florian Roth
date: 2022/04/13
tags:
- attack.privilege_escalation
- attack.t1059.001
- cve.2022.24527
- attack.privilege_escalation
- attack.t1059.001
- cve.2022.24527
logsource:
category: file_event
product: windows
category: file_event
product: windows
detection:
selection:
TargetFilename|endswith: 'WindowsPowerShell\Modules\webAdministration\webAdministration.psm1'
filter:
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: selection and not filter
selection:
TargetFilename|endswith: 'WindowsPowerShell\Modules\webAdministration\webAdministration.psm1'
filter:
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: selection and not filter
falsepositives:
- Unknown
level: high
@@ -2,16 +2,21 @@ title: DLL Search Order Hijackig Via Additional Space in Path
id: b6f91281-20aa-446a-b986-38a92813a18f
status: experimental
description: |
Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...)
but with a space in order to trick DLL load search order and perform a "DLL Search Order Hijacking" attack
Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...)
but with a space in order to trick DLL load search order and perform a "DLL Search Order Hijacking" attack
references:
- https://twitter.com/cyb3rops/status/1552932770464292864
- https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows
author: frack113, Nasreddine Bencherchali
date: 2022/07/30
tags:
- attack.persistence
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1574.002
logsource:
category: file_event
product: windows
category: file_event
product: windows
detection:
selection:
TargetFilename|startswith:
@@ -23,8 +28,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1574.002
@@ -4,11 +4,13 @@ status: experimental
description: |
Detects creation of a file named "ErrorHandler.cmd" in the "C:\WINDOWS\Setup\Scripts\" directory which could be used as a method of persistence
The content of C:\WINDOWS\Setup\Scripts\ErrorHandler.cmd is read whenever some tools under C:\WINDOWS\System32\oobe\ (e.g. Setup.exe) fail to run for any reason.
author: Nasreddine Bencherchali
references:
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
- https://github.com/last-byte/PersistenceSniper
author: Nasreddine Bencherchali
date: 2022/08/09
tags:
- attack.persistence
logsource:
category: file_event
product: windows
@@ -19,5 +21,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.persistence
@@ -1,35 +1,35 @@
title: Suspicious ASPX File Drop by Exchange
id: bd1212e5-78da-431e-95fa-c58e3237a8e6
related:
- id: 6b269392-9eba-40b5-acb6-55c882b20ba6
type: similar
description: Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder
author: Florian Roth (rule), MSTI (query, idea)
- id: 6b269392-9eba-40b5-acb6-55c882b20ba6
type: similar
status: experimental
description: Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder
references:
- https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/
- https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html
- https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html
- https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/
- https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html
- https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html
author: Florian Roth (rule), MSTI (query, idea)
date: 2022/10/01
tags:
- attack.persistence
- attack.t1505.003
- attack.persistence
- attack.t1505.003
logsource:
product: windows
category: file_event
product: windows
category: file_event
detection:
selection:
Image|endswith: '\w3wp.exe'
CommandLine|contains: 'MSExchange'
TargetFilename|contains:
- 'FrontEnd\HttpProxy\' # from GTSC and MSTI reports
- '\inetpub\wwwroot\aspnet_client\' # from GTSC report
selection_types:
TargetFilename|endswith:
- '.aspx'
- '.asp'
- '.ashx'
condition: all of selection*
selection:
Image|endswith: '\w3wp.exe'
CommandLine|contains: 'MSExchange'
TargetFilename|contains:
- 'FrontEnd\HttpProxy\' # from GTSC and MSTI reports
- '\inetpub\wwwroot\aspnet_client\' # from GTSC report
selection_types:
TargetFilename|endswith:
- '.aspx'
- '.asp'
- '.ashx'
condition: all of selection*
falsepositives:
- Unknown
- Unknown
level: high
@@ -1,39 +1,39 @@
title: Suspicious File Drop by Exchange
id: 6b269392-9eba-40b5-acb6-55c882b20ba6
related:
- id: bd1212e5-78da-431e-95fa-c58e3237a8e6
type: similar
description: Detects suspicious file type dropped by an Exchange component in IIS
author: Florian Roth
- id: bd1212e5-78da-431e-95fa-c58e3237a8e6
type: similar
status: experimental
description: Detects suspicious file type dropped by an Exchange component in IIS
references:
- https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/
- https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html
- https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html
- https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/
- https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html
- https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html
author: Florian Roth
date: 2022/10/04
tags:
- attack.persistence
- attack.t1190
- attack.initial_access
- attack.t1505.003
- attack.persistence
- attack.t1190
- attack.initial_access
- attack.t1505.003
logsource:
product: windows
category: file_event
product: windows
category: file_event
detection:
selection:
Image|endswith: '\w3wp.exe'
CommandLine|contains: 'MSExchange'
selection_types:
TargetFilename|endswith:
- '.aspx'
- '.asp'
- '.ashx'
- '.ps1'
- '.bat'
- '.exe'
- '.dll'
- '.vbs'
condition: all of selection*
selection:
Image|endswith: '\w3wp.exe'
CommandLine|contains: 'MSExchange'
selection_types:
TargetFilename|endswith:
- '.aspx'
- '.asp'
- '.ashx'
- '.ps1'
- '.bat'
- '.exe'
- '.dll'
- '.vbs'
condition: all of selection*
falsepositives:
- Unknown
- Unknown
level: medium
@@ -2,10 +2,10 @@ title: SafetyKatz Default Dump Filename
id: e074832a-eada-4fd7-94a1-10642b130e16
status: test
description: Detects default lsass dump filename from SafetyKatz
author: Markus Neis
references:
- https://github.com/GhostPack/SafetyKatz
- https://github.com/GhostPack/SafetyKatz/blob/715b311f76eb3a4c8d00a1bd29c6cd1899e450b7/SafetyKatz/Program.cs#L63
author: Markus Neis
date: 2018/07/24
modified: 2021/11/27
tags:
@@ -2,13 +2,16 @@ title: GoToAssist Temporary Installation Artefact
id: 5d756aee-ad3e-4306-ad95-cb1abec48de2
status: experimental
description: |
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-4---gotoassist-files-detected-test-on-windows
author: frack113
date: 2022/02/13
tags:
- attack.command_and_control
- attack.t1219
logsource:
category: file_event
product: windows
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Legitimate use
level: medium
tags:
- attack.command_and_control
- attack.t1219
@@ -29,9 +29,9 @@ detection:
- TargetFilename:
- 'C:\windows\temp\sam' # C# version of HiveNightmare
condition: selection
falsepositives:
- Files that accidentally contain these strings
level: high
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Files that accidentally contain these strings
level: high
@@ -2,10 +2,10 @@ title: NPPSpy Hacktool Usage
id: cad1fe90-2406-44dc-bd03-59d0b58fe722
status: experimental
description: Detects the use of NPPSpy hacktool that stores cleartext passwords of users that logged in to a local file
author: Florian Roth
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md#atomic-test-2---credential-dumping-with-nppspy
- https://twitter.com/0gtweet/status/1465282548494487554
author: Florian Roth
date: 2021/11/29
tags:
- attack.credential_access
@@ -2,10 +2,13 @@ title: Installation of TeamViewer Desktop
id: 9711de76-5d4f-4c50-a94f-21e4e8f8384d
status: experimental
description: TeamViewer_Desktop.exe is create during install
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-1---teamviewer-files-detected-test-on-windows
author: frack113
date: 2022/01/28
tags:
- attack.command_and_control
- attack.t1219
logsource:
product: windows
category: file_event
@@ -16,6 +19,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.command_and_control
- attack.t1219
@@ -8,9 +8,14 @@ references:
- https://blog.cyble.com/2022/07/27/targeted-attacks-being-carried-out-via-dll-sideloading/
author: frack113
date: 2022/08/12
tags:
- attack.persistence
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1574.002
logsource:
category: file_event
product: windows
category: file_event
product: windows
detection:
selection:
TargetFilename|contains|all:
@@ -20,8 +25,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1574.002
@@ -2,7 +2,7 @@ title: ISO File Created Within Temp Folders
id: 2f9356ae-bf43-41b8-b858-4496d83b2acb
status: experimental
description: Detects the creation of a ISO file in the Outlook temp folder or in the Appdata temp folder. Typical of Qakbot TTP from end-July 2022.
