Merge pull request #2632 from SigmaHQ/aurora-false-positive-fixing

Aurora false positive fixing
This commit is contained in:
Florian Roth
2022-02-02 22:49:26 +01:00
committed by GitHub
2 changed files with 8 additions and 3 deletions
@@ -14,16 +14,17 @@ detection:
exec_selection:
ParentImage|endswith: '\userinit.exe'
exec_exclusion1:
Image|endswith:
Image|endswith:
- '\explorer.exe'
- '\proquota.exe'
Image: 'explorer.exe'
exec_exclusion2:
CommandLine|contains:
- 'netlogon*.bat'
- 'UsrLogon.cmd'
create_keywords_cli:
CommandLine|contains: 'UserInitMprLogonScript'
condition: ( exec_selection and not exec_exclusion1 and not exec_exclusion2 ) or create_keywords_cli
condition: ( exec_selection and not 1 of exec_exclusion* ) or create_keywords_cli
falsepositives:
- exclude legitimate logon scripts
- penetration tests, red teaming
@@ -7,7 +7,7 @@ references:
- https://attack.mitre.org/techniques/T1546/015/
author: Maxime Thiebaut (@0xThiebaut), oscd.community, Cédric Hien
date: 2020/04/14
modified: 2022/01/19
modified: 2022/02/01
tags:
- attack.persistence
- attack.t1546.015
@@ -59,6 +59,10 @@ detection:
- Image|endswith: '\MicrosoftEdgeUpdateComRegisterShell64.exe'
filter_dx:
Image: 'C:\WINDOWS\SYSTEM32\dxdiag.exe'
filter_other:
Details:
- 'C:\Program Files\Mozilla Firefox\AccessibleHandler.dll' # Firefox update
- 'C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll' # Firefox update
condition: selection and not 1 of filter*
falsepositives:
- Some installed utilities (i.e. OneDrive) may serve new COM objects at user-level