Merge pull request #3154 from nasbench/master

Updates & New Rules
This commit is contained in:
frack113
2022-06-22 06:19:40 +02:00
committed by GitHub
20 changed files with 401 additions and 82 deletions
@@ -6,6 +6,7 @@ author: Nasreddine Bencherchali
references:
- https://pentestlab.blog/2022/02/14/persistence-notepad-plugins/
date: 2022/06/10
modified: 2022/06/21
logsource:
product: windows
category: file_event
@@ -16,6 +17,7 @@ detection:
filter_gup:
Image|endswith: '\Notepad++\updater\gup.exe'
filter_install:
# This filter is for Sigma dataset you could remove it or change when using the rule in your own env
Image|startswith: 'C:\Users\'
Image|contains: '\AppData\Local\Temp\'
Image|endswith: '\target.exe'
@@ -23,6 +25,6 @@ detection:
falsepositives:
- Possible FPs during first installation of Notepad++
- Legitimate use of custom plugins to enhance notepad++ functionality by users
level: high
level: medium
tags:
- attack.persistence
@@ -1,12 +1,9 @@
title: PowerShell Get Clipboard
id: 4cbd4f12-2e22-43e3-882f-bff3247ffb78
related:
- id: 5486f63a-aa4c-488d-9a61-c9192853099f
type: derived
description: A General detection for the Get-Clipboard commands in PowerShell logs. This could be an adversary capturing clipboard contents.
status: experimental
date: 2020/05/02
modified: 2021/10/16
modified: 2022/06/20
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.collection
@@ -0,0 +1,23 @@
title: PowerShell Hotfix Enumeration
id: f5d1def8-1de0-4a0e-9794-1f6f27dd605c
status: experimental
description: Detects call to "Win32_QuickFixEngineering" in order to enumerate installed hotfixes often used in "enum" scripts by attackers
author: Nasreddine Bencherchali
references:
- https://github.com/411Hall/JAWS/blob/master/jaws-enum.ps1
date: 2022/06/21
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains|all:
- 'Win32_QuickFixEngineering'
- 'HotFixID'
condition: selection
falsepositives:
- Legitimate administration scripts
level: medium
tags:
- attack.discovery
@@ -0,0 +1,27 @@
title: Troubleshooting Pack Cmdlet Execution
id: 03409c93-a7c7-49ba-9a4c-a00badf2a153
status: experimental
author: Nasreddine Bencherchali
date: 2022/06/21
description: Detects execution of "TroubleshootingPack" cmdlets to leverage CVE-2022-30190 or action similar to "msdt" lolbin (as described in LOLBAS)
references:
- https://twitter.com/nas_bench/status/1537919885031772161
- https://lolbas-project.github.io/lolbas/Binaries/Msdt/
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains|all:
- 'Invoke-TroubleshootingPack'
- 'C:\Windows\Diagnostics\System\PCW'
- '-AnswerFile'
- '-Unattended'
condition: selection
falsepositives:
- Legitimate usage of "TroubleshootingPack" cmdlet for troubleshooting purposes
level: medium
tags:
- attack.defense_evasion
- attack.t1202
@@ -1,30 +1,38 @@
title: Accesschk Usage After Privilege Escalation
title: Accesschk Usage To Check Privileges
id: c625d754-6a3d-4f65-9c9a-536aea960d37
status: test
description: Accesschk is an access and privilege audit tool developed by SysInternal and often being used by attacker to verify if a privilege escalation process successful or not
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
description: Accesschk is an access and privilege audit tool developed by SysInternal and often being used by attacker to verify privileges
author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community, Nasreddine Bencherchali (modified)
references:
- https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-43-638.jpg
- https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment?slide=43
- https://www.youtube.com/watch?v=JGs-aKf2OtU&ab_channel=OFFZONEMOSCOW
- https://github.com/carlospolop/PEASS-ng/blob/master/winPEAS/winPEASbat/winPEAS.bat
- https://github.com/gladiatx0r/Powerless/blob/master/Powerless.bat
date: 2020/10/13
modified: 2021/11/27
modified: 2022/06/20
logsource:
product: windows
category: process_creation
product: windows
category: process_creation
detection:
integrity_level:
IntegrityLevel: 'Medium'
product:
Product|endswith: 'AccessChk'
description:
