Merge PR #4406 from @nasbench - Multiple Updates & Additions
new: CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File new: CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process new: CVE-2023-40477 Potential Exploitation - .REV File Creation new: CVE-2023-40477 Potential Exploitation - WinRAR Application Crash new: IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32 new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI new: LOL-Binary Copied From System Directory new: LSASS Dump Keyword In CommandLine new: Old TLS1.0/TLS1.1 Protocol Version Enabled new: Potentially Suspicious Child Process Of WinRAR.EXE new: VMMap Signed Dbghelp.DLL Potential Sideloading update: 7Zip Compressing Dump Files - Reduce level update: LOLBIN Execution From Abnormal Drive update: LSASS Memory Dump File Creation - Deprecated update: Potential Browser Data Stealing - Increase coverage with more browsers update: Potentially Suspicious Compression Tool Parameters update: Potentially Suspicious Windows App Activity - Fix FP, increase coverage and reduce level update: Rundll32 Execution Without CommandLine Parameters - Add CLI variations update: Suspicious Child Process Of Manage Engine ServiceDesk update: Suspicious Copy From or To System Directory - Add new folder "WinSxS" update: VMMap Unsigned Dbghelp.DLL Potential Sideloading update: Winrar Execution in Non-Standard Folder update: Wscript Execution from Non C Drive - Deprecated --------- Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
ffcb5855f5
commit
bdffe3a7fe
Executable → Regular
+2
-2
@@ -1,12 +1,12 @@
|
||||
title: LSASS Memory Dump File Creation
|
||||
id: 5e3d3601-0662-4af0-b1d2-36a05e90c40a
|
||||
status: test
|
||||
status: deprecated
|
||||
description: LSASS memory dump creation using operating systems utilities. Procdump will use process name in output file if no name is specified
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
|
||||
author: Teymur Kheirkhabarov, oscd.community
|
||||
date: 2019/10/22
|
||||
modified: 2022/10/09
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003.001
|
||||
+2
-1
@@ -1,12 +1,13 @@
|
||||
title: Wscript Execution from Non C Drive
|
||||
id: 5b80cf53-3a46-4adc-960b-05ec19348d74
|
||||
status: experimental
|
||||
status: deprecated
|
||||
description: Detects Wscript or Cscript executing from a drive other than C. This has been observed with Qakbot executing from within a mounted ISO file.
|
||||
references:
|
||||
- https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_BB_30.09.2022.txt
|
||||
- https://app.any.run/tasks/4985c746-601e-401a-9ccf-ae350ac2e887/
|
||||
author: Aaron Herman
|
||||
date: 2022/10/01
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
+28
@@ -0,0 +1,28 @@
|
||||
title: CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File
|
||||
id: e4556676-fc5c-4e95-8c39-5ef27791541f
|
||||
related:
|
||||
- id: ec3a3c2f-9bb0-4a9b-8f4b-5ec386544343
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects the creation of a file with a double extension and a space by WinRAR. This could be a sign of exploitation of CVE-2023-38331
|
||||
references:
|
||||
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
|
||||
- https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831/blob/26ab6c40b6d2c09bb4fc60feaa4a3a90cfd20c23/Part-1-Overview.md
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/30
|
||||
tags:
|
||||
- attack.execution
|
||||
- cve.2023.38331
|
||||
- detection.emerging_threats
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith: '\WinRAR.exe'
|
||||
TargetFilename|contains: '\AppData\Local\Temp\Rar$'
|
||||
TargetFilename|re: '\.[a-zA-Z0-9]{1,4} \.'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
+42
@@ -0,0 +1,42 @@
|
||||
title: CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process
|
||||
id: ec3a3c2f-9bb0-4a9b-8f4b-5ec386544343
|
||||
related:
|
||||
- id: e4556676-fc5c-4e95-8c39-5ef27791541f
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects exploitation attempt of CVE-2023-38331 (WinRAR before v6.23), where an attacker can leverage WinRAR to execute arbitrary commands and binaries.
|
||||
references:
|
||||
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
|
||||
- https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831/blob/26ab6c40b6d2c09bb4fc60feaa4a3a90cfd20c23/Part-1-Overview.md
|
||||
author: Nasreddine Bencherchali (Nextron Systems), Andreas Braathen (mnemonic.io)
|
||||
date: 2023/08/30
|
||||
tags:
|
||||
- detection.emerging_threats
|
||||
- attack.execution
|
||||
- attack.t1203
|
||||
- cve.2023.38331
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_parent:
|
||||
ParentImage|endswith: '\WinRAR.exe'
|
||||
selection_folder:
|
||||
CommandLine|contains: '\AppData\Local\Temp\Rar$'
|
||||
selection_double_ext:
|
||||
CommandLine|re: '\.[a-zA-Z0-9]{1,4} \.'
|
||||
selection_binaries:
|
||||
# Note: add additional binaries that the attacker might use
|
||||
- Image|endswith:
|
||||
- '\cmd.exe'
|
||||
- '\wscript.exe'
|
||||
- OriginalFileName:
|
||||
- 'Cmd.Exe'
|
||||
- 'cscript.exe'
|
||||
- 'PowerShell.EXE'
|
||||
- 'pwsh.dll'
|
||||
- 'wscript.exe'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: high
|
||||
+27
@@ -0,0 +1,27 @@
|
||||
title: CVE-2023-40477 Potential Exploitation - .REV File Creation
|
||||
id: c3bd6c55-d495-4c34-918e-e03e8828c074
|
||||
status: experimental
|
||||
description: Detects the creation of ".rev" files by WinRAR. Could be indicative of potential exploitation of CVE-2023-40477. Look for a suspicious execution shortly after creation or a WinRAR application crash.
