Commit Graph

12468 Commits

Author SHA1 Message Date
secDre4mer 46559388e0 Merge PR #4750 from @secDre4mer - Fix false positive with Potential Credential Dumping Activity Via LSASS rule
fix: Potential Credential Dumping Activity Via LSASS - remove legitimate access mask
2024-03-02 02:28:29 +01:00
github-actions[bot] 0108cdc344 Merge PR #4745 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test
2024-03-01 15:38:35 +01:00
Nasreddine Bencherchali 822f0b3d92 Merge PR #4743 from @nasbench - Increase Coverage For SC Related Rule
update: Remote Access Tool - ScreenConnect Potential Suspicious Remote Command Execution - Add more potential child process seen in the wild
2024-02-28 17:22:33 +01:00
clebron23 6b8cd1f0f1 Merge PR #4734 from @clebron23 - Add new AWS rule related to GetSigninToken abuse
Create Release / Create Release (push) Has been cancelled
new: AWS Console GetSigninToken Potential Abuse
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 22:27:22 +01:00
Nasreddine Bencherchali 8af1ab8cac Merge PR #4738 from @nasbench - Small fixes and metadata updates
new: HackTool - CobaltStrike Malleable Profile Patterns - Proxy
remove: CobaltStrike Malformed UAs in Malleable Profiles
remove: CobaltStrike Malleable (OCSP) Profile
remove: CobaltStrike Malleable Amazon Browsing Traffic Profile
remove: CobaltStrike Malleable OneDrive Browsing Traffic Profile
remove: iOS Implant URL Pattern
update: Chafer Malware URL Pattern - Reduce level to high and move to ET folder
2024-02-26 22:01:53 +01:00
frack113 49bd839ecf Merge PR #4727 from @frack113 - Refactor the condition field to align with the standard
chore: refactor the `condition` field to align with the standard
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 21:51:24 +01:00
Josh a519886eb4 Merge PR #4733 from @joshnck - Add DNS Rule For OneLaunch Update Service
new: DNS Query Request To OneLaunch Update Service 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 21:37:49 +01:00
z00t dbdf7f2424 Merge PR #4737 from @faisalusuf - Add New Bitbucket Related Rules
new: Bitbucket Full Data Export Triggered
new: Bitbucket Global Permission Changed
new: Bitbucket Global Secret Scanning Rule Deleted
new: Bitbucket Global SSH Settings Changed
new: Bitbucket Audit Log Configuration Updated
new: Bitbucket Project Secret Scanning Allowlist Added
new: Bitbucket Secret Scanning Exempt Repository Added
new: Bitbucket Secret Scanning Rule Deleted
new: Bitbucket Unauthorized Access To A Resource
new: Bitbucket Unauthorized Full Data Export Triggered
new: Bitbucket User Details Export Attempt Detected
new: Bitbucket User Login Failure
new: Bitbucket User Login Failure Via SSH
new: Bitbucket User Permissions Export Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 21:07:58 +01:00
Qasim Qlf 1fb3ce596a Merge PR #4718 from @qasimqlf - Update ATT&CK Mapping For Some Rules
chore: update ATT&CK tagging for multiple rules
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 17:09:30 +01:00
RG9n 4eccac5965 Merge PR from #4736 @RG9n - Add/Update ScreenConnect RMM Related Rules
new: Remote Access Tool - ScreenConnect Server Web Shell Execution
update: Remote Access Tool - ScreenConnect Installation Execution - Reduce level to medium
update: Remote Access Tool - ScreenConnect Potential Suspicious Remote Command Execution - Update logic and reduce the level to medium
update: Remote Access Tool - ScreenConnect Remote Command Execution - Hunting - Move the rule to Hunting
update: Remote Access Tool - ScreenConnect Remote Command Execution - Reduce level to low 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 16:55:58 +01:00
Qasim Qlf 1b4ff4d7cd Merge PR #4728 from @qasimqlf - Update multiple rules to cover the '-' arguments along with '/' arguments
update: Suspicious Service Installation Script - Increase coverage by adding for the "/" option in commands flags
update: Console CodePage Lookup Via CHCP - Increase coverage by adding for the "/" option in commands flags
update: Curl Download And Execute Combination - Increase coverage by adding for the "/" option in commands flags
update: File Deletion Via Del - Increase coverage by adding for the "/" option in commands flags
update: Files And Subdirectories Listing Using Dir - Increase coverage by adding for the "/" option in commands flags
update: Suspicious Ping/Copy Command Combination - Increase coverage by adding for the "/" option in commands flags