Description|contains: 'Reports effective permissions'
condition: integrity_level and (product or description)
selection_img:
- Product|endswith: 'AccessChk'
- Description|contains: 'Reports effective permissions'
- Image|endswith: '\accesschk.exe'
selection_cli:
CommandLine|contains: # These are the most common flags used with this tool. You could add other combinations if needed
- 'uwcqv '
- 'kwsu '
- 'qwsu '
- 'uwdqs '
condition: all of selection*
fields:
- IntegrityLevel
- Product
- Description
- IntegrityLevel
- Product
- Description
- CommandLine
falsepositives:
- System administrator Usage
level: high
- System administrator Usage
level: medium
tags:
- attack.discovery
- attack.t1069.001
- attack.discovery
- attack.t1069.001
@@ -0,0 +1,33 @@
title: Abusing Permissions Using Dsacls
id: 01c42d3c-242d-4655-85b2-34f1739632f7
status: experimental
description: Detects usage of Dsacls to grant over permissive permissions
author: Nasreddine Bencherchali
references:
- https://ss64.com/nt/dsacls.html
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\dsacls.exe'
- OriginalFileName: "DSACLS.EXE"
selection_flag:
CommandLine|contains: ' /G '
selection_permissions:
CommandLine|contains: # Add more permissions as you see fit in yout env
- 'GR'
- 'GE'
- 'GW'
- 'GA'
- 'WP'
- 'WD'
condition: all of selection*
falsepositives:
- Legitimate administrators granting over permissive permissions to users
level: medium
tags:
- attack.execution
- attack.t1218
@@ -0,0 +1,28 @@
title: Password Spraying Attempts Using Dsacls
id: bac9fb54-2da7-44e9-988f-11e9a5edbc0c
status: experimental
description: Detects possible password spraying attempts using Dsacls
author: Nasreddine Bencherchali
references:
- https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/using-dsacls-to-check-ad-object-permissions#password-spraying-anyone
- https://ss64.com/nt/dsacls.html
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\dsacls.exe'
- OriginalFileName: "DSACLS.EXE"
selection_cli:
CommandLine|contains|all:
- '/user:'
- '/passwd:'
condition: all of selection*
falsepositives:
- Legitimate use of dsacls to bind to an LDAP session
level: medium
tags:
- attack.execution
- attack.t1218
@@ -0,0 +1,44 @@
title: Enumeration for 3rd Party Creds From CLI
id: 87a476dc-0079-4583-a985-dee7a20a03de
related:
- id: e0b0c2ab-3d52-46d9-8cb7-049dc775fbd1
type: derived
status: experimental
description: Detects processes that query known 3rd party registry keys that holds credentials via commandline
references:
- https://isc.sans.edu/diary/More+Data+Exfiltration/25698
- https://github.com/synacktiv/Radmin3-Password-Cracker/blob/main/regkey.txt
- https://github.com/HyperSine/how-does-MobaXterm-encrypt-password
- https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#inside-the-registry
author: Nasreddine Bencherchali
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: # Add more paths as they are discovered
- '\Software\SimonTatham\PuTTY\Sessions'
- '\Software\\SimonTatham\\PuTTY\SshHostKeys\'
- '\Software\Mobatek\MobaXterm\'
- '\Software\WOW6432Node\Radmin\v3.0\Server\Parameters\Radmin'
- '\Software\Aerofox\FoxmailPreview'
- '\Software\Aerofox\Foxmail\V3.1'
- '\Software\IncrediMail\Identities'
- '\Software\Qualcomm\Eudora\CommandLine'
- '\Software\RimArts\B2\Settings'
- '\Software\OpenVPN-GUI\configs'
- '\Software\Martin Prikryl\WinSCP 2\Sessions'
- '\Software\FTPWare\COREFTP\Sites'
- '\Software\DownloadManager\Passwords'
- '\Software\OpenSSH\Agent\Keys'
- '\Software\TightVNC\Server'
- '\Software\ORL\WinVNC3\Password'
- '\Software\RealVNC\WinVNC4'
condition: selection
falsepositives:
- Unlikely
level: medium
tags:
- attack.credential_access
- attack.t1552.002
@@ -21,7 +21,7 @@ detection:
- 'REG_SZ'
- '/s'
hive:
- CommandLine|contains|all:
- CommandLine|contains|all:
- '/f '
- 'HKLM'
- CommandLine|contains|all:
@@ -0,0 +1,45 @@
title: Abusing Findstr for Defense Evasion
id: bf6c39fc-e203-45b9-9538-05397c1b4f3f
status: test
description: Attackers can use findstr to hide their artifacts or search specific strings and evade defense mechanism
