Merge pull request #3445 from wagga40/master
Fix a lot of typos in rules text and comments
This commit is contained in:
@@ -24,5 +24,5 @@ detection:
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
- Depending on your environment accepted applications may leverage this at times. It is recomended to search for anomolies inidicative of malware.
|
||||
- Depending on your environment accepted applications may leverage this at times. It is recommended to search for anomalies inidicative of malware.
|
||||
level: high
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
title: Creation In User Word Statup Folder
|
||||
title: Creation In User Word Startup Folder
|
||||
id: a10a2c40-2c4d-49f8-b557-1a946bc55d9d
|
||||
status: experimental
|
||||
description: Detects the creation of an file in user Word Startup
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: VMware Xfer Loading DLL from Nondefault Path
|
||||
id: 9313dc13-d04c-46d8-af4a-a930cc55d93b
|
||||
status: experimental
|
||||
description: Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitary DLL
|
||||
description: Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2022/08/02
|
||||
references:
|
||||
|
||||
+2
-2
@@ -3,7 +3,7 @@ id: f772cee9-b7c2-4cb2-8f07-49870adc02e0
|
||||
status: experimental
|
||||
description: Detects Commandlet names and arguments from the Nishang exploitation framework
|
||||
date: 2019/05/16
|
||||
modified: 2021/10/16
|
||||
modified: 2022/08/29
|
||||
references:
|
||||
- https://github.com/samratashok/nishang
|
||||
tags:
|
||||
@@ -66,7 +66,7 @@ detection:
|
||||
- Invoke-PSGcat
|
||||
- Invoke-PsGcatAgent
|
||||
- Remove-PoshRat
|
||||
- Add-Persistance
|
||||
- Add-Persistence
|
||||
- ExetoText
|
||||
- Invoke-Decode
|
||||
- Invoke-Encode
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: Suspicious Dosfuscation Character in Commandline
|
||||
id: a77c1610-fc73-4019-8e29-0f51efc04a51
|
||||
status: experimental
|
||||
description: Posssible Payload Obfuscation
|
||||
description: Possible Payload Obfuscation
|
||||
references:
|
||||
- https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/dosfuscation-report.pdf
|
||||
author: frack113
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: Suspicious CMD Shell Redirect
|
||||
id: 8e0bb260-d4b2-4fff-bb8d-3f82118e6892
|
||||
status: experimental
|
||||
description: Detects inline windows shell commands redirecting output via the ">" symbol to a suspicous location
|
||||
description: Detects inline windows shell commands redirecting output via the ">" symbol to a suspicious location
|
||||
author: Nasreddine Bencherchali
|
||||
references:
|
||||
- https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/
|
||||
|
||||
@@ -19,5 +19,5 @@ detection:
|
||||
- '-register'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate usage of the script. Always investigate what's being registred to confirm if it's benign
|
||||
- Legitimate usage of the script. Always investigate what's being registered to confirm if it's benign
|
||||
level: medium
|
||||
|
||||
@@ -4,7 +4,7 @@ related:
|
||||
- id: 349d891d-fef0-4fe4-bc53-eee623a15969
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Iamge detection
|
||||
description: Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Image detection
|
||||
author: frack113, Nasreddine Bencherchali
|
||||
references:
|
||||
- https://www.acunetix.com/blog/articles/windows-short-8-3-filenames-web-security-problem/
|
||||
|
||||
+1
-1
@@ -1,7 +1,7 @@
|
||||
title: Net WebClient Casing Anomalies
|
||||
id: c86133ad-4725-4bd0-8170-210788e0a7ba
|
||||
status: experimental
|
||||
description: Detects PowerShell command line contents that include a suspicious anormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques
|
||||
description: Detects PowerShell command line contents that include a suspicious abnormal casing in the Net.Webclient (e.g. nEt.WEbCliEnT) string as used in obfuscation techniques
|
||||
author: Florian Roth
|
||||
references:
|
||||
- https://app.any.run/tasks/b9040c63-c140-479b-ad59-f1bb56ce7a97/
|
||||
|
||||
@@ -46,5 +46,5 @@ fields:
|
||||
- ParentCommandLine
|
||||
- Details
|
||||
falsepositives:
|
||||
- Legitimate use by adminstrator
|
||||
level: high
|
||||
- Legitimate use by administrator
|
||||
level: high
|
||||
|
||||
@@ -5,7 +5,7 @@ description: |
|
||||
An adversary might use WMI to check if a certain Remote Service is running on a remote device.
|
||||
When the test completes, a service information will be displayed on the screen if it exists.
|
||||
A common feedback message is that "No instance(s) Available" if the service queried is not running.
|
||||
A common error message is "Node - (provided IP or default) ERROR Description =The RPC server is unavailable" if the provided remote host is unreacheable
|
||||
A common error message is "Node - (provided IP or default) ERROR Description =The RPC server is unavailable" if the provided remote host is unreachable
|
||||
author: frack113
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: WMIC Unquoted Services Path Lookup
|
||||
id: 68bcd73b-37ef-49cb-95fc-edc809730be6
|
||||
status: experimental
|
||||
description: Detects wmic known recon method to look for unquoted serivce paths, often used by pentest and attackers enum scripts
|
||||
description: Detects wmic known recon method to look for unquoted service paths, often used by pentest and attackers enum scripts
|
||||
author: Nasreddine Bencherchali
|
||||
references:
|
||||
- https://github.com/nccgroup/redsnarf/blob/35949b30106ae543dc6f2bc3f1be10c6d9a8d40e/redsnarf.py
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: UEFI Persistence Via Wpbbin - ProcessCreation
|
||||
id: 4abc0ec4-db5a-412f-9632-26659cddf145
|
||||
status: experimental
|
||||
description: Detects execution of the binary "wpbbin" which is used as part of the UEFI based persistence method described in the refernece section
|
||||
description: Detects execution of the binary "wpbbin" which is used as part of the UEFI based persistence method described in the reference section
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2022/07/18
|
||||
references:
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: Disable UAC Using Registry
|
||||
id: 48437c39-9e5f-47fb-af95-3d663c3f2919
|
||||
description: Detects when an attacker tries to disable User Account Conrol (UAC) by changing its registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA from 1 to 0
|
||||
description: Detects when an attacker tries to disable User Account Control (UAC) by changing its registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA from 1 to 0
|
||||
author: frack113
|
||||
date: 2022/01/05
|
||||
modified: 2022/08/06
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: Change the Fax Dll
|
||||
id: 9e3357ba-09d4-4fbd-a7c5-ad6386314513
|
||||
description: Detect possible persistance using Fax DLL load when service restart
|
||||
description: Detect possible persistence using Fax DLL load when service restart
|
||||
status: experimental
|
||||
references:
|
||||
- https://twitter.com/dottor_morte/status/1544652325570191361
|
||||
|
||||
@@ -16,7 +16,7 @@ detection:
|
||||
TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\mpnotify'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Might trigger if a legitimate new SIP provider is registered. But this is not a common occurence in an environment and should be investigated either way
|
||||
- Might trigger if a legitimate new SIP provider is registered. But this is not a common occurrence in an environment and should be investigated either way
|
||||
level: high
|
||||
tags:
|
||||
- attack.persistence
|
||||
|
||||
Reference in New Issue
Block a user