update: New Generic Credentials Added Via Cmdkey.EXE - Increase coverage by adding for the "/" option in commands flags
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 11:38:50 +01:00
Josh b7ea91278e Merge PR #4719 from @joshnck - Update Rules Related To RunHTMLApplication Abuse
update: Mshtml.DLL RunHTMLApplication Suspicious Usage - Merge overlapping rules and enhance logic to account for new reported bypass
remove: Rundll32 JS RunHTMLApplication Pattern
remove: Suspicious Rundll32 Script in CommandLine 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 11:37:37 +01:00
Nasreddine Bencherchali 906797e3d1 Merge PR #4735 from @nasbench - Slash&Grab Exploitation Related Rule Updates
new: Potentially Suspicious File Download From File Sharing Domain Via PowerShell.EXE
new: Remote Access Tool - ScreenConnect Backstage Mode Anomaly 2
new: Remote Access Tool - ScreenConnect Remote Execution
new: Remote Access Tool - Simple Help Execution
new: ScreenConnect - SlashAndGrab Exploitation Indicators
new: Suspicious File Download From IP Via Wget.EXE - Paths
new: User Added To Highly Privileged Group
update: Suspicious PowerShell IEX Execution Patterns - Enhance coverage by adding new "IEX" variant
update: Weak or Abused Passwords In CLI - Add additional password seen abused in the wild
2024-02-23 23:57:44 +01:00
Gameel Ali 1b0eb51f19 Merge PR #4721 from @MalGamy - Add UA used by RedCurl APT
update: APT User Agent - Add UA used by RedCurl APT 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-15 11:27:43 +01:00
Swachchhanda Shrawan Poudel 7509f6ab6b Merge PR #4698 from @swachchhanda000 - Added rules that detect possible activities associated with services and modules enumeration
Create Release / Create Release (push) Has been cancelled
new: Interesting Service Enumeration Via Sc.EXE
new: Loaded Module Enumeration Via Tasklist.EXE
fix: SC.EXE Query Execution - Add keybase filter 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-12 14:45:36 +01:00
Nasreddine Bencherchali 2acebc90f2 Merge PR #4702 from @nasbench - Rule tuning and updates
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Add additional filter
fix: Outbound RDP Connections Over Non-Standard Tools - Update filters
fix: Rundll32 Execution With Uncommon DLL Extension - Error in filter logic
remove: Suspicious Non-Browser Network Communication With Reddit API
update: BITS Transfer Job Download From File Sharing Domains - Add additional domains
update: Dfsvc.EXE Initiated Network Connection Over Uncommon Port - Update image and list of ports
update: HH.EXE Initiated HTTP Network Connection - Update list of ports
update: Microsoft Binary Suspicious Communication Endpoint - Enhance list of paths and filters
update: Msiexec.EXE Initiated Network Connection Over HTTP - Update destination ports
update: Network Connection Initiated To Mega.nz - Update domains
update: Office Application Initiated Network Connection Over Uncommon Ports - Update list of ports
update: Office Application Initiated Network Connection To Non-Local IP - update list of filters
update: Potential Dead Drop Resolvers - Update domains and filters
update: Remote CHM File Download/Execution Via HH.EXE - Enhance logic
update: Suspicious Download From File-Sharing Website Via Bitsadmin - Add additional domains
update: Suspicious File Download From File Sharing Domain Via Curl.EXE - Add additional domains
update: Suspicious File Download From File Sharing Websites - Add additional domains
update: Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE - Add additional domains
update: Suspicious Remote AppX Package Locations - Add additional domains
update: Unusual File Download From File Sharing Websites - Add additional domains
2024-02-12 12:29:36 +01:00
Qasim Qlf cf84dcda62 Merge PR #4716 from @qasimqlf - Update rule condition and filter
update: External Disk Drive Or USB Storage Device Was Recognized By The System - Update selection to reflect the logic correctly
fix: Uncommon Service Installation Image Path - Update filter logic to use correct modifiers 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-12 11:06:39 +01:00
Qasim Qlf 9ae511ec6f Merge PR #4717 from @qasimqlf - Add missing field name in rule
fix: Outbound RDP Connections Over Non-Standard Tools - Add missing field name
2024-02-12 11:05:21 +01:00
Stephen Lincoln 8eeffa7f74 Merge PR #4705 from @slincoln-aiq - New rule: WMIC Disk and Volume Recon
new: System Disk And Volume Reconnaissance Via Wmic.EXE