|
||||
references:
|
||||
- https://wildptr.io/winrar-cve-2023-40477-poc-new-vulnerability-winrar-security-research/
|
||||
- https://github.com/wildptr-io/Winrar-CVE-2023-40477-POC
|
||||
- https://www.rarlab.com/vuln_rev3_names.html
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/31
|
||||
tags:
|
||||
- attack.execution
|
||||
- cve.2023.40477
|
||||
- detection.emerging_threats
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith:
|
||||
- '\explorer.exe' # When extracted via context menu
|
||||
- '\WinRAR.exe'
|
||||
TargetFilename|endswith: '.rev'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate extraction of multipart or recovery volumes ZIP files
|
||||
level: low
|
||||
+34
@@ -0,0 +1,34 @@
|
||||
title: CVE-2023-40477 Potential Exploitation - WinRAR Application Crash
|
||||
id: e5a29b54-6fe7-4258-8a23-82960e31231a
|
||||
status: experimental
|
||||
description: Detects a crash of "WinRAR.exe" where the version is lower than 6.23. This could indicate potential exploitation of CVE-2023-40477
|
||||
references:
|
||||
- https://wildptr.io/winrar-cve-2023-40477-poc-new-vulnerability-winrar-security-research/
|
||||
- https://github.com/wildptr-io/Winrar-CVE-2023-40477-POC
|
||||
- https://www.rarlab.com/vuln_rev3_names.html
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/31
|
||||
tags:
|
||||
- attack.execution
|
||||
- cve.2023.40477
|
||||
- detection.emerging_threats
|
||||
logsource:
|
||||
product: windows
|
||||
service: application
|
||||
detection:
|
||||
selection:
|
||||
Provider_Name: 'Application Error'
|
||||
EventID: 1000
|
||||
AppName: 'WinRAR.exe'
|
||||
filter_main_fixed_version:
|
||||
# TODO: fix this when the "lt" modifier is implemented for software versions
|
||||
AppVersion|startswith:
|
||||
- '6.23.'
|
||||
- '6.24.'
|
||||
- '6.25.'
|
||||
- '6.26.'
|
||||
- '7.'
|
||||
condition: selection and not 1 of filter_main_*
|
||||
falsepositives:
|
||||
- Legitimate crash for reasons other than exploitation of the vulnerability
|
||||
level: medium
|
||||
+26
@@ -0,0 +1,26 @@
|
||||
title: IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32
|
||||
id: 2bd8e100-5b3b-4b6a-bbb5-b129d3ddddc5
|
||||
status: experimental
|
||||
description: Detects RunDLL32.exe executing a single digit DLL named "1.dll" with the export function "DllRegisterServer". This behaviour was often seen used by malware and especially IcedID
|
||||
references:
|
||||
- https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
|
||||
- https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/31
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1218.011
|
||||
- detection.emerging_threats
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith: '\rundll32.exe'
|
||||
CommandLine|endswith:
|
||||
- '\1.dll, DllRegisterServer' # In case of full path exec
|
||||
- ' 1.dll, DllRegisterServer' # In case of direct exec
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
+9
-7
@@ -1,12 +1,12 @@
|
||||
title: Suspicious Compression Tool Parameters
|
||||
title: Potentially Suspicious Compression Tool Parameters
|
||||
id: 27a72a60-7e5e-47b1-9d17-909c9abafdcd
|
||||
status: test
|
||||
description: Detects suspicious command line arguments of common data compression tools
|
||||
description: Detects potentially suspicious command line arguments of common data compression tools
|
||||
references:
|
||||
- https://twitter.com/SBousseaden/status/1184067445612535811
|
||||
author: Florian Roth (Nextron Systems), Samir Bousseaden
|
||||
date: 2019/10/15
|
||||
modified: 2021/11/27
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1560.001
|
||||
@@ -26,9 +26,11 @@ detection:
|
||||
- ' -sdel'
|
||||
- ' -dw'
|
||||
- ' -hp'
|
||||
falsepositive:
|
||||
ParentImage|startswith: 'C:\Program'
|
||||
condition: selection and not falsepositive
|
||||
filter_main_generic:
|
||||
ParentImage|contains:
|
||||
- ':\Program Files\'
|
||||
- ':\Program Files (x86)\'
|
||||
condition: selection and not 1 of filter_main_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
level: medium
|
||||
+9
-7
@@ -3,8 +3,10 @@ id: a5a2d357-1ab8-4675-a967-ef9990a59391
|
||||
related:
|
||||
- id: db2110f3-479d-42a6-94fb-d35bc1e46492
|
||||
type: obsoletes
|
||||
- id: 5e3d3601-0662-4af0-b1d2-36a05e90c40a
|
||||
type: obsoletes
|
||||
status: experimental
|
||||
description: Detects file names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials
|
||||
description: Detects creation of files with names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials.