references:
references:
- https://twitter.com/Sam0x90/status/1552011547974696960
- https://securityaffairs.co/wordpress/133680/malware/dll-sideloading-spread-qakbot.html
author: '@sam0x90'
@@ -1,13 +1,15 @@
title: ISO or Image Mount Indicator in Recent Files
id: 4358e5a5-7542-4dcb-b9f3-87667371839b
description: Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.
status: experimental
author: Florian Roth
description: |
Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks.
This can be a false positive on server systems but on workstations users should rarely mount .iso or .img files.
references:
- https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/
- https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore
- https://blog.emsisoft.com/en/32373/beware-new-wave-of-malware-spreads-via-iso-file-email-attachments/
- https://insights.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/
author: Florian Roth
date: 2022/02/11
logsource:
product: windows
@@ -1,11 +1,14 @@
title: Legitimate Application Dropped Archive
id: 654fcc6d-840d-4844-9b07-2c3300e54a26
description: Detects programs on a Windows system that should not write an archive to disk
status: experimental
author: frack113, Florian Roth
description: Detects programs on a Windows system that should not write an archive to disk
references:
- https://github.com/Neo23x0/sysmon-config/blob/3f808d9c022c507aae21a9346afba4a59dd533b9/sysmonconfig-export-block.xml#L1326
author: frack113, Florian Roth
date: 2022/08/21
tags:
- attack.defense_evasion
- attack.t1218
logsource:
product: windows
category: file_event
@@ -47,6 +50,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1218
@@ -1,11 +1,14 @@
title: Legitimate Application Dropped Executable
id: f0540f7e-2db3-4432-b9e0-3965486744bc
description: Detects programs on a Windows system that should not write executables to disk
status: experimental
author: frack113, Florian Roth
description: Detects programs on a Windows system that should not write executables to disk
references:
- https://github.com/Neo23x0/sysmon-config/blob/3f808d9c022c507aae21a9346afba4a59dd533b9/sysmonconfig-export-block.xml#L1326
author: frack113, Florian Roth
date: 2022/08/21
tags:
- attack.defense_evasion
- attack.t1218
logsource:
product: windows
category: file_event
@@ -45,6 +48,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1218
@@ -1,11 +1,14 @@
title: Legitimate Application Dropped Script
id: 7d604714-e071-49ff-8726-edeb95a70679
description: Detects programs on a Windows system that should not write scripts to disk
status: experimental
author: frack113, Florian Roth
description: Detects programs on a Windows system that should not write scripts to disk
references:
- https://github.com/Neo23x0/sysmon-config/blob/3f808d9c022c507aae21a9346afba4a59dd533b9/sysmonconfig-export-block.xml#L1326
author: frack113, Florian Roth
date: 2022/08/21
tags:
- attack.defense_evasion
- attack.t1218
logsource:
product: windows
category: file_event
@@ -47,6 +50,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1218
@@ -3,15 +3,15 @@ id: a5a2d357-1ab8-4675-a967-ef9990a59391
related:
- id: db2110f3-479d-42a6-94fb-d35bc1e46492
type: obsoletes
description: Detects file names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials
status: experimental
author: Florian Roth
description: Detects file names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials
references:
- https://www.google.com/search?q=procdump+lsass
- https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf
- https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml
- https://www.whiteoaksecurity.com/blog/attacks-defenses-dumping-lsass-no-mimikatz/
- https://github.com/helpsystems/nanodump
author: Florian Roth
date: 2021/11/15
modified: 2022/06/27
tags:
@@ -18,10 +18,10 @@ detection:
TargetFilename|contains: 'lsass'
TargetFilename|endswith: 'dmp'
condition: selection
fields:
- ComputerName
- TargetFilename
falsepositives:
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
- Dumps of another process that contains lsass in its process name (substring)
level: high
fields:
- ComputerName
- TargetFilename
@@ -1,10 +1,10 @@
title: WerFault LSASS Process Memory Dump
id: c3e76af5-4ce0-4a14-9c9a-25ceb8fda182
description: Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials
status: experimental
author: Florian Roth
description: Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials
references:
- https://github.com/helpsystems/nanodump
author: Florian Roth
date: 2022/06/27
tags:
- attack.credential_access
@@ -2,12 +2,15 @@ title: Dump Office Macro Files from Commandline
id: b1c50487-1967-4315-a026-6491686d860e
status: experimental
description: A office file with macro is created from a commandline or a script
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1566.001/T1566.001.md
- https://docs.microsoft.com/en-us/deployoffice/compat/office-file-format-reference
author: frack113
date: 2022/01/23
modified: 2022/07/14
tags:
- attack.initial_access
- attack.t1566.001
logsource:
category: file_event
product: windows
@@ -34,6 +37,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.initial_access
- attack.t1566.001
@@ -2,23 +2,23 @@ title: Octopus Scanner Malware
id: 805c55d9-31e6-4846-9878-c34c75054fe9
status: test
description: Detects Octopus Scanner Malware.