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-02-09 11:07:29 +01:00
sai prashanth pulisetti b9c0dd661e Merge PR #4712 from @prashanthpulisetti - Add a rule for Anydesk execution with known compromised certificate
new: Remote Access Tool - AnyDesk Execution With Known Revoked Signing Certificate 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-02-08 16:58:59 +01:00
jstnk9 5fac8cb7df Merge PR #4692 from @jstnk9 - Add new rules related to IExpress abuse
new: New Self Extracting Package Created Via IExpress.EXE
new: Self Extraction Directive File Created In Potentially Suspicious Location
new: Potentially Suspicious Self Extraction Directive File Created
new: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-02-08 16:57:23 +01:00
Stephen Lincoln 66f964f9c4 Merge PR #4704 from @slincoln-aiq - Add RDP reg keys for darkgate malware
update: RDP Sensitive Settings Changed - Add DisableRemoteDesktopAntiAlias and DisableSecuritySettings as seen used by DarkGate malware

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-08 16:28:35 +01:00
Florian Roth eb914a878c Merge PR #4715 from @Neo23x0 - Use Image field in filter
fix: Potential Fake Instance Of Hxtsr.EXE Executed - Use Image field in filter
2024-02-08 16:19:01 +01:00
xiangchen96 6eb7ce7dae Merge PR #4710 from @xiangchen96 - Add ipconfig.io domain
update: Suspicious DNS Query for IP Lookup Service APIs - Add ipconfig.io domain
update: Suspicious Network Connection to IP Lookup Service APIs - Add ipconfig.io domain

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-08 16:16:02 +01:00
xiangchen96 0376019001 Merge PR #4711 from @xiangchen96 - Fix some FP in Rundll32 Execution With Uncommon DLL Extension
update: Rundll32 Execution With Uncommon DLL Extension - Update the selection to allow for additional quoted cases such as rundll32 "shell32.dll",ShellExec_RunDLL <somethin>

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-08 16:11:32 +01:00
Florian Roth 027ba7e903 Merge PR #4703 from @Neo23x0 - Add EventLogCrasher imphash
update: Hacktool Execution - Imphash - Add EventLogCrasher imphash
2024-02-07 14:05:12 +01:00
Mohamed Ashraf 6eaba7e37e Merge PR #4713 from @X-Junior - Update Potential Dead Drop Resolvers rule
update: Potential Dead Drop Resolvers - Add `abuse.ch`
2024-02-06 16:19:32 +01:00
github-actions[bot] 367ebd9395 Merge PR #4700 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test
2024-02-01 02:09:31 +01:00
frack113 ebaa1ab3f8 Merge PR #4697 from @frack113 - Fix errors in rule status and logsource
fix: Potential Dropper Script Execution Via WScript/CScript - Fix error in rule status
fix: HackTool - EDRSilencer Execution - Filter Added - Fix error in logsource
2024-01-31 00:56:01 +01:00
Nasreddine Bencherchali be359ef3f2 Merge PR #4681 from @nasbench - Add Missing Ref & Tags
Create Release / Create Release (push) Has been cancelled
fix: Kerberos Manipulation - Update field to use Status instead of incorrect "FailureCode"
fix: Metasploit SMB Authentication - Remove unnecessary field
fix: Service Installation in Suspicious Folder - Update FP filter
update: Malicious PowerShell Commandlets - ProcessCreation - "Start-Dnscat2"
remove: Dnscat Execution - Deprecated in favour of an integration in the "Malicious PowerShell Cmdlet" type of rules
remove: SAM Dump to AppData
update: Critical Hive In Suspicious Location Access Bits Cleared - Enhance metadata and logic
update: Malicious PowerShell Commandlets - PoshModule - "Start-Dnscat2"
update: Malicious PowerShell Commandlets - ScriptBlock - "Start-Dnscat2"
update: Malicious PowerShell Scripts - FileCreation - Add "dnscat2.ps1"
update: Malicious PowerShell Scripts - PoshModule - Add "dnscat2.ps1"
update: Monitoring For Persistence Via BITS - Use "Image" and "OriginalFileName" fields instead of CLI only
update: New or Renamed User Account with '$' Character - Reduced level to "medium"
update: New Process Created Via Taskmgr.EXE - Added full paths to the filtered binaries to decrease false negatives
update: Potential Dropper Script Execution Via WScript/CScript - Re-wrote the logic by removing the paths "C:\Users" and "C:\ProgramData". As these are very common and will generate high FP rate. Instead switched the paths to a more robust list and extended the list of extension covered. Also reduced the level to "medium"
update: Potential Fake Instance Of Hxtsr.EXE Executed - Remove "C:" prefix from detection logic
update: Prefetch File Deleted - Update selection to remove 'C:' prefix
update: Sensitive File Access Via Volume Shadow Copy Backup - Made the rule more generic by updating the title and removing the IOC from conti. (will be added in a dedicated rule)
update: Shell Process Spawned by Java.EXE - Add "bash.exe"
update: Suspicious PowerShell Download - Powershell Script - Add "DownloadFileAsync" and "DownloadStringAsync" functions
update: Suspicious Processes Spawned by Java.EXE - Remove "bash.exe" as its doesn't fit the logic
update: Sysmon Application Crashed - Add 32bit version of sysmon binary
update: Tap Driver Installation - Security - Reduce level to "low"
update: Write Protect For Storage Disabled - Remove "storagedevicepolicies" as the string "storage" already covers it