author: 'Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative, Nasreddine Bencherchali'
references:
- https://lolbas-project.github.io/lolbas/Binaries/Findstr/
- https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
- https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
date: 2020/10/05
modified: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_findstr:
- CommandLine|contains: findstr
- Image|endswith: 'findstr.exe'
- OriginalFileName: 'FINDSTR.EXE'
selection_cli_download_1:
CommandLine|contains:
- /v
- -v
selection_cli_download_2:
CommandLine|contains:
- /l
- -l
selection_cli_creds_1:
CommandLine|contains:
- /s
- -s
selection_cli_creds_2:
CommandLine|contains:
- /i
- -i
condition: selection_findstr and (all of selection_cli_download* or all of selection_cli_creds*)
falsepositives:
- Administrative findstr usage
level: medium
tags:
- attack.defense_evasion
- attack.t1218
- attack.t1564.004
- attack.t1552.001
- attack.t1105
@@ -1,26 +1,26 @@
title: Execute Arbitrary Commands Using MSDT.EXE
title: Execute MSDT.EXE Using Diagcab File
id: 6545ce61-a1bd-4119-b9be-fcbee42c0cf3
status: experimental
description: Detects diagcab leveraging the "ms-msdt" handler or the "msdt.exe" binary to execute arbitrary commands as seen in CVE-2022-30190
author: GossiTheDog (rule), frack113 (sigma version)
author: GossiTheDog (rule), frack113 (sigma version)
references:
- https://github.com/GossiTheDog/ThreatHunting/blob/master/AdvancedHuntingQueries/DogWalk-DiagCab
- https://github.com/GossiTheDog/ThreatHunting/blob/master/AdvancedHuntingQueries/DogWalk-DiagCab
date: 2022/06/09
logsource:
category: process_creation
product: windows
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\msdt.exe'
- OriginalFileName: 'msdt.exe'
selection_cmd:
CommandLine|contains|all:
- '/cab'
- '.diagcab'
condition: all of selection_*
selection_img:
- Image|endswith: '\msdt.exe'
- OriginalFileName: 'msdt.exe'
selection_cmd:
CommandLine|contains|all:
- '/cab'
- '.diagcab'
condition: all of selection_*
falsepositives:
- Unknown
- Legitimate usage of ".diagcab" files
level: high
tags:
- attack.defense_evasion
- attack.t1202
- attack.defense_evasion
- attack.t1202
@@ -0,0 +1,26 @@
title: MSDT.EXE Execution With Suspicious Cab Option
id: dc4576d4-7467-424f-9eee-fd2b02855fe0
status: experimental
description: Detects execution of msdt.exe using the "cab" flag which could indicates suspicious diagcab files with embedded answer files leveraging CVE-2022-30190
author: Nasreddine Bencherchali
references:
- https://twitter.com/nas_bench/status/1537896324837781506
date: 2022/06/21
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\msdt.exe'
- OriginalFileName: 'msdt.exe'
selection_cmd:
CommandLine|contains:
- ' /cab '
- ' -cab '
condition: all of selection_*
falsepositives:
- Legitimate usage of ".diagcab" files
level: medium
tags:
- attack.defense_evasion
- attack.t1202
@@ -0,0 +1,26 @@
title: PowerShell Get-Clipboard Cmdlet Via CLI
id: b9aeac14-2ffd-4ad3-b967-1354a4e628c3
related:
- id: 4cbd4f12-2e22-43e3-882f-bff3247ffb78
type: derived
description: Detects usage of the 'Get-Clipboard' cmdlet via CLI
status: experimental
date: 2020/05/02
modified: 2021/10/16
author: Nasreddine Bencherchali
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/16
- https://threathunterplaybook.com/evals/apt29/detections/7.A.2_F4609F7E-C4DB-4327-91D4-59A58C962A02.html
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: 'Get-Clipboard'
condition: selection
falsepositives:
- Unknown
level: medium
tags:
- attack.collection
- attack.t1115
@@ -15,7 +15,7 @@ detection:
Image|endswith:
- '\net.exe'
- '\net1.exe'
CommandLine|contains: ' start ' # space character after the 'start' keyword indicates that a service name follows, in contrast to `net start` discovery expression
CommandLine|contains: ' start ' # space character after the 'start' keyword indicates that a service name follows, in contrast to `net start` discovery expression
condition: selection
falsepositives:
- Legitimate administrator or user executes a service for legitimate reasons.