author: NVISO
references:
- https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
- https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
author: NVISO
date: 2020/06/09
modified: 2021/11/27
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith:
- '\AppData\Local\Microsoft\Cache134.dat'
- '\AppData\Local\Microsoft\ExplorerSync.db'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.t1195
- attack.t1195.001
- attack.t1195
- attack.t1195.001
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith:
- '\AppData\Local\Microsoft\Cache134.dat'
- '\AppData\Local\Microsoft\ExplorerSync.db'
condition: selection
falsepositives:
- Unknown
level: high
@@ -2,9 +2,9 @@ title: Mimikatz Kirbi File Creation
id: 9e099d99-44c2-42b6-a6d8-54c3545cab29
status: test
description: Detects the creation of files that contain Kerberos tickets based on an extension used by the popular tool Mimikatz
author: Florian Roth
references:
- https://cobalt.io/blog/kerberoast-attack-techniques
author: Florian Roth
date: 2021/11/08
tags:
- attack.credential_access
@@ -2,20 +2,20 @@ title: Mimikatz MemSSP Default Log File Creation
id: 034affe8-6170-11ec-844f-0f78aa0c4d66
status: experimental
description: Detects Mimikatz MemSSP default log file creation
author: David ANDRE
references:
- https://pentestlab.blog/2019/10/21/persistence-security-support-provider/
- https://pentestlab.blog/2019/10/21/persistence-security-support-provider/
author: David ANDRE
date: 2021/12/20
tags:
- attack.credential_access
- attack.t1003
- attack.credential_access
- attack.t1003
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: 'mimilsa.log'
condition: selection
selection:
TargetFilename|endswith: 'mimilsa.log'
condition: selection
falsepositives:
- Unlikely
- Unlikely
level: critical
@@ -1,11 +1,11 @@
title: MSDT.exe Creates Files in Autorun Directory
title: MSDT.exe Creates Files in Autorun Directory
id: 318557a5-150c-4c8d-b70e-a9910e199857
status: experimental
description: Detects msdt.exe creating files in suspicious directories
author: Vadim Varganov, Florian Roth
references:
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
- https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
author: Vadim Varganov, Florian Roth
date: 2022/08/24
tags:
- attack.persistence
@@ -17,7 +17,7 @@ logsource:
detection:
selection:
Image|endswith: '\msdt.exe'
TargetFilename|contains:
TargetFilename|contains:
- '\Start Menu\Programs\Startup\'
- 'C:\Users\Public\'
- 'C:\PerfLogs\'
@@ -2,10 +2,13 @@ title: Creation Suspicious File In Uncommon AppData Folder
id: d7b50671-d1ad-4871-aa60-5aa5b331fe04
status: experimental
description: Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used as a method to bypass detection who exclude the AppData folder in fear of FPs
author: Nasreddine Bencherchali
references:
- Internal Research
author: Nasreddine Bencherchali
date: 2022/08/05
tags:
- attack.defense_evasion
- attack.execution
logsource:
product: windows
category: file_event
@@ -31,6 +34,3 @@ detection:
falsepositives:
- Unlikely
level: high
tags:
- attack.defense_evasion
- attack.execution
@@ -2,30 +2,30 @@ title: SCR File Write Event
id: c048f047-7e2a-4888-b302-55f509d4a91d
status: experimental
description: An attacker may execute an application as a .SCR File (Screensaver) using rundll32.exe desk.cpl,InstallScreenSaver
author: 'Christopher Peacock @securepeacock, SCYTHE @scythe_io'
references:
- https://lolbas-project.github.io/lolbas/Libraries/Desk/
- https://lolbas-project.github.io/lolbas/Libraries/Desk/
author: 'Christopher Peacock @securepeacock, SCYTHE @scythe_io'
date: 2022/04/27
modified: 2022/10/07
tags:
- attack.t1218.011
- attack.defense_evasion
- attack.t1218.011
- attack.defense_evasion
logsource:
category: file_event
product: windows
category: file_event
product: windows
detection:
selection:
TargetFilename|endswith: '.scr'
filter:
TargetFilename|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\system32\'
- 'C:\Windows\SysWOW64\'
- 'C:\Windows\SysWow64\'
- 'C:\Windows\winsxs\'
- 'C:\Windows\WinSxS\'
- 'C:\$WINDOWS.~BT\NewOS\'
condition: selection and not filter
selection:
TargetFilename|endswith: '.scr'
filter:
TargetFilename|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\system32\'
- 'C:\Windows\SysWOW64\'
- 'C:\Windows\SysWow64\'
- 'C:\Windows\winsxs\'
- 'C:\Windows\WinSxS\'
- 'C:\$WINDOWS.~BT\NewOS\'
condition: selection and not filter
falsepositives:
- The installation of new screen savers.
- The installation of new screen savers.
level: medium
@@ -1,12 +1,14 @@
title: Persistence Via Notepad++ Plugins
id: 54127bd4-f541-4ac3-afdb-ea073f63f692
description: Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence
status: experimental
author: Nasreddine Bencherchali
description: Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence
references:
- https://pentestlab.blog/2022/02/14/persistence-notepad-plugins/
author: Nasreddine Bencherchali
date: 2022/06/10
modified: 2022/09/20
tags:
- attack.persistence
logsource:
product: windows
category: file_event
@@ -28,5 +30,3 @@ falsepositives:
- Possible FPs during first installation of Notepad++
- Legitimate use of custom plugins to enhance notepad++ functionality by users
level: medium
tags:
- attack.persistence
@@ -1,13 +1,13 @@
title: Suspicious NTDS.DIT Creation
id: 4e7050dd-e548-483f-b7d6-527ab4fa784d
description: Detects suspicious creations of a file named ntds.dit, e.g. by a PowerShell parent or in a suspicious directory or a suspicious one liner
status: experimental
author: Florian Roth
description: Detects suspicious creations of a file named ntds.dit, e.g. by a PowerShell parent or in a suspicious directory or a suspicious one liner
references:
- https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration
- https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/
- https://pentestlab.blog/tag/ntds-dit/
- https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1
author: Florian Roth
date: 2022/03/11
modified: 2022/07/14
tags:
@@ -1,12 +1,12 @@
title: Suspicious NTDS Exfil Filename Patterns
id: 3a8da4e0-36c1-40d2-8b29-b3e890d5172a
description: Detects suspicious creations of files with names used in various tools that export the NTDS.DIT for exfiltration
status: experimental
author: Florian Roth
description: Detects suspicious creations of files with names used in various tools that export the NTDS.DIT for exfiltration
references:
- https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/modules/post/windows/gather/ntds_grabber.rb
- https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/data/post/powershell/NTDSgrab.ps1
- https://github.com/SecureAuthCorp/impacket/blob/7d2991d78836b376452ca58b3d14daa61b67cb40/impacket/examples/secretsdump.py#L2405
author: Florian Roth
date: 2022/03/11
tags:
- attack.credential_access
@@ -2,30 +2,30 @@ title: Microsoft Office Add-In Loading
id: 8e1cb247-6cf6-42fa-b440-3f27d57e9936
status: test
description: Detects add-ins that load when Microsoft Word or Excel starts (.wll/.xll are simply .dll fit for Word or Excel).
author: NVISO
references:
- Internal Research
- Internal Research
author: NVISO
date: 2020/05/11
modified: 2021/11/27
logsource:
category: file_event
product: windows
detection:
selection_wlldropped:
TargetFilename|contains: '\Microsoft\Word\Startup\'
TargetFilename|endswith: '.wll'
selection_xlldropped:
TargetFilename|contains: '\Microsoft\Excel\Startup\'
TargetFilename|endswith: '.xll'
selection_generic:
TargetFilename|contains: '\Microsoft\Addins\'
TargetFilename|endswith:
- '.xlam'
- '.xla'
condition: 1 of selection*
falsepositives:
- Legitimate add-ins
level: high
tags:
- attack.persistence
- attack.t1137.006
- attack.persistence
- attack.t1137.006
logsource:
category: file_event
product: windows
detection:
selection_wlldropped:
TargetFilename|contains: '\Microsoft\Word\Startup\'
TargetFilename|endswith: '.wll'
selection_xlldropped:
TargetFilename|contains: '\Microsoft\Excel\Startup\'
TargetFilename|endswith: '.xll'
selection_generic:
TargetFilename|contains: '\Microsoft\Addins\'
TargetFilename|endswith:
- '.xlam'
- '.xla'
condition: 1 of selection*
falsepositives:
- Legitimate add-ins
level: high
@@ -1,7 +1,10 @@
title: Outlook C2 Macro Creation
id: 8c31f563-f9a7-450c-bfa8-35f8f32f1f61
status: test
description: Detects the creation of a macro file for Outlook. Goes with win_outlook_c2_registry_key. VbaProject.OTM is explicitly mentioned in T1137. Particularly interesting if both events Registry & File Creation happens at the same time.
description: |
Detects the creation of a macro file for Outlook.
