Commit Graph

4685 Commits

Author SHA1 Message Date
Florian Roth 7e02555e22 refactor: credential dumper level increased 2021-10-14 14:24:56 +02:00
frack113 c202d39acd Merge pull request #2138 from frack113/conti_ransomware
Conti ransomware commandline
2021-10-14 06:31:36 +01:00
Austin Songer 4e43fce629 Update powershell_windows_firewall_profile_disabled.yml 2021-10-13 07:01:04 -05:00
frack113 5aa62bd342 fix yml 2021-10-12 21:02:15 +02:00
frack113 37c637066b add process_creation_conti_cmd_ransomware.yml 2021-10-12 20:57:12 +02:00
Austin Songer 40eed2ec59 Rename powershell_windows_firewall_disabled.yml to powershell_windows_firewall_profile_disabled.yml 2021-10-12 11:57:37 -05:00
Austin Songer d273bc25ea Create powershell_windows_firewall_disabled.yml 2021-10-12 11:56:37 -05:00
frack113 b9fc29bc05 Merge pull request #2131 from frack113/Powershell
Powershell order
2021-10-11 15:43:32 +01:00
frack113 7497fdb484 Merge pull request #2129 from d4rk-d4nph3/master
Added rule for possible persistence via VMTools
2021-10-10 10:55:06 +02:00
frack113 1337116d84 Cleanup selection name 2021-10-10 10:17:24 +02:00
Bhabesh Rai a241f526ef Added more strict path 2021-10-10 07:54:40 +05:45
Florian Roth 4ab3ebf6b2 Merge pull request #2128 from OTRF/feature/Susp-ADFS-NamedPipe
Detect suspicious named pipe connections to an AD FS WID
2021-10-09 16:47:25 +02:00
Florian Roth 2379907f26 docs: extended the description by a word 2021-10-09 16:42:42 +02:00
Florian Roth f475b90ee3 fix: typo in description 2021-10-09 16:41:48 +02:00
frack113 5c68c42058 order powershell_script 2021-10-09 10:30:36 +02:00
frack113 77749510b7 fix yml 2021-10-09 10:01:40 +02:00
frack113 41d098b253 fix yml error 2021-10-09 09:59:21 +02:00
frack113 9b0f744f75 order powershell_script 2021-10-09 09:57:45 +02:00
frack113 fe7fbfd5fc order powershell_module 2021-10-09 09:50:49 +02:00
Florian Roth 5b49b5ee17 Merge pull request #2130 from phantinuss/master
fix: prevent FP triggering of other sources utilising ID 1102
2021-10-08 20:14:08 +02:00
phantinuss 04c37d977b fix: prevent FP triggering of other sources utilising ID 1102 2021-10-08 16:43:14 +02:00
Bhabesh Rai a45e516f99 Added rule for possible persistence via VMTools 2021-10-08 13:28:35 +05:45
Roberto Rodriguez 7f17eaeb87 added rule to detect suspicious named pipe connections to an AD FS server 2021-10-08 01:57:22 -04:00
Mika Luhta e70d17745e Update modified field 2021-10-07 18:42:22 +02:00
Mika Luhta 0ee777e3b4 Fix rule detection logic
Changed ParentImage to Image
2021-10-07 14:25:18 +03:00
frack113 0d04b469f7 order powershell_classic 2021-10-07 07:40:53 +02:00
frack113 6d56e400d2 Merge pull request #2121 from frack113/update_test
Update test  adding  logsource to duplicate logic test
2021-10-06 14:46:48 +02:00
frack113 80d09483d9 move to builtin 2021-10-05 07:33:50 +02:00
frack113 4f86a245f8 Order file i correct directory 2021-10-05 07:30:43 +02:00
frack113 201708c097 Merge pull request #2103 from webboy2015/patch-1
Create win_lolbas_execution_of_nltest.exe.yaml
2021-10-05 07:24:05 +02:00
frack113 654b5b4bff Update win_lolbas_execution_of_nltest.yml 2021-10-04 22:08:47 +02:00
frack113 fd329f4f9b Remove unneeded EventID 2021-10-04 21:25:57 +02:00
frack113 dc030e0128 Merge pull request #2114 from austinsonger/process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml
process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml
2021-10-03 08:24:52 +02:00
Austin Songer 81d1bb0e2b Update process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml 2021-10-02 13:32:20 -05:00
frack113 f652745924 Update and rename win_lolbas_execution_of_nltest.exe to win_lolbas_execution_of_nltest.yml 2021-10-02 07:53:19 +02:00
frack113 e6b32b90af Update win_lolbas_execution_of_nltest.exe 2021-10-02 07:25:11 +02:00
webboy2015 87df79302d Update win_lolbas_execution_of_nltest.exe
Changed condition as follows:
   detection:
       selection:
          EventID: 4689
          ProcessName|endswith: nltest.exe
          Status: "0x0"
     condition: selection

Included  field - SubjectDomainName
2021-10-01 12:55:37 -07:00
frack113 19a834e317 Merge pull request #2111 from TareqAlKhatib/master
Corrected Technique
2021-10-01 15:17:01 +02:00
Tareq Alkhatib 0d22601112 Added Compromise Infrastructure: Web Services technique 2021-10-01 08:40:59 -04:00
Austin Songer 04acba9c77 Create process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml 2021-09-30 19:58:21 -05:00
Tareq Alkhatib b0b95ce32b Corrected Technique 2021-09-30 16:34:14 -04:00
frack113 e900945761 Update win_trust_discovery.yml 2021-09-30 19:26:14 +02:00
zaicurity 76224b0fb2 Added alternative nltest command parameter
Same as recent change to "Recon Activity with NLTEST" (see commit a2418e4d2c)
Added the command parameter '/trusted_domains' for nltest which can be used as an alternative to '/domain_trusts' to bypass detection. 
Tested on Windows 10.0.19042
Reference: https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
2021-09-30 18:12:19 +02:00
frack113 1c842037cf Merge pull request #2109 from Karneades/patch-1
Add fp note to powershell winapi rule
2021-09-30 17:45:03 +02:00
frack113 6eea77ae38 Merge pull request #2105 from frack113/powershell
powershell_susp_zip_compress add 4104
2021-09-30 17:40:13 +02:00
Andreas Hunkeler 82ba266a53 Add fp note to powershell winapi rule 2021-09-30 16:38:39 +02:00
frack113 29d66a965c add 4104 2021-09-30 10:03:11 +02:00
webboy2015 056067086c Create win_lolbas_execution_of_nltest.exe.yaml
The attacker might use LOLBAS nltest.exe for the discovery of domain controllers, domain trusts, parent domain, and the current user permissions. This event can be detected in the Windows Security Log by looking for event id 4689 indicating that nltest.exe was executed and has exited with the execution result of "0x0".
2021-09-29 14:33:36 -07:00
frack113 84ec2f582a Merge pull request #2100 from kidrek/sysmon_delete_prefetch
Add new rule - sysmon_delete_prefetch - AntiForensic
2021-09-29 17:53:33 +02:00
frack113 ed1a1caa2e Merge pull request #2098 from frack113/fix_tags
fix tags in win_susp_mpcmdrun_download.yml
2021-09-29 17:06:18 +02:00