Quick Updates and Fixes

- Added "Invoke-EventViewer.ps1" script to the rule "file_event_win_powershell_exploit_scripts"
- Added "OriginalFileName" to "proc_creation_win_susp_taskkill"
- Created rule for "winword" being used as a LOLBIN to download and load arbitrary DLLs
This commit is contained in:
Nasreddine Bencherchali
2022-05-18 12:50:59 +01:00
parent 354e8ded4e
commit dcf236fede
3 changed files with 38 additions and 5 deletions
@@ -7,6 +7,7 @@ references:
- https://raw.githubusercontent.com/Neo23x0/sigma/f35c50049fa896dff91ff545cb199319172701e8/rules/windows/powershell/powershell_malicious_commandlets.yml
- https://github.com/PowerShellMafia/PowerSploit
- https://github.com/NetSPI/PowerUpSQL
- https://github.com/CsEnox/EventViewer-UACBypass
date: 2018/04/07
modified: 2022/05/13
logsource:
@@ -115,6 +116,7 @@ detection:
- '\Find-AVSignature.ps1'
- '\Get-GPPAutologon.ps1'
- '\Get-MicrophoneAudio.ps1'
- '\Invoke-EventViewer.ps1'
condition: selection
falsepositives:
- Unknown
@@ -6,16 +6,19 @@ author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1489/T1489.md#atomic-test-3---windows---stop-service-by-killing-process
date: 2021/12/26
modified: 2022/05/17
logsource:
category: process_creation
product: windows
detection:
taskkill:
Image|endswith: \taskkill.exe
CommandLine|contains|all:
- /f
selection_img:
- Image|endswith: \taskkill.exe
- OriginalFileName: 'taskkill.exe'
selection_cli:
CommandLine|contains|all:
- /f
- /im
condition: taskkill
condition: all of selection*
falsepositives:
- Unknown
level: low
@@ -0,0 +1,28 @@
title: Winword LOLBIN Usage
id: 4ae3e30b-b03f-43aa-87e3-b622f4048eed
status: experimental
description: Winword can be abused as a LOLBIN to download arbitary file or load arbitary DLLs
author: Nasreddine Bencherchali
references:
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/
- https://github.com/D4Vinci/One-Lin3r/blob/master/one_lin3r/core/liners/windows/cmd/dll_loader_word.py
date: 2022/05/17
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\WINWORD.exe'
- OriginalFileName: 'WinWord.exe'
selection_cli_http:
CommandLine|contains:
- 'http://'
- 'https://'
selection_cli_dll:
CommandLine|contains:
- '/l '
- '.dll'
condition: selection_img and 1 of selection_cli*
falsepositives:
- Unknown
level: high