Goes with win_outlook_c2_registry_key. VbaProject.OTM is explicitly mentioned in T1137.
Particularly interesting if both events Registry & File Creation happens at the same time.
references:
- https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/
author: '@ScoubiMtl'
@@ -4,12 +4,12 @@ status: experimental
description: Detects the creation of new Outlook form which can contain malicious code
references:
- https://twitter.com/blueteamsec1/status/1401290874202382336?s=20
tags:
- attack.persistence
- attack.t1137.003
author: Tobias Michalski
date: 2021/06/10
modified: 2022/06/16
tags:
- attack.persistence
- attack.t1137.003
logsource:
product: windows
category: file_event
+4 -4
View File
@@ -2,7 +2,6 @@ title: Malicious PowerShell Commandlet Names
id: f331aa1f-8c53-4fc3-b083-cc159bc971cb
status: test
description: Detects the creation of known powershell scripts for exploitation
author: Markus Neis, Nasreddine Bencherchali
references:
- https://raw.githubusercontent.com/Neo23x0/sigma/f35c50049fa896dff91ff545cb199319172701e8/rules/windows/powershell/powershell_malicious_commandlets.yml
- https://github.com/PowerShellMafia/PowerSploit
@@ -15,8 +14,12 @@ references:
- https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1
- https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1
- https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1
author: Markus Neis, Nasreddine Bencherchali
date: 2018/04/07
modified: 2022/10/25
tags:
- attack.execution
- attack.t1059.001
logsource:
category: file_event
product: windows
@@ -214,6 +217,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.execution
- attack.t1059.001
@@ -1,16 +1,20 @@
title: PowerShell Writing Startup Shortcuts
id: 92fa78e7-4d39-45f1-91a3-8b23f3f1088d
description: Attempts to detect PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence. Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats. In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"
status: experimental
description: |
Attempts to detect PowerShell writing startup shortcuts.
This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence.
Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats.
In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"
references:
- https://redcanary.com/blog/intelligence-insights-october-2021/
- https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1547.001/T1547.001.md#atomic-test-7---add-executable-shortcut-link-to-user-startup-folder
author: Christopher Peacock '@securepeacock', SCYTHE
date: 2021/10/24
modified: 2022/08/10
tags:
- attack.persistence
- attack.t1547.001
date: 2021/10/24
modified: 2022/08/10
author: Christopher Peacock '@securepeacock', SCYTHE
logsource:
product: windows
category: file_event
@@ -2,24 +2,24 @@ title: QuarksPwDump Dump File
id: 847def9e-924d-4e90-b7c4-5f581395a2b4
status: test
description: Detects a dump file written by QuarksPwDump password dumper
author: Florian Roth
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm
author: Florian Roth
date: 2018/02/10
modified: 2021/11/27
logsource:
category: file_event
product: windows
detection:
selection:
# Sysmon: File Creation (ID 11)
TargetFilename|contains|all:
- '\AppData\Local\Temp\SAM-'
- '.dmp'
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.credential_access
- attack.t1003.002
- attack.credential_access
- attack.t1003.002
logsource:
category: file_event
product: windows
detection:
selection:
# Sysmon: File Creation (ID 11)
TargetFilename|contains|all:
- '\AppData\Local\Temp\SAM-'
- '.dmp'
condition: selection
falsepositives:
- Unknown
level: critical
@@ -2,24 +2,24 @@ title: RedMimicry Winnti Playbook Dropped File
id: 130c9e58-28ac-4f83-8574-0a4cc913b97e
status: test
description: Detects actions caused by the RedMimicry Winnti playbook
author: Alexander Rausch
references:
- https://redmimicry.com
- https://redmimicry.com
author: Alexander Rausch
date: 2020/06/24
modified: 2021/11/27
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- gthread-3.6.dll
- sigcmm-2.4.dll
- \Windows\Temp\tmp.bat
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1027
- attack.defense_evasion
- attack.t1027
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- gthread-3.6.dll
- sigcmm-2.4.dll
- \Windows\Temp\tmp.bat
condition: selection
falsepositives:
- Unknown
level: high
@@ -1,14 +1,14 @@
title: SAM Dump File Creation
id: 4e87b8e2-2ee9-4b2a-a715-4727d297ece0
description: Detects the creation of files that look like exports of the local SAM (Security Account Manager)
status: experimental
author: Florian Roth
description: Detects the creation of files that look like exports of the local SAM (Security Account Manager)
references:
- https://github.com/search?q=CVE-2021-36934
- https://github.com/cube0x0/CVE-2021-36934
- https://www.google.com/search?q=%22reg.exe+save%22+sam
- https://github.com/HuskyHacks/ShadowSteal
- https://github.com/FireFart/hivenightmare
author: Florian Roth
date: 2022/02/11
tags:
- attack.credential_access
@@ -18,7 +18,7 @@ logsource:
category: file_event
detection:
selection:
- TargetFilename|endswith:
- TargetFilename|endswith:
- '\Temp\sam'
- '\sam.sav'
- '\Intel\sam'
@@ -2,13 +2,16 @@ title: ScreenConnect Temporary Installation Artefact
id: fec96f39-988b-4586-b746-b93d59fd1922
status: experimental
description: |
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-5---screenconnect-application-download-and-install-on-windows
author: frack113
date: 2022/02/13
tags:
- attack.command_and_control
- attack.t1219
logsource:
category: file_event
product: windows
@@ -19,6 +22,3 @@ detection:
falsepositives:
- Legitimate use
level: medium
tags:
- attack.command_and_control
- attack.t1219
@@ -1,16 +1,16 @@
title: Created Files by Office Applications
id: c7a74c80-ba5a-486e-9974-ab9e682bc5e4
status: experimental
description: This rule will monitor executable and script file creation by office applications. Please add more file extensions or magic bytes to the logic of your choice.