|
||||
references:
|
||||
- https://www.google.com/search?q=procdump+lsass
|
||||
- https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf
|
||||
@@ -22,7 +24,7 @@ logsource:
|
||||
product: windows
|
||||
category: file_event
|
||||
detection:
|
||||
selection1:
|
||||
selection_1:
|
||||
TargetFilename|endswith:
|
||||
- '\lsass.dmp'
|
||||
- '\lsass.zip'
|
||||
@@ -30,22 +32,22 @@ detection:
|
||||
- '\Andrew.dmp'
|
||||
- '\Coredump.dmp'
|
||||
- '\NotLSASS.zip' # https://github.com/CCob/MirrorDump
|
||||
selection2:
|
||||
selection_2:
|
||||
TargetFilename|contains:
|
||||
- '\lsass_2' # default format of procdump v9.0 is lsass_YYMMDD_HHmmss.dmp
|
||||
- '\lsassdump'
|
||||
- '\lsassdmp'
|
||||
selection3:
|
||||
selection_3:
|
||||
TargetFilename|contains|all:
|
||||
- '\lsass'
|
||||
- '.dmp'
|
||||
selection4:
|
||||
selection_4:
|
||||
TargetFilename|contains: 'SQLDmpr'
|
||||
TargetFilename|endswith: '.mdmp'
|
||||
selection5:
|
||||
selection_5:
|
||||
TargetFilename|startswith: 'nanodump'
|
||||
TargetFilename|endswith: '.dmp'
|
||||
condition: 1 of selection*
|
||||
condition: 1 of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,31 @@
|
||||
title: VMMap Signed Dbghelp.DLL Potential Sideloading
|
||||
id: 98ffaed4-aec2-4e04-9b07-31492fe68b3d
|
||||
related:
|
||||
- id: 273a8dd8-3742-4302-bcc7-7df5a80fe425
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects potential DLL sideloading of a signed dbghelp.dll by the Sysinternals VMMap.
|
||||
references:
|
||||
- https://techcommunity.microsoft.com/t5/sysinternals-blog/zoomit-v7-1-procdump-2-0-for-linux-process-explorer-v17-05/ba-p/3884766
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/09/05
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1574.001
|
||||
- attack.t1574.002
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ImageLoaded|contains: 'C:\Debuggers\dbghelp.dll'
|
||||
Image|endswith:
|
||||
- '\vmmap.exe'
|
||||
- '\vmmap64.exe'
|
||||
Signed: 'true'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
+6
-2
@@ -1,11 +1,15 @@
|
||||
title: VMMap Dbghelp.DLL Potential Sideloading
|
||||
title: VMMap Unsigned Dbghelp.DLL Potential Sideloading
|
||||
id: 273a8dd8-3742-4302-bcc7-7df5a80fe425
|
||||
related:
|
||||
- id: 98ffaed4-aec2-4e04-9b07-31492fe68b3d
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects potential DLL sideloading of dbghelp.dll by the Sysinternals VMMap.
|
||||
description: Detects potential DLL sideloading of an unsigned dbghelp.dll by the Sysinternals VMMap.
|
||||
references:
|
||||
- https://techcommunity.microsoft.com/t5/sysinternals-blog/zoomit-v7-1-procdump-2-0-for-linux-process-explorer-v17-05/ba-p/3884766
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/07/28
|
||||
modified: 2023/09/05
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.persistence
|
||||
@@ -4,12 +4,12 @@ related:
|
||||
- id: 1ac14d38-3dfc-4635-92c7-e3fd1c5f5bfc
|
||||
type: derived
|
||||
status: experimental
|
||||
description: Detects a suspicious 7zip execution that involves a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration
|
||||
description: Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.
|
||||
references:
|
||||
- https://thedfirreport.com/2022/09/26/bumblebee-round-two/
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2022/09/27
|
||||
modified: 2023/03/10
|
||||
modified: 2023/08/31
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1560.001
|
||||
@@ -32,5 +32,6 @@ detection:
|
||||
- '.dump'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
- Legitimate use of 7z with a command line in which ".dmp" or ".dump" appears accidentally
|
||||
- Legitimate use of 7z to compress WER ".dmp" files for troubleshooting
|
||||
level: medium
|
||||
|
||||
+28
-29
@@ -1,14 +1,14 @@
|
||||
title: Manage Engine Java Suspicious Sub Process
|
||||
title: Suspicious Child Process Of Manage Engine ServiceDesk
|
||||
id: cea2b7ea-792b-405f-95a1-b903ea06458f
|
||||
status: experimental
|
||||
description: Detects suspicious sub processes started by the Manage Engine ServiceDesk Plus Java web service process
|
||||
description: Detects suspicious child processes of the "Manage Engine ServiceDesk Plus" Java web service
|
||||
references:
|
||||
- https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/
|
||||
- https://github.com/horizon3ai/CVE-2022-47966/blob/3a51c6b72ebbd87392babd955a8fbeaee2090b35/CVE-2022-47966.py
|
||||
- https://blog.viettelcybersecurity.com/saml-show-stopper/
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2023/01/18
|
||||
modified: 2023/01/21
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1102
|
||||
@@ -21,41 +21,40 @@ detection:
|
||||
- '\ManageEngine\ServiceDesk\'
|
||||
- '\java.exe'
|
||||
Image|endswith:
|
||||
- '\powershell.exe'
|
||||
- '\sh.exe'