@@ -4,7 +4,7 @@ description: Detects a windows service to be stopped
status: experimental
author: Jakob Weinzettl, oscd.community
date: 2019/10/23
modified: 2022/05/27
modified: 2022/06/20
tags:
- attack.impact
- attack.t1489
@@ -12,18 +12,23 @@ logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
selection_img:
- OriginalFileName:
- 'sc.exe'
- 'net.exe'
- 'net1.exe'
- Image|endswith:
- '\sc.exe'
- '\net.exe'
- '\net1.exe'
selection_cli:
CommandLine|contains: 'stop'
filter:
CommandLine: 'sc stop KSCWebConsoleMessageQueue' # kaspersky Security Center Web Console double space between sc and stop
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: selection and not filter
condition: all of selection_* and not filter
fields:
- ComputerName
- User
@@ -1,34 +0,0 @@
title: Abusing Findstr for Defense Evasion
id: bf6c39fc-e203-45b9-9538-05397c1b4f3f
status: test
description: Attackers can use findstr to hide their artifacts or search specific strings and evade defense mechanism
author: 'Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative'
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Findstr.yml
- https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
- https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
date: 2020/10/05
modified: 2022/05/16
logsource:
category: process_creation
product: windows
detection:
selectionFindstr:
- CommandLine|contains: findstr
- Image|endswith: 'findstr.exe'
- OriginalFileName: 'FINDSTR.EXE'
selection_V_L:
CommandLine|contains|all:
- /V
- /L
selection_S_I:
CommandLine|contains|all:
- /S
- /I
condition: selectionFindstr and (selection_V_L or selection_S_I)
falsepositives:
- Administrative findstr usage
level: medium
tags:
- attack.defense_evasion
- attack.t1218
@@ -0,0 +1,28 @@
title: WMIC Hotfix Recon
id: dfd2fcb7-8bd5-4daa-b132-5adb61d6ad45
status: experimental
description: Detects wmic known recon method to look for installed hotfixes, often used by pentest and attackers enum scripts
author: Nasreddine Bencherchali
references:
- https://github.com/carlospolop/PEASS-ng/blob/master/winPEAS/winPEASbat/winPEAS.bat
- https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_windows.html
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_img:
- OriginalFileName: 'wmic.exe'
- Image|endswith: '\WMIC.exe'
selection_cli:
CommandLine|contains|all:
- ' qfe '
- ' get '
- 'Caption,Description,HotFixID,InstalledOn'
condition: all of selection*
falsepositives:
- Unknown
level: medium
tags:
- attack.execution
- attack.t1047
@@ -0,0 +1,29 @@
title: WMIC Service Start/Stop
id: 0b7163dc-7eee-4960-af17-c0cd517f92da
status: experimental
description: Detects usage of wmic to start or stop a service
author: Nasreddine Bencherchali
references:
- https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_windows.html
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_img:
- OriginalFileName: 'wmic.exe'
- Image|endswith: '\WMIC.exe'
selection_cli:
CommandLine|contains|all:
- ' service '
- ' call '
CommandLine|contains:
- 'stopservice'
- 'startservice'
condition: all of selection*
falsepositives:
- Unknown
level: medium
tags:
- attack.execution
- attack.t1047
@@ -0,0 +1,32 @@
title: WMIC Unquoted Services Path Lookup
id: 68bcd73b-37ef-49cb-95fc-edc809730be6
status: experimental
description: Detects wmic known recon method to look for unquoted serivce paths, often used by pentest and attackers enum scripts
author: Nasreddine Bencherchali
references:
- https://github.com/nccgroup/redsnarf/blob/master/redsnarf.py
- https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1
date: 2022/06/20
logsource:
category: process_creation
product: windows
detection:
selection_img:
- OriginalFileName: 'wmic.exe'
- Image|endswith: '\WMIC.exe'
selection_cli:
CommandLine|contains|all:
- ' service '
- ' get '
CommandLine|contains:
- name
- displayname
- pathname
- startmode
condition: all of selection*
falsepositives:
- Unknown
level: medium
tags:
- attack.execution
- attack.t1047