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: 'Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)'
date: 2021/08/23
modified: 2022/07/11
tags:
- attack.t1204.002
- attack.execution
status: experimental
date: 2021/08/23
modified: 2022/07/11
logsource:
product: windows
category: file_event
@@ -2,12 +2,15 @@ title: Startup Folder File Write
id: 2aa0a6b4-a865-495b-ab51-c28249537b75
status: test
description: A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/12
- https://threathunterplaybook.com/evals/apt29/detections/5.B.1_611FCA99-97D0-4873-9E51-1C1BA2DBB40D.html
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/05/02
modified: 2022/10/07
tags:
- attack.persistence
- attack.t1547.001
logsource:
product: windows
category: file_event
@@ -21,6 +24,3 @@ detection:
falsepositives:
- An FP could be caused by legitimate application writing shortcuts for example. This folder should always be inspected to make sure that all the files in there are legitimate
level: medium
tags:
- attack.persistence
- attack.t1547.001
@@ -2,13 +2,16 @@ title: Suspicious ADSI-Cache Usage By Unknown Tool
id: 75bf09fa-1dd7-4d18-9af9-dd9e492562eb
status: test
description: Detects the usage of ADSI (LDAP) operations by tools. This may also detect tools like LDAPFragger.
author: xknow @xknow_infosec, Tim Shelton
references:
- https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961
- https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
- https://github.com/fox-it/LDAPFragger
author: xknow @xknow_infosec, Tim Shelton
date: 2019/03/24
modified: 2022/08/24
tags:
- attack.t1001.003
- attack.command_and_control
logsource:
product: windows
category: file_event
@@ -39,6 +42,3 @@ detection:
falsepositives:
- Other legimate tools, which do ADSI (LDAP) operations, e.g. any remoting activity by MMC, Powershell, Windows etc.
level: high
tags:
- attack.t1001.003
- attack.command_and_control
@@ -2,10 +2,13 @@ title: Suspicious Creation with Colorcpl
id: e15b518d-b4ce-4410-a9cd-501f23ce4a18
status: experimental
description: Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\
author: frack113
references:
- https://twitter.com/eral4m/status/1480468728324231172?s=20
author: frack113
date: 2022/01/21
tags:
- attack.defense_evasion
- attack.t1564
logsource:
product: windows
category: file_event
@@ -22,6 +25,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1564
@@ -1,13 +1,17 @@
title: Created Files by Microsoft Sync Center
id: 409f8a98-4496-4aaa-818a-c931c0a8b832
status: experimental
description: This rule detects suspicious files created by Microsoft Sync Center (mobsync)
references:
- https://redcanary.com/blog/intelligence-insights-november-2021/
author: elhoim
status: experimental
level: medium
date: 2022/04/28
modified: 2022/06/02
tags:
- attack.t1055
- attack.t1218
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: file_event
@@ -21,8 +25,4 @@ detection:
condition: selection_mobsync and filter_created_file
falsepositives:
- Unknown
tags:
- attack.t1055
- attack.t1218
- attack.execution
- attack.defense_evasion
level: medium
@@ -6,6 +6,9 @@ references:
- https://redcanary.com/blog/intelligence-insights-november-2021/
author: elhoim
date: 2022/04/28
tags:
- attack.t1036.005
- attack.defense_evasion
logsource:
product: windows
category: file_event
@@ -18,7 +21,4 @@ detection:
condition: selection
falsepositives:
- Unknown
tags:
- attack.t1036.005
- attack.defense_evasion
level: medium
@@ -2,11 +2,14 @@ title: Suspicious desktop.ini Action
id: 81315b50-6b60-4d8f-9928-3466e1022515
status: test
description: Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.
author: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO)
references:
- https://isc.sans.edu/forums/diary/Desktopini+as+a+postexploitation+tool/25912/
author: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO)
date: 2020/03/19
modified: 2022/10/07
tags:
- attack.persistence
- attack.t1547.009
logsource:
product: windows
category: file_event
@@ -28,6 +31,3 @@ falsepositives:
- Operations performed through Windows SCCM or equivalent
- Read only access list authority
level: medium
tags:
- attack.persistence
- attack.t1547.009
@@ -2,10 +2,13 @@ title: Suspicious Creation TXT File in User Desktop
id: caf02a0a-1e1c-4552-9b48-5e070bd88d11
status: experimental
description: Ransomware create txt file in the user Desktop
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1486/T1486.md#atomic-test-5---purelocker-ransom-note
author: frack113
date: 2021/12/26
tags:
- attack.impact
- attack.t1486
logsource:
product: windows
category: file_event
@@ -20,6 +23,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.impact
- attack.t1486
@@ -2,33 +2,33 @@ title: Suspicious Desktopimgdownldr Target File
id: fc4f4817-0c53-4683-a4ee-b17a64bc1039
status: test
description: Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension
author: Florian Roth
references:
- https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/
- https://twitter.com/SBousseaden/status/1278977301745741825
- https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/
- https://twitter.com/SBousseaden/status/1278977301745741825
author: Florian Roth
date: 2020/07/03
modified: 2022/06/02
logsource:
product: windows
category: file_event
detection:
selection:
Image|endswith: '\svchost.exe'
TargetFilename|contains: '\Personalization\LockScreenImage\'
filter1:
TargetFilename|contains: 'C:\Windows\'
filter2:
TargetFilename|contains:
- '.jpg'
- '.jpeg'
- '.png'
condition: selection and not filter1 and not filter2
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: high
tags:
- attack.defense_evasion
- attack.t1105
- attack.defense_evasion
- attack.t1105
logsource:
product: windows
category: file_event
detection:
selection:
Image|endswith: '\svchost.exe'
TargetFilename|contains: '\Personalization\LockScreenImage\'
filter1:
TargetFilename|contains: 'C:\Windows\'
filter2:
TargetFilename|contains:
- '.jpg'
- '.jpeg'
- '.png'
condition: selection and not filter1 and not filter2
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: high
@@ -2,19 +2,19 @@ title: Creation of a Diagcab
id: 3d0ed417-3d94-4963-a562-4a92c940656a
status: experimental
description: Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)
author: frack113
references:
- https://threadreaderapp.com/thread/1533879688141086720.html
- https://threadreaderapp.com/thread/1533879688141086720.html
author: frack113
date: 2022/06/08
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '.diagcab'
condition: selection
falsepositives:
- Legitimate microsoft diagcab
level: medium
tags:
- attack.resource_development
- attack.resource_development
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '.diagcab'
condition: selection
falsepositives:
- Legitimate microsoft diagcab
level: medium
@@ -5,15 +5,18 @@ related:
type: derived
status: experimental
description: Detects dropped files with double extensions which is often used by malware as a method to abuse the fact that windows hide default extensions by default.