|
||||
- '\bash.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\schtasks.exe'
|
||||
- '\certutil.exe'
|
||||
- '\whoami.exe' # Often used in POCs
|
||||
- '\bitsadmin.exe'
|
||||
- '\wscript.exe'
|
||||
- '\cscript.exe'
|
||||
- '\scrcons.exe'
|
||||
# - '\regsvr32.exe'
|
||||
# - '\hh.exe'
|
||||
- '\wmic.exe'
|
||||
- '\mshta.exe'
|
||||
# - '\rundll32.exe'
|
||||
- '\forfiles.exe'
|
||||
# - '\scriptrunner.exe'
|
||||
- '\mftrace.exe'
|
||||
- '\AppVLP.exe'
|
||||
- '\bash.exe'
|
||||
- '\bitsadmin.exe'
|
||||
- '\calc.exe'
|
||||
- '\certutil.exe'
|
||||
- '\cscript.exe'
|
||||
- '\curl.exe'
|
||||
- '\notepad.exe' # Often used in POCs
|
||||
- '\systeminfo.exe'
|
||||
- '\forfiles.exe'
|
||||
- '\mftrace.exe'
|
||||
- '\mshta.exe'
|
||||
- '\net.exe'
|
||||
- '\net1.exe'
|
||||
- '\reg.exe'
|
||||
- '\notepad.exe' # Often used in POCs
|
||||
- '\powershell.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\query.exe'
|
||||
filter_net:
|
||||
- '\reg.exe'
|
||||
- '\schtasks.exe'
|
||||
- '\scrcons.exe'
|
||||
- '\sh.exe'
|
||||
- '\systeminfo.exe'
|
||||
- '\whoami.exe' # Often used in POCs
|
||||
- '\wmic.exe'
|
||||
- '\wscript.exe'
|
||||
# - '\hh.exe'
|
||||
# - '\regsvr32.exe'
|
||||
# - '\rundll32.exe'
|
||||
# - '\scriptrunner.exe'
|
||||
filter_main_net:
|
||||
Image|endswith:
|
||||
- '\net.exe'
|
||||
- '\net1.exe'
|
||||
CommandLine|contains: ' stop'
|
||||
condition: selection and not 1 of filter_*
|
||||
fields:
|
||||
- CommandLine
|
||||
condition: selection and not 1 of filter_main_*
|
||||
falsepositives:
|
||||
- Legitimate sub processes started by Manage Engine ServiceDesk Pro
|
||||
level: high
|
||||
+1
-1
@@ -18,8 +18,8 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith: '\Windows\System32\lsass.exe'
|
||||
ParentImage|endswith: '\Windows\System32\lsass.exe'
|
||||
Image|endswith: '\Windows\System32\lsass.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
+31
@@ -0,0 +1,31 @@
|
||||
title: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI
|
||||
id: 10344bb3-7f65-46c2-b915-2d00d47be5b0
|
||||
related:
|
||||
- id: 3fd4c8d7-8362-4557-a8e6-83b29cc0d724
|
||||
type: similar
|
||||
status: experimental
|
||||
description: |
|
||||
Detects changes to Internet Explorer's (IE / Windows Internet properties) ZoneMap configuration of the "HTTP" and "HTTPS" protocols to point to the "My Computer" zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.
|
||||
references:
|
||||
- https://twitter.com/M_haggis/status/1699056847154725107
|
||||
- https://twitter.com/JAMESWT_MHT/status/1699042827261391247
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries
|
||||
- https://www.virustotal.com/gui/file/339ff720c74dc44265b917b6d3e3ba0411d61f3cd3c328e9a2bae81592c8a6e5/content
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/09/05
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine|contains|all:
|
||||
- '\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults'
|
||||
- 'http'
|
||||
- ' 0'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -1,12 +1,13 @@
|
||||
title: Suspicious Rundll32 Without Any CommandLine Params
|
||||
title: Rundll32 Execution Without CommandLine Parameters
|
||||
id: 1775e15e-b61b-4d14-a1a3-80981298085a
|
||||
status: experimental
|
||||
description: Detects suspicious start of rundll32.exe without any parameters as found in CobaltStrike beacon activity
|
||||
references:
|
||||
- https://www.cobaltstrike.com/help-opsec
|
||||
- https://twitter.com/ber_m1ng/status/1397948048135778309
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2021/05/27
|
||||
modified: 2022/10/06
|
||||
modified: 2023/08/31
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1202
|
||||
@@ -15,17 +16,15 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine|endswith: '\rundll32.exe'
|
||||
filter1:
|
||||
ParentImage|endswith: '\svchost.exe'
|
||||
CommandLine|endswith:
|
||||
- '\rundll32.exe'
|
||||
- '\rundll32.exe"'
|
||||
- '\rundll32'
|
||||
filter2:
|
||||
ParentImage|contains:
|
||||
- '\AppData\Local\'
|
||||
- '\Microsoft\Edge\'
|
||||
condition: selection and not 1 of filter*
|
||||
fields:
|
||||
- ParentImage
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Possible but rare
|
||||
level: high
|
||||
|
||||
@@ -1,31 +1,28 @@
|
||||
title: Rundll32 With Suspicious Parent Process
|
||||
title: Rundll32 Spawned Via Explorer.EXE
|
||||
id: 1723e720-616d-4ddc-ab02-f7e3685a4713
|
||||
status: experimental
|
||||
description: Detects suspicious start of rundll32.exe with a parent process of Explorer.exe. Variant of Raspberry Robin, as first reported by Red Canary.
|
||||
description: Detects execution of "rundll32.exe" with a parent process of Explorer.exe. This has been observed by variants of Raspberry Robin, as first reported by Red Canary.
