Commit Graph

2099 Commits

Author SHA1 Message Date
frack113 5aa62bd342 fix yml 2021-10-12 21:02:15 +02:00
frack113 37c637066b add process_creation_conti_cmd_ransomware.yml 2021-10-12 20:57:12 +02:00
frack113 7497fdb484 Merge pull request #2129 from d4rk-d4nph3/master
Added rule for possible persistence via VMTools
2021-10-10 10:55:06 +02:00
Bhabesh Rai a241f526ef Added more strict path 2021-10-10 07:54:40 +05:45
Bhabesh Rai a45e516f99 Added rule for possible persistence via VMTools 2021-10-08 13:28:35 +05:45
Mika Luhta e70d17745e Update modified field 2021-10-07 18:42:22 +02:00
Mika Luhta 0ee777e3b4 Fix rule detection logic
Changed ParentImage to Image
2021-10-07 14:25:18 +03:00
frack113 4f86a245f8 Order file i correct directory 2021-10-05 07:30:43 +02:00
frack113 201708c097 Merge pull request #2103 from webboy2015/patch-1
Create win_lolbas_execution_of_nltest.exe.yaml
2021-10-05 07:24:05 +02:00
frack113 654b5b4bff Update win_lolbas_execution_of_nltest.yml 2021-10-04 22:08:47 +02:00
frack113 dc030e0128 Merge pull request #2114 from austinsonger/process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml
process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml
2021-10-03 08:24:52 +02:00
Austin Songer 81d1bb0e2b Update process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml 2021-10-02 13:32:20 -05:00
frack113 f652745924 Update and rename win_lolbas_execution_of_nltest.exe to win_lolbas_execution_of_nltest.yml 2021-10-02 07:53:19 +02:00
frack113 e6b32b90af Update win_lolbas_execution_of_nltest.exe 2021-10-02 07:25:11 +02:00
webboy2015 87df79302d Update win_lolbas_execution_of_nltest.exe
Changed condition as follows:
   detection:
       selection:
          EventID: 4689
          ProcessName|endswith: nltest.exe
          Status: "0x0"
     condition: selection

Included  field - SubjectDomainName
2021-10-01 12:55:37 -07:00
frack113 19a834e317 Merge pull request #2111 from TareqAlKhatib/master
Corrected Technique
2021-10-01 15:17:01 +02:00
Tareq Alkhatib 0d22601112 Added Compromise Infrastructure: Web Services technique 2021-10-01 08:40:59 -04:00
Austin Songer 04acba9c77 Create process_creation_lolbas_data_exfiltration_by_using_datasvcutil.yml 2021-09-30 19:58:21 -05:00
Tareq Alkhatib b0b95ce32b Corrected Technique 2021-09-30 16:34:14 -04:00
frack113 e900945761 Update win_trust_discovery.yml 2021-09-30 19:26:14 +02:00
zaicurity 76224b0fb2 Added alternative nltest command parameter
Same as recent change to "Recon Activity with NLTEST" (see commit a2418e4d2c)
Added the command parameter '/trusted_domains' for nltest which can be used as an alternative to '/domain_trusts' to bypass detection. 
Tested on Windows 10.0.19042
Reference: https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
2021-09-30 18:12:19 +02:00
webboy2015 056067086c Create win_lolbas_execution_of_nltest.exe.yaml
The attacker might use LOLBAS nltest.exe for the discovery of domain controllers, domain trusts, parent domain, and the current user permissions. This event can be detected in the Windows Security Log by looking for event id 4689 indicating that nltest.exe was executed and has exited with the execution result of "0x0".
2021-09-29 14:33:36 -07:00
frack113 ed1a1caa2e Merge pull request #2098 from frack113/fix_tags
fix tags in win_susp_mpcmdrun_download.yml
2021-09-29 17:06:18 +02:00
neonprimetime security (Justin C Miller) 2ae2c35a7f mispelled 'mshta.exe' in selection_base
it said 'mhsta.exe' and it should say 'mshta.exe'
2021-09-29 07:47:12 -05:00
frack113 4a66ea04bd fix tags 2021-09-29 08:26:05 +02:00
zaicurity a2418e4d2c Added alternative command parameter
Added the command parameter '/trusted_domains' for nltest which can be used as an alternative to '/domain_trusts' to bypass detection. 
Tested on Windows 10.0.19042
Reference: https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
2021-09-28 17:39:21 +02:00
frack113 c3222945ef Merge pull request #2093 from austinsonger/win_sysmon_driver_unload.yml
win_sysmon_driver_unload.yml
2021-09-28 16:22:43 +02:00
Austin Songer 3e7b3073cf Update win_sysmon_driver_unload.yml 2021-09-27 23:30:30 -05:00
Florian Roth b227f8459d fix: typo in filename 2021-09-27 22:37:20 +02:00
Florian Roth ada966c5be Merge branch 'rule-devel' of https://github.com/SigmaHQ/sigma into rule-devel 2021-09-27 22:34:30 +02:00
Florian Roth cee44e6688 renamed files: lowercase 2021-09-27 22:33:30 +02:00
kidrek 267da51745 The issues have been fixed 2021-09-24 22:18:00 +02:00
kidrek ecd4719a20 add new rule win_process_dump_rdrleakdiag 2021-09-24 18:22:06 +02:00
frack113 c59b0eb543 Merge pull request #2063 from frack113/last_global
Split Last Global Rules
2021-09-23 13:54:57 +02:00
Florian Roth 3107ede1c4 Merge branch 'pr/2065' 2021-09-23 09:18:15 +02:00
Austin Songer ab613af365 Update sysmon_atlassian_confluence_cve_2021_26084_exploit.yml 2021-09-22 22:24:24 -05:00
frack113 6e6d57b019 fix filename 2021-09-22 18:45:08 +02:00
unknown 9924cc3946 win-apt-greenbug-fix amend b64 value of /server= as seen in IOC 2021-09-22 10:33:04 -04:00
frack113 ab5f5f95bc fix filename 2021-09-22 16:27:05 +02:00
frack113 3c906b52a0 fix filename 2021-09-22 16:21:07 +02:00
unknown 3ace73f9fd win-apt-greenbug-fix - change modified date as well 2021-09-21 16:59:32 -04:00
unknown 993bf46550 win-apt-greenbug-fix small change to B64encoded value of '/server=' in detection criteria 2021-09-21 16:56:01 -04:00
frack113 8c13bd23b9 split global win_powershell_web_request 2021-09-21 13:44:19 +02:00
frack113 ba3c7a020a split global win_root_certificate_installed.yml 2021-09-21 13:34:32 +02:00
frack113 6368a88ad3 split global win_software_discovery.yml 2021-09-21 13:28:47 +02:00
frack113 4718f914e9 split global sysmon_hack_dumpert.yml 2021-09-21 10:43:42 +02:00
frack113 318f8b714e split global win_tool_psexec.yml 2021-09-21 10:10:48 +02:00
Florian Roth 8909eefb90 Merge pull request #2052 from phantinuss/pr
xwizard dll sideloading
2021-09-20 12:35:42 +02:00
phantinuss 25a407e24f Update win_dll_sideload_xwizard.yml 2021-09-20 10:56:37 +02:00
Florian Roth 6c630502dc Update win_dll_sideload_xwizard.yml 2021-09-20 10:54:53 +02:00