author: Nasreddine Bencherchali, frack113
references:
- https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/
- https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
- https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles
- https://twitter.com/malwrhunterteam/status/1235135745611960321
- https://twitter.com/luc4m/status/1073181154126254080
author: Nasreddine Bencherchali, frack113
date: 2022/06/19
modified: 2022/07/28
tags:
- attack.defense_evasion
- attack.t1036.007
logsource:
category: file_event
product: windows
@@ -36,7 +39,7 @@ detection:
selection_exe:
TargetFilename|endswith:
- '.zip.exe'
- '.rar.exe'
- '.rar.exe'
filter:
TargetFilename|contains:
- '\AppData\Roaming\Microsoft\Office\Recent\'
@@ -45,7 +48,3 @@ detection:
falsepositives:
- Unlikely
level: high
tags:
- attack.defense_evasion
- attack.t1036.007
@@ -2,50 +2,50 @@ title: Creation of an Executable by an Executable
id: 297afac9-5d02-4138-8c58-b977bac60556
status: experimental
description: Detects the creation of an executable by another executable
author: frack113
references:
- Malware Sandbox
- Malware Sandbox
author: frack113
date: 2022/03/09
modified: 2022/07/27
tags:
- attack.resource_development
- attack.t1587.001
logsource:
product: windows
category: file_event
product: windows
category: file_event
detection:
selection:
Image|endswith: '.exe'
TargetFilename|endswith: '.exe'
filter_whitelist:
Image:
- 'C:\Windows\System32\msiexec.exe'
- 'C:\Windows\system32\cleanmgr.exe'
- 'C:\Windows\explorer.exe'
- 'C:\WINDOWS\system32\dxgiadaptercache.exe'
- 'C:\WINDOWS\system32\Dism.exe'
- 'C:\Windows\System32\wuauclt.exe'
filter_update:
Image: 'C:\WINDOWS\system32\svchost.exe'
TargetFilename|startswith: 'C:\Windows\SoftwareDistribution\Download\Install\'
selection:
Image|endswith: '.exe'
TargetFilename|endswith: '.exe'
filter_whitelist:
Image:
- 'C:\Windows\System32\msiexec.exe'
- 'C:\Windows\system32\cleanmgr.exe'
- 'C:\Windows\explorer.exe'
- 'C:\WINDOWS\system32\dxgiadaptercache.exe'
- 'C:\WINDOWS\system32\Dism.exe'
- 'C:\Windows\System32\wuauclt.exe'
filter_update:
Image: 'C:\WINDOWS\system32\svchost.exe'
TargetFilename|startswith: 'C:\Windows\SoftwareDistribution\Download\Install\'
# Security_UserID: S-1-5-18
filter_tiworker:
Image|startswith: 'C:\Windows\WinSxS\'
Image|endswith: '\TiWorker.exe'
filter_programfiles:
- Image|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
- TargetFilename|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
filter_defender:
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\'
filter_windows_apps:
TargetFilename|contains: '\Microsoft\WindowsApps\'
condition: selection and not 1 of filter_*
filter_tiworker:
Image|startswith: 'C:\Windows\WinSxS\'
Image|endswith: '\TiWorker.exe'
filter_programfiles:
- Image|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
- TargetFilename|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
filter_defender:
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\'
filter_windows_apps:
TargetFilename|contains: '\Microsoft\WindowsApps\'
condition: selection and not 1 of filter_*
falsepositives:
- Software installers
- Update utilities
- Software installers
- Update utilities
#Please contribute to FP to go up the level
level: low
tags:
- attack.resource_development
- attack.t1587.001
@@ -17,7 +17,7 @@ logsource:
detection:
selection:
Image|endswith: '\MSExchangeMailboxReplication.exe'
TargetFilename|endswith:
TargetFilename|endswith:
- '.aspx'
- '.asp'
condition: selection
@@ -2,30 +2,30 @@ title: Suspicious Executable File Creation
id: 74babdd6-a758-4549-9632-26535279e654
status: experimental
description: Detect creation of suspicious executable file name. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.
author: frack113
references:
- https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
- https://app.any.run/tasks/76c69e2d-01e8-49d9-9aea-fb7cc0c4d3ad/
- https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
- https://app.any.run/tasks/76c69e2d-01e8-49d9-9aea-fb7cc0c4d3ad/
author: frack113
date: 2022/09/05
logsource:
product: windows
category: file_event
detection:
selection_double:
TargetFilename|endswith:
- '.bat.exe'
- '.sys.exe'
selection_folder:
TargetFilename:
- 'C:\$Recycle.Bin.exe'
- 'C:\Documents and Settings.exe'
- 'C:\MSOCache.exe'
- 'C:\Recovery.exe'
- 'C:\PerfLogs.exe'
condition: 1 of selection_*
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1564
- attack.defense_evasion
- attack.t1564
logsource:
product: windows
category: file_event
detection:
selection_double:
TargetFilename|endswith:
- '.bat.exe'
- '.sys.exe'
selection_folder:
TargetFilename:
- 'C:\$Recycle.Bin.exe'
- 'C:\Documents and Settings.exe'
- 'C:\MSOCache.exe'
- 'C:\Recovery.exe'
- 'C:\PerfLogs.exe'
condition: 1 of selection_*
falsepositives:
- Unknown
level: high
@@ -1,28 +1,27 @@
title: Suspicious Get-Variable.exe Creation
title: Suspicious Get-Variable.exe Creation
id: 0c3fac91-5627-46e8-a6a8-a0d7b9b8ae1b
status: experimental
description: |
Get-Variable is a valid PowerShell cmdlet
WindowsApps is by default in the path where PowerShell is executed.
So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.
author: frack113
Get-Variable is a valid PowerShell cmdlet
WindowsApps is by default in the path where PowerShell is executed.
So when the Get-Variable command is issued on PowerShell execution, the system first looks for the Get-Variable executable in the path and executes the malicious binary instead of looking for the PowerShell cmdlet.
references:
- https://blog.malwarebytes.com/threat-intelligence/2022/04/colibri-loader-combines-task-scheduler-and-powershell-in-clever-persistence-technique/
- https://www.joesandbox.com/analysis/465533/0/html
- https://blog.malwarebytes.com/threat-intelligence/2022/04/colibri-loader-combines-task-scheduler-and-powershell-in-clever-persistence-technique/
- https://www.joesandbox.com/analysis/465533/0/html
author: frack113
date: 2022/04/23
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: 'Local\Microsoft\WindowsApps\Get-Variable.exe'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.t1546
- attack.defense_evasion
- attack.t1027
- attack.persistence
- attack.t1546
- attack.defense_evasion
- attack.t1027
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: 'Local\Microsoft\WindowsApps\Get-Variable.exe'
condition: selection
falsepositives:
- Unknown
level: high
@@ -2,26 +2,26 @@ title: Suspicious PFX File Creation
id: dca1b3e8-e043-4ec8-85d7-867f334b5724
status: test
description: A general detection for processes creating PFX files. This could be an indicator of an adversary exporting a local certificate to a PFX file.
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/14
- https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html
- https://github.com/OTRF/detection-hackathon-apt29/issues/14
- https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/05/02
modified: 2022/07/07
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '.pfx'
filter:
TargetFilename|contains|all:
- '\Templates\Windows\Windows_TemporaryKey.pfx'
- '\CMake\'
condition: selection and not 1 of filter*
falsepositives:
- System administrators managing certififcates.
level: medium
tags:
- attack.credential_access
- attack.t1552.004
- attack.credential_access
- attack.t1552.004
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '.pfx'
filter:
TargetFilename|contains|all:
- '\Templates\Windows\Windows_TemporaryKey.pfx'
- '\CMake\'
condition: selection and not 1 of filter*
falsepositives:
- System administrators managing certififcates.
level: medium
@@ -2,12 +2,16 @@ title: PowerShell Profile Modification
id: b5b78988-486d-4a80-b991-930eff3ff8bf
status: test
description: Detects the creation or modification of a powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence
author: HieuTT35, Nasreddine Bencherchali
references:
- https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/
- https://persistence-info.github.io/Data/powershellprofile.html
author: HieuTT35, Nasreddine Bencherchali
date: 2019/10/24
modified: 2022/08/24
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1546.013
logsource:
product: windows
category: file_event
@@ -23,7 +27,3 @@ detection:
falsepositives:
- System administrator create Powershell profile manually
level: high
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1546.013
@@ -1,29 +1,31 @@
title: Suspicious PROCEXP152.sys File Created In TMP
id: 3da70954-0f2c-4103-adff-b7440368f50e
status: test
description: Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.
author: xknow (@xknow_infosec), xorxes (@xor_xes)
description: |
Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder.