|
||||
references:
|
||||
- https://redcanary.com/blog/raspberry-robin/
|
||||
- https://thedfirreport.com/2022/09/26/bumblebee-round-two/
|
||||
author: CD_ROM_
|
||||
date: 2022/05/21
|
||||
modified: 2023/02/09
|
||||
modified: 2023/08/31
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_parent:
|
||||
ParentImage|endswith: '\explorer.exe'
|
||||
selection_img:
|
||||
- Image|endswith: '\rundll32.exe'
|
||||
- OriginalFileName: 'RUNDLL32.EXE'
|
||||
selection_parent:
|
||||
ParentImage|endswith: '\explorer.exe'
|
||||
filter:
|
||||
filter_main_generic:
|
||||
- CommandLine|contains: ' C:\Windows\System32\' # The space at the start is required
|
||||
- CommandLine|endswith: ' -localserver 22d8c27b-47a1-48d1-ad08-7da7abd79617' # Windows 10 volume control
|
||||
condition: all of selection_* and not filter
|
||||
fields:
|
||||
- Image
|
||||
- ParentImage
|
||||
condition: all of selection_* and not 1 of filter_main_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
|
||||
@@ -1,12 +1,13 @@
|
||||
title: Suspicious Windows App Activity
|
||||
title: Potentially Suspicious Windows App Activity
|
||||
id: f91ed517-a6ba-471d-9910-b3b4a398c0f3
|
||||
status: experimental
|
||||
description: Detects suspicious children of application launched from inside the WindowsApps directory. This could be a sign of a rogue ".appx" package installation/execution
|
||||
description: Detects potentially suspicious child process of applications launched from inside the WindowsApps directory. This could be a sign of a rogue ".appx" package installation/execution
|
||||
references:
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/01/12
|
||||
modified: 2023/08/31
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
@@ -19,20 +20,29 @@ detection:
|
||||
selection_susp_img:
|
||||
Image|endswith:
|
||||
# You can add more LOLBINs
|
||||
- '\poweshell.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\mshta.exe'
|
||||
- '\cmd.exe'
|
||||
- '\cscript.exe'
|
||||
- '\mshta.exe'
|
||||
- '\powershell.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\wscript.exe'
|
||||
selection_susp_cli:
|
||||
# You can add more suspicious keywords
|
||||
# You can add more potentially suspicious keywords
|
||||
CommandLine|contains:
|
||||
- 'cmd /c'
|
||||
- 'Invoke-'
|
||||
- 'Base64'
|
||||
condition: selection_parent and 1 of selection_susp_*
|
||||
filter_optional_terminal:
|
||||
ParentImage|contains: ':\Program Files\WindowsApps\Microsoft.WindowsTerminal'
|
||||
ParentImage|endswith: '\WindowsTerminal.exe'
|
||||
# Note: to avoid FP add the default shells and profiles that your WT integrates
|
||||
Image|endswith:
|
||||
- '\powershell.exe'
|
||||
- '\cmd.exe'
|
||||
- '\pwsh.exe'
|
||||
condition: selection_parent and 1 of selection_susp_* and not 1 of filter_optional_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
- Legitimate packages that make use of external binaries such as Windows Terminal
|
||||
level: medium
|
||||
|
||||
@@ -12,7 +12,7 @@ references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1555.003/T1555.003.md
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2022/12/23
|
||||
modified: 2023/01/29
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1555.003
|
||||
@@ -38,10 +38,31 @@ detection:
|
||||
- 'robocopy.exe'
|
||||
selection_path:
|
||||
CommandLine|contains:
|
||||
- '\Opera Software\Opera Stable\'
|
||||
- '\Mozilla\Firefox\Profiles'
|
||||
- '\Microsoft\Edge\User Data\'
|
||||
- '\Amigo\User Data'
|
||||
- '\BraveSoftware\Brave-Browser\User Data'
|
||||
- '\CentBrowser\User Data'
|
||||
- '\Chromium\User Data'
|
||||
- '\CocCoc\Browser\User Data'
|
||||
- '\Comodo\Dragon\User Data'
|
||||
- '\Elements Browser\User Data'
|
||||
- '\Epic Privacy Browser\User Data'
|
||||
- '\Google\Chrome Beta\User Data'
|
||||
- '\Google\Chrome SxS\User Data'
|
||||
- '\Google\Chrome\User Data\'
|
||||
- '\Kometa\User Data'
|
||||
- '\Maxthon5\Users'
|
||||
- '\Microsoft\Edge\User Data'
|
||||
- '\Mozilla\Firefox\Profiles'
|
||||
- '\Nichrome\User Data'
|
||||
- '\Opera Software\Opera GX Stable\'
|
||||
- '\Opera Software\Opera Neon\User Data'
|
||||
- '\Opera Software\Opera Stable\'
|
||||
- '\Orbitum\User Data'
|
||||
- '\QIP Surf\User Data'
|
||||
- '\Sputnik\User Data'
|
||||
- '\Torch\User Data'
|
||||
- '\uCozMedia\Uran\User Data'
|
||||
- '\Vivaldi\User Data'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -56,9 +56,6 @@ detection:
|
||||
- '$'
|
||||
- CommandLine|contains: '\Sysvol\'
|
||||
condition: selection_target and (selection_other_tools or all of selection_cmd_* or all of selection_pwsh_*)
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Administrative scripts
|
||||
level: high
|
||||
|
||||
+7
-8
@@ -1,18 +1,19 @@
|
||||
title: Suspicious Copy From or To System32
|
||||
title: Suspicious Copy From or To System Directory
|
||||
id: fff9d2b7-e11c-4a69-93d3-40ef66189767
|
||||
related:
|
||||
- id: 855bc8b5-2ae8-402e-a9ed-b889e6df1900
|
||||
type: derived
|
||||
status: test
|
||||
description: |
|
||||
Detects a suspicious copy operation that tries to copy a program from a system (System32 or SysWOW64) directory to another on disk.
|
||||
Often used to move LOLBINs such as 'certutil' or 'desktopimgdownldr' to a different location with a different name in order to bypass detections based on locations
|
||||
Detects a suspicious copy operation that tries to copy a program from system (System32, SysWOW64, WinSxS) directories to another on disk.
|
||||
Often used to move LOLBINs such as 'certutil' or 'desktopimgdownldr' to a different location with a different name in order to bypass detections based on locations.
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/8da5b75b6380a41eee3a399c43dfe0d99eeefaa1fd21027a07b1ecaa4cd96fdd?environmentId=120
|
||||
- https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html
|
||||
- https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
|
||||
author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2020/07/03
|
||||
modified: 2023/01/31
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036.003
|
||||
@@ -43,10 +44,8 @@ detection:
|
||||
CommandLine|contains:
|
||||
- '\System32'
|
||||
- '\SysWOW64'
|
||||
condition: 1 of selection* and target
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
- '\WinSxS'
|
||||
condition: 1 of selection_* and target
|
||||
falsepositives:
|
||||
- Depend on scripts and administrative tools used in the monitored environment (For example an admin scripts like https://www.itexperience.net/sccm-batch-files-and-32-bits-processes-on-64-bits-os/)
|
||||
- When cmd.exe and xcopy.exe are called directly # C:\Windows\System32\cmd.exe /c copy file1 file2
|
||||
@@ -0,0 +1,60 @@
|
||||
title: LOL-Binary Copied From System Directory
|
||||
id: f5d19838-41b5-476c-98d8-ba8af4929ee2
|
||||
related:
|
||||
- id: fff9d2b7-e11c-4a69-93d3-40ef66189767
|
||||
type: derived
|
||||
status: experimental
|
||||
description: |
|
||||
Detects a suspicious copy operation that tries to copy a known LOLBIN from system (System32, SysWOW64, WinSxS) directories to another on disk in order to bypass detections based on locations.
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/8da5b75b6380a41eee3a399c43dfe0d99eeefaa1fd21027a07b1ecaa4cd96fdd?environmentId=120
|
||||
- https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html
|
||||
- https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/29
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036.003
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_tools_cmd:
|
||||
Image|endswith: '\cmd.exe'
|
||||
CommandLine|contains: 'copy '
|
||||
selection_tools_pwsh:
|
||||
Image|endswith:
|
||||
- '\powershell.exe'
|
||||
- '\pwsh.exe'
|
||||
CommandLine|contains:
|
||||
- 'copy-item'
|
||||
- ' copy '
|
||||
- 'cpi '
|
||||
- ' cp '
|
||||
selection_tools_other:
|
||||
- Image|endswith:
|
||||
- '\robocopy.exe'
|
||||
- '\xcopy.exe'
|
||||
- OriginalFileName:
|
||||
- 'robocopy.exe'
|
||||
- 'XCOPY.EXE'
|
||||
selection_target_path:
|
||||
CommandLine|contains:
|
||||
- '\System32'
|
||||
- '\SysWOW64'
|
||||
- '\WinSxS'
|
||||
selection_target_lolbin:
|
||||
CommandLine|contains:
|
||||
# Note: add more binaries to increase coverage
|
||||
- '\bitsadmin.exe'
|
||||
- '\calc.exe'
|
||||
- '\certutil.exe'
|
||||
- '\cmdl32.exe'
|
||||
- '\cscript.exe'
|
||||
- '\mshta.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\wscript.exe'
|
||||
condition: 1 of selection_tools_* and all of selection_target_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -66,10 +66,10 @@ detection:
|
||||
- 'WriteInt32'
|
||||
- 'WriteProcessMemory'
|
||||
- 'ZeroFreeGlobalAllocUnicode'
|
||||
filter_mpcmdrun:
|
||||
filter_optional_mpcmdrun:
|
||||
Image|endswith: '\MpCmdRun.exe'
|
||||
CommandLine|contains: 'GetLoadLibraryWAddress32'
|
||||
condition: selection and not 1 of filter_*
|
||||
condition: selection and not 1 of filter_optional_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
+22
-16
@@ -1,14 +1,17 @@
|
||||
title: LOLBIN From Abnormal Drive
|
||||
title: LOLBIN Execution From Abnormal Drive
|
||||
id: d4ca7c59-e9e4-42d8-bf57-91a776efcb87
|
||||
related:
|
||||
- id: 5b80cf53-3a46-4adc-960b-05ec19348d74
|
||||
type: similar
|
||||
status: test
|
||||
description: Detects LOLBINs executing from an abnormal drive such as a mounted ISO.
|
||||
description: Detects LOLBINs executing from an abnormal or uncommon drive such as a mounted ISO.