This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) or Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs), which uses KDU.
references:
- https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
- https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
author: xknow (@xknow_infosec), xorxes (@xor_xes)
date: 2019/04/08
modified: 2021/11/27
logsource:
product: windows
category: file_event
detection:
selection_1:
TargetFilename|contains: '\AppData\Local\Temp\'
TargetFilename|endswith: 'PROCEXP152.sys'
selection_2:
Image|contains:
- '\procexp64.exe'
- '\procexp.exe'
- '\procmon64.exe'
- '\procmon.exe'
condition: selection_1 and not selection_2
falsepositives:
- Other legimate tools using this driver and filename (like Sysinternals). Note - Clever attackers may easily bypass this detection by just renaming the driver filename. Therefore just Medium-level and don't rely on it.
level: medium
tags:
- attack.t1562.001
- attack.defense_evasion
- attack.t1562.001
- attack.defense_evasion
logsource:
product: windows
category: file_event
detection:
selection_1:
TargetFilename|contains: '\AppData\Local\Temp\'
TargetFilename|endswith: 'PROCEXP152.sys'
selection_2:
Image|contains:
- '\procexp64.exe'
- '\procexp.exe'
- '\procmon64.exe'
- '\procmon.exe'
condition: selection_1 and not selection_2
falsepositives:
- Other legimate tools using this driver and filename (like Sysinternals). Note - Clever attackers may easily bypass this detection by just renaming the driver filename. Therefore just Medium-level and don't rely on it.
level: medium
@@ -2,10 +2,12 @@ title: Drop Binaries Into Spool Drivers Color Folder
id: ce7066a6-508a-42d3-995b-2952c65dc2ce
status: experimental
description: Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below
author: Nasreddine Bencherchali
references:
- https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/
author: Nasreddine Bencherchali
date: 2022/07/28
tags:
- attack.defense_evasion
logsource:
product: windows
category: file_event
@@ -20,5 +22,3 @@ detection:
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
@@ -1,14 +1,14 @@
title: Suspicious Startup Folder Persistence
id: 28208707-fe31-437f-9a7f-4b1108b94d2e
description: Detects when a file with a suspicious extension is created in the startup folder
status: experimental
author: Nasreddine Bencherchali
description: Detects when a file with a suspicious extension is created in the startup folder
references:
- https://github.com/last-byte/PersistenceSniper
author: Nasreddine Bencherchali
date: 2022/08/10
tags:
- attack.persistence
- attack.t1547.001
date: 2022/08/10
logsource:
product: windows
category: file_event
@@ -2,9 +2,9 @@ title: Suspicious Interactive PowerShell as SYSTEM
id: 5b40a734-99b6-4b98-a1d0-1cea51a08ab2
status: experimental
description: Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context
author: Florian Roth
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/PowerSploit_Invoke-Mimikatz.htm
author: Florian Roth
date: 2021/12/07
modified: 2022/08/13
logsource:
@@ -10,14 +10,14 @@ modified: 2022/01/12
tags:
- attack.persistence
- attack.execution
- attack.t1053
- attack.t1053
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains: '\Windows\System32\Tasks'
Image|contains:
Image|contains:
- '\AppData\'
- 'C:\PerfLogs'
- '\Windows\System32\config\systemprofile'
@@ -5,10 +5,14 @@ related:
type: similar
status: experimental
description: Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence
author: Nasreddine Bencherchali
references:
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_profiles?view=powershell-7.2
author: Nasreddine Bencherchali
date: 2022/08/24
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1546.013
logsource:
product: windows
category: file_event
@@ -19,7 +23,3 @@ detection:
falsepositives:
- Legitimate use of the profile by developers or administrators
level: high
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1546.013
@@ -2,30 +2,30 @@ title: Creation In User Word Startup Folder
id: a10a2c40-2c4d-49f8-b557-1a946bc55d9d
status: experimental
description: Detects the creation of an file in user Word Startup
author: frack113
references:
- Malware Sandbox https://app.any.run/tasks/d6fe6624-6ef8-485d-aa75-3d1bdda2a08c/
- Malware Sandbox https://app.any.run/tasks/d6fe6624-6ef8-485d-aa75-3d1bdda2a08c/
author: frack113
date: 2022/06/05
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains: '\AppData\Roaming\Microsoft\Word\STARTUP\'
filter_ext:
TargetFilename|endswith:
- '.docx' # Word document
- '.docm' # Word macro-enabled document; same as docx, but may contain macros and scripts
- '.dotx' # Word template
- '.dotm' # Word macro-enabled template; same as dotx, but may contain macros and scripts
- '.docb' # Word binary document introduced in Microsoft Office 2007
- '.pdf' # PDF documents
- '.wll' # Word add-in
- '.wwl' # Word add-in
condition: selection and not filter_ext
falsepositives:
- Addition of legitimate plugins
level: medium
tags:
- attack.resource_development
- attack.t1587.001
- attack.resource_development
- attack.t1587.001
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains: '\AppData\Roaming\Microsoft\Word\STARTUP\'
filter_ext:
TargetFilename|endswith:
- '.docx' # Word document
- '.docm' # Word macro-enabled document; same as docx, but may contain macros and scripts
- '.dotx' # Word template
- '.dotm' # Word macro-enabled template; same as dotx, but may contain macros and scripts
- '.docb' # Word binary document introduced in Microsoft Office 2007
- '.pdf' # PDF documents
- '.wll' # Word add-in
- '.wwl' # Word add-in
condition: selection and not filter_ext
falsepositives:
- Addition of legitimate plugins
level: medium
@@ -22,9 +22,6 @@ detection:
selection:
TargetFilename|endswith: '\PSEXESVC.exe'
condition: selection
falsepositives:
- Unknown
level: low
fields:
- EventID
- CommandLine
@@ -33,3 +30,6 @@ fields:
- ServiceFileName
- TargetFilename
- PipeName
falsepositives:
- Unknown
level: low
@@ -5,6 +5,9 @@ description: Detects the usage of tsclient share to place a backdoor on the RDP
author: Samir Bousseaden
date: 2019/02/21
modified: 2021/11/27
tags:
- attack.command_and_control
- attack.t1219
logsource:
product: windows
category: file_event
@@ -16,6 +19,3 @@ detection:
falsepositives:
- Unlikely
level: high
tags:
- attack.command_and_control
- attack.t1219
@@ -1,13 +1,13 @@
title: UAC Bypass Using EventVwr
id: 63e4f530-65dc-49cc-8f80-ccfa95c69d43
description: Detects the pattern of a UAC bypass using Windows Event Viewer
author: Antonio Cocomazzi (idea), Florian Roth (rule)
date: 2022/04/27
modified: 2022/04/27
status: experimental
description: Detects the pattern of a UAC bypass using Windows Event Viewer
references:
- https://twitter.com/orange_8361/status/1518970259868626944?s=20&t=RFXqZjtA7tWM3HxqEH78Aw
- https://twitter.com/splinter_code/status/1519075134296006662?s=12&t=DLUXH86WtcmG_AZ5gY3C6g
author: Antonio Cocomazzi (idea), Florian Roth (rule)
date: 2022/04/27
modified: 2022/04/27
tags:
- attack.defense_evasion
- attack.privilege_escalation
@@ -2,10 +2,15 @@ title: UAC Bypass Using IDiagnostic Profile - File
id: 48ea844d-19b1-4642-944e-fe39c2cc1fec
status: experimental
description: Detects the creation of a file by "dllhost.exe" in System32 directory part of "IDiagnosticProfileUAC" UAC bypass technique
author: Nasreddine Bencherchali
references:
- https://github.com/Wh04m1001/IDiagnosticProfileUAC
author: Nasreddine Bencherchali
date: 2022/07/03
tags:
- attack.execution
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
logsource:
product: windows
category: file_event
@@ -18,8 +23,3 @@ detection:
falsepositives:
- Unknown
level: high
tags:
- attack.execution
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
@@ -2,41 +2,41 @@ title: Windows Webshell Creation
id: 39f1f9f2-9636-45de-98f6-a4046aa8e4b9
status: test
description: Possible webshell file creation on a static web site
author: Beyu Denis, oscd.community, Tim Shelton
references:
- PT ESC rule and personal experience
- PT ESC rule and personal experience
author: Beyu Denis, oscd.community, Tim Shelton
date: 2019/10/22
modified: 2022/09/18
logsource:
product: windows
category: file_event
detection:
selection_wwwroot:
TargetFilename|contains: '\inetpub\wwwroot\'
selection_ext1:
TargetFilename|contains:
- '.asp'
- '.ashx'
- '.ph'
selection_static:
TargetFilename|contains:
- '\www\'
- '\htdocs\'
- '\html\'
selection_ext2:
TargetFilename|contains: '.ph'
false_positive1: # false positives when unpacking some executables in $TEMP
TargetFilename|contains:
- '\AppData\Local\Temp\'
- '\Windows\Temp\'
false_positive_system:
Image: 'System' # fp : backup/restore from drivers
false_positive_legitimate:
TargetFilename|contains: '\xampp'
condition: ((selection_wwwroot and selection_ext1) or (selection_static and selection_ext2)) and not 1 of false_positive*
falsepositives:
- Legitimate administrator or developer creating legitimate executable files in a web application folder
level: high
tags:
- attack.persistence
- attack.t1505.003
- attack.persistence
- attack.t1505.003
logsource:
product: windows
category: file_event
detection:
selection_wwwroot:
TargetFilename|contains: '\inetpub\wwwroot\'
selection_ext1:
TargetFilename|contains:
- '.asp'
- '.ashx'
- '.ph'
selection_static:
TargetFilename|contains:
- '\www\'
- '\htdocs\'
- '\html\'
selection_ext2:
TargetFilename|contains: '.ph'
false_positive1: # false positives when unpacking some executables in $TEMP
TargetFilename|contains:
- '\AppData\Local\Temp\'
- '\Windows\Temp\'
false_positive_system:
Image: 'System' # fp : backup/restore from drivers
false_positive_legitimate:
TargetFilename|contains: '\xampp'
condition: ((selection_wwwroot and selection_ext1) or (selection_static and selection_ext2)) and not 1 of false_positive*
falsepositives:
- Legitimate administrator or developer creating legitimate executable files in a web application folder
level: high
@@ -2,28 +2,28 @@ title: Creation of an WerFault.exe in Unusual Folder
id: 28a452f3-786c-4fd8-b8f2-bddbe9d616d1
status: experimental
description: Detects WerFault copoed to a suspicious folder, which could be a sign of WerFault DLL hijacking
author: frack113
references:
- https://www.bleepingcomputer.com/news/security/hackers-are-now-hiding-malware-in-windows-event-logs/
- https://www.bleepingcomputer.com/news/security/hackers-are-now-hiding-malware-in-windows-event-logs/
author: frack113
date: 2022/05/09
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith:
- '\WerFault.exe'
- '\wer.dll'
filter_whitelist:
TargetFilename|contains:
- '\System32\'
- '\SysWOW64\'
- '\WinSxS\'
condition: selection and not filter_whitelist
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.defense_evasion
- attack.t1574.001
- attack.persistence
- attack.defense_evasion
- attack.t1574.001
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith:
- '\WerFault.exe'
- '\wer.dll'
filter_whitelist:
TargetFilename|contains:
- '\System32\'
- '\SysWOW64\'
- '\WinSxS\'
condition: selection and not filter_whitelist
falsepositives:
- Unknown
level: high
@@ -1,10 +1,10 @@
title: WScript or CScript Dropper
id: 002bdb95-0cf1-46a6-9e08-d38c128a6127
status: experimental
description: Detects a file ending in jse, vbe, js, vba, vbs written by cscript.exe or wscript.exe
related:
related:
- id: cea72823-df4d-4567-950c-0b579eaf0846
type: derived
status: experimental
description: Detects a file ending in jse, vbe, js, vba, vbs written by cscript.exe or wscript.exe
references:
- WScript or CScript Dropper (cea72823-df4d-4567-950c-0b579eaf0846)
author: Tim Shelton
@@ -18,10 +18,10 @@ detection:
Image|endswith:
- '\wscript.exe'
- '\cscript.exe'
TargetFilename|startswith:
TargetFilename|startswith:
- 'C:\Users\'
- 'C:\ProgramData'
TargetFilename|endswith:
TargetFilename|endswith:
- '.jse'
- '.vbe'
- '.js'
@@ -1,13 +1,16 @@
title: Suspicious Word Cab File Write CVE-2021-40444
id: 60c0a111-787a-4e8a-9262-ee485f3ef9d5
description: Detects file creation patterns noticeable during the exploitation of CVE-2021-40444
status: experimental
description: Detects file creation patterns noticeable during the exploitation of CVE-2021-40444
references:
- https://twitter.com/RonnyTNL/status/1436334640617373699?s=20
- https://twitter.com/vanitasnk/status/1437329511142420483?s=21
author: Florian Roth, Sittikorn S
date: 2021/09/10
modified: 2022/06/17
tags:
- attack.resource_development
- attack.t1587
logsource:
product: windows
category: file_event
@@ -31,6 +34,3 @@ fields:
falsepositives:
- Unknown
level: high
tags:
- attack.resource_development
- attack.t1587
@@ -2,21 +2,21 @@ title: WMI Persistence - Script Event Consumer File Write
id: 33f41cdd-35ac-4ba8-814b-c6a4244a1ad4
status: test
description: Detects file writes of WMI script event consumer
author: Thomas Patzke
references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
author: Thomas Patzke
date: 2018/03/07
modified: 2021/11/27
logsource:
product: windows
category: file_event
detection:
selection:
Image: 'C:\WINDOWS\system32\wbem\scrcons.exe'
condition: selection
falsepositives:
- Dell Power Manager (C:\Program Files\Dell\PowerManager\DpmPowerPlanSetup.exe)
level: high
tags:
- attack.t1546.003
- attack.persistence
- attack.t1546.003
- attack.persistence
logsource:
product: windows
category: file_event
detection:
selection:
Image: 'C:\WINDOWS\system32\wbem\scrcons.exe'
condition: selection
falsepositives:
- Dell Power Manager (C:\Program Files\Dell\PowerManager\DpmPowerPlanSetup.exe)
level: high

Some files were not shown because too many files have changed in this diff Show More