|
||||
references:
|
||||
- https://thedfirreport.com/2021/12/13/diavol-ransomware/
|
||||
- https://www.scythe.io/library/threat-emulation-qakbot
|
||||
- https://sec-consult.com/blog/detail/bumblebee-hunting-with-a-velociraptor/
|
||||
author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Angelo Violetti - SEC Consult '@angelo_violetti'
|
||||
author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Angelo Violetti - SEC Consult '@angelo_violetti', Aaron Herman
|
||||
date: 2022/01/25
|
||||
modified: 2023/04/12
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
@@ -16,24 +19,27 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
# Note: add more lolbins for additional coverage
|
||||
- Image|endswith:
|
||||
- '\rundll32.exe'
|
||||
- '\calc.exe'
|
||||
- '\mshta.exe'
|
||||
- '\cscript.exe'
|
||||
- '\wscript.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\installutil.exe'
|
||||
- '\certutil.exe'
|
||||
- '\cmstp.exe'
|
||||
- '\cscript.exe'
|
||||
- '\installutil.exe'
|
||||
- '\mshta.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\wscript.exe'
|
||||
- OriginalFileName:
|
||||
- 'RUNDLL32.EXE'
|
||||
- 'CALC.EXE'
|
||||
- 'MSHTA.EXE'
|
||||
- 'cscript.exe'
|
||||
- 'wscript.exe'
|
||||
- 'REGSVR32.EXE'
|
||||
- 'installutil.exe'
|
||||
- 'CertUtil.exe'
|
||||
- 'CMSTP.EXE'
|
||||
- 'cscript.exe'
|
||||
- 'installutil.exe'
|
||||
- 'MSHTA.EXE'
|
||||
- 'REGSVR32.EXE'
|
||||
- 'RUNDLL32.EXE'
|
||||
- 'wscript.exe'
|
||||
filter_main_currentdirectory:
|
||||
CurrentDirectory|contains: 'C:\'
|
||||
filter_main_empty:
|
||||
|
||||
@@ -0,0 +1,49 @@
|
||||
title: LSASS Dump Keyword In CommandLine
|
||||
id: ffa6861c-4461-4f59-8a41-578c39f3f23e
|
||||
related:
|
||||
- id: a5a2d357-1ab8-4675-a967-ef9990a59391
|
||||
type: derived
|
||||
status: test
|
||||
description: |
|
||||
Detects the presence of the keywords "lsass" and ".dmp" in the commandline, which could indicate a potential attempt to dump or create a dump of the lsass process.
|
||||
references:
|
||||
- https://github.com/Hackndo/lsassy
|
||||
- https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf
|
||||
- https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml
|
||||
- https://www.whiteoaksecurity.com/blog/attacks-defenses-dumping-lsass-no-mimikatz/
|
||||
- https://github.com/helpsystems/nanodump
|
||||
- https://github.com/CCob/MirrorDump
|
||||
author: E.M. Anhaus, Tony Lambert, oscd.community, Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2019/10/24
|
||||
modified: 2023/08/29
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003.001
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
- CommandLine|contains:
|
||||
- 'lsass.dmp'
|
||||
- 'lsass.zip'
|
||||
- 'lsass.rar'
|
||||
- 'Andrew.dmp'
|
||||
- 'Coredump.dmp'
|
||||
- 'NotLSASS.zip' # https://github.com/CCob/MirrorDump
|
||||
- 'lsass_2' # default format of procdump v9.0 is lsass_YYMMDD_HHmmss.dmp
|
||||
- 'lsassdump'
|
||||
- 'lsassdmp'
|
||||
- CommandLine|contains|all:
|
||||
- 'lsass'
|
||||
- '.dmp'
|
||||
- CommandLine|contains|all:
|
||||
- 'SQLDmpr'
|
||||
- '.mdmp'
|
||||
- CommandLine|contains|all:
|
||||
- 'nanodump'
|
||||
- '.dmp'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: high
|
||||
@@ -1,34 +0,0 @@
|
||||
title: LSASS Memory Dumping
|
||||
id: ffa6861c-4461-4f59-8a41-578c39f3f23e
|
||||
status: test
|
||||
description: |
|
||||
Detect creation of dump files containing the memory space of lsass.exe, which contains sensitive credentials.
|
||||
Identifies usage of Sysinternals procdump.exe to export the memory space of lsass.exe which contains sensitive credentials.
|
||||
references:
|
||||
- https://eqllib.readthedocs.io/en/latest/analytics/1e1ef6be-12fc-11e9-8d76-4d6bb837cda4.html
|
||||
- https://eqllib.readthedocs.io/en/latest/analytics/210b4ea4-12fc-11e9-8d76-4d6bb837cda4.html
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md
|
||||
author: E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community
|
||||
date: 2019/10/24
|
||||
modified: 2023/03/06
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003.001
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine|contains|all:
|
||||
- 'lsass'
|
||||
- '.dmp'
|
||||
filter:
|
||||
Image|endswith: '\werfault.exe'
|
||||
condition: selection and not filter
|
||||
fields:
|
||||
- ComputerName
|
||||
- User
|
||||
- CommandLine
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: high
|
||||
+5
-4
@@ -4,12 +4,12 @@ related:
|
||||
- id: ec570e53-4c76-45a9-804d-dc3f355ff7a7
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects a suspicious winrar execution that involves a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration
|
||||
description: Detects execution of WinRAR in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.
|
||||
references:
|
||||
- https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2022/01/04
|
||||
modified: 2023/03/10
|
||||
modified: 2023/09/07
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1560.001
|
||||
@@ -28,5 +28,6 @@ detection:
|
||||
- '.dump'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Legitimate use of WinRAR with a command line in which .dmp appears accidentally
|
||||
level: high
|
||||
- Legitimate use of WinRAR with a command line in which ".dmp" or ".dump" appears accidentally
|
||||
- Legitimate use of WinRAR to compress WER ".dmp" files for troubleshooting
|
||||
level: medium
|
||||
@@ -0,0 +1,45 @@
|
||||
title: Potentially Suspicious Child Process Of WinRAR.EXE
|
||||
id: 146aace8-9bd6-42ba-be7a-0070d8027b76
|
||||
related:
|
||||
- id: ec3a3c2f-9bb0-4a9b-8f4b-5ec386544343
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects potentially suspicious child processes of WinRAR.exe.
|
||||
references:
|
||||
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
|
||||
- https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831/blob/26ab6c40b6d2c09bb4fc60feaa4a3a90cfd20c23/Part-1-Overview.md
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/08/31
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1203
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_parent:
|
||||
ParentImage|endswith: '\WinRAR.exe'
|
||||
selection_binaries:
|
||||
# Note: add additional binaries that the attacker might use
|
||||
- Image|endswith:
|
||||
- '\cmd.exe'
|
||||
- '\cscript.exe'
|
||||
- '\mshta.exe'
|
||||
- '\powershell.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\wscript.exe'
|
||||
- OriginalFileName:
|
||||
- 'Cmd.Exe'
|
||||
- 'cscript.exe'
|
||||
- 'mshta.exe'
|
||||
- 'PowerShell.EXE'
|
||||
- 'pwsh.dll'
|
||||
- 'regsvr32.exe'
|
||||
- 'RUNDLL32.EXE'
|
||||
- 'wscript.exe'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
+12
-7
@@ -6,7 +6,7 @@ references:
|
||||
- https://twitter.com/cyb3rops/status/1460978167628406785
|
||||
author: Florian Roth (Nextron Systems), Tigzy
|
||||
date: 2021/11/17
|
||||
modified: 2022/12/25
|
||||
modified: 2023/08/31
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1560.001
|
||||
@@ -19,12 +19,17 @@ detection:
|
||||
- '\rar.exe'
|
||||
- '\winrar.exe'
|
||||
- Description: 'Command line RAR'
|
||||
filter:
|
||||
filter_main_unrar:
|
||||
# Note: we filter unrar as it has the same description as the other utilities, and we're only interested in compression
|
||||
Image|endswith: '\UnRAR.exe'
|
||||
filter_main_path:
|
||||
Image|contains:
|
||||
- '\WinRAR'
|
||||
- 'C:\Windows\Temp'
|
||||
- '\UnRAR.exe'
|
||||
condition: selection and not filter
|
||||
- ':\Program Files (x86)\WinRAR\'
|
||||
- ':\Program Files\WinRAR\'
|
||||
filter_optional_temp:
|
||||
# Note: in some occasion installers were seen dropping "rar" in TEMP
|
||||
Image|contains: ':\Windows\Temp\'
|
||||
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
|
||||
falsepositives:
|
||||
- Legitimate use of WinRAR in a folder of a software that bundles WinRAR
|
||||
level: high
|
||||
level: medium
|
||||
+31
@@ -0,0 +1,31 @@
|
||||
title: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols
|
||||
id: 3fd4c8d7-8362-4557-a8e6-83b29cc0d724
|
||||
related:
|
||||
- id: 10344bb3-7f65-46c2-b915-2d00d47be5b0
|
||||
type: similar
|
||||
status: experimental
|
||||
description: |
|
||||
Detects changes to Internet Explorer's (IE / Windows Internet properties) ZoneMap configuration of the "HTTP" and "HTTPS" protocols to point to the "My Computer" zone. This allows downloaded files from the Internet to be granted the same level of trust as files stored locally.
|
||||
references:
|
||||
- https://twitter.com/M_haggis/status/1699056847154725107
|
||||
- https://twitter.com/JAMESWT_MHT/status/1699042827261391247
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries
|
||||
- https://www.virustotal.com/gui/file/339ff720c74dc44265b917b6d3e3ba0411d61f3cd3c328e9a2bae81592c8a6e5/content
|
||||
author: Nasreddine Bencherchali (Nextron Systems), Michael Haag (idea)
|
||||
date: 2023/09/05
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
category: registry_set
|
||||
detection:
|
||||
selection:
|
||||
TargetObject|contains: '\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults'
|
||||
TargetObject|endswith:
|
||||
- '\http'
|
||||
- '\https'
|
||||
Details|contains: 'DWORD (0x00000000)'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,24 @@
|
||||
title: Old TLS1.0/TLS1.1 Protocol Version Enabled
|
||||
id: 439957a7-ad86-4a8f-9705-a28131c6821b
|
||||
status: experimental
|
||||
description: Detects applications or users re-enabling old TLS versions by setting the "Enabled" value to "1" for the "Protocols" registry key.
|
||||
references:
|
||||
- https://techcommunity.microsoft.com/t5/windows-it-pro-blog/tls-1-0-and-tls-1-1-soon-to-be-disabled-in-windows/ba-p/3887947
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023/09/05
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: registry_set
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
TargetObject|contains:
|
||||
- '\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\'
|
||||
- '\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\'
|
||||
TargetObject|endswith: '\Enabled'
|
||||
Details: 'DWORD (0x00000001)'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate enabling of the old tls versions due to incompatibility
|
||||
level: medium
|
||||
Reference in New Issue
Block a user