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 13:37:20 +01:00
Luca 7f582c3d16 Merge PR #4686 from @CrimpSec - Add new rule for SharpMove based on PE metadata and CLI options
new: HackTool - SharpMove Tool Execution 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 12:03:08 +01:00
Swachchhanda Shrawan Poudel 2fc5330394 Merge PR #4678 from @swachchhanda000 - Adds and updates Pikabot and rundll32 related rules
new: Pikabot Fake DLL Extension Execution Via Rundll32.EXE
update: Potential Pikabot C2 Activity - Added "searchfilterhost.exe"
update: Potential Pikabot Discovery Activity - Added "SearchProtocolHost.exe" and "SearchFilterHost.exe"
update: Potential Pikabot Hollowing Activity - Added "searchfilterhost"
update: Rundll32 Execution With Uncommon DLL Extension - Enhanced FP filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 11:59:52 +01:00
t-pol d7206ad1de Merge PR #4685 from @t-pol - Add EDR-Silencer rule based on filter name indicator
new: HackTool - EDRSilencer Execution - Filter Added 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 11:58:14 +01:00
tr0mb1r 5b3ae271a1 Merge PR #4690 from @tr0mb1r - filter Websense named pipe
fix: CobaltStrike Named Pipe Patterns - Add Websense named pipe filter

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-29 11:50:59 +01:00
Qasim Qlf 7a4eb6cb58 Merge PR #4693 from @qasimqlf - Update selection to remove overlap
chore: PowerShell ShellCode - Remove "selection" as it was overlapping with "selection2"
2024-01-26 12:19:13 +01:00
phantinuss 399cca35df Merge PR #4684 from @phantinuss - Multiple FP fixes & rule updates
fix: Firewall Rule Modified In The Windows Firewall Exception List - new optional filter Brave browser
fix: Outbound RDP Connections Over Non-Standard Tools - new FP filter for RAS TSplus
fix: PowerShell Core DLL Loaded By Non PowerShell Process - new optional filter for chocolatey
fix: Remote Thread Creation In Mstsc.Exe From Suspicious Location - Fix a broken path string
fix: Remote Thread Creation In Uncommon Target Image - Reduce level to medium and remove explorer as target due to FP rates.
fix: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Fix the filters to be more generic
new: Rare Remote Thread Creation By Uncommon Source Image - A split of 66d31e5f-52d6-40a4-9615-002d3789a119
update: All Rules Have Been Deleted From The Windows Firewall Configuration - Remove program files filter to increase coverage. As deleting rules shouldn't be a "normal" behavior.
update: CreateRemoteThread API and LoadLibrary - Reduce level to medium and convert to a TH rule
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add additional paths to increase coverage
update: Powershell Install a DLL in System Directory - enhance rule context in big script blocks
update: Remote Thread Creation By Uncommon Source Image - Reduced level to medium and move high indicators to 02d1d718-dd13-41af-989d-ea85c7fab93f 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-23 12:15:04 +01:00
Swachchhanda Shrawan Poudel 2ee4323654 Merge PR #4679 from @swachchhanda000 - Suspicious unsigned DLL Loaded by RunDLL32/RegSvr32
new: Unsigned DLL Loaded by RunDLL32/RegSvr32
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-22 11:40:10 +01:00
jstnk9 8cc98415b4 Merge PR #4682 from @jstnk9 - Add new rules related to MODE.COM usage in changing code pages
new: CodePage Modification Via MODE.COM
new: CodePage Modification Via MODE.COM To Russian Language 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-22 11:37:16 +01:00
xiangchen96 efb61f92e6 Merge PR #4680 from @xiangchen96 - new domains from miningocean.org
update: Network Communication With Crypto Mining Pool - new domains from `miningocean.org`
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-19 16:48:29 +01:00
tr0mb1r feded2fc13 Merge PR #4672 from @tr0mb1r - move to TH and filter vmware tools
fix: System Information Discovery Via Wmic.EXE - Move to threat hunting and add additional filter to reduce noise coming from VMware Tools

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-15 15:25:04 +01:00
Florian Roth e6e0ffbdce Merge PR #4674 from @Neo23x0 - Increase hack tool coverage
update: Hacktool Execution - Imphash - Add additional imphash values to increase coverage
update: Findstr Launching .lnk File - Increase coverage by adding cases where the commandline ends with a double or a single quote.
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-15 15:24:03 +01:00
Florian Roth 8e064aaac3 Merge PR #4673 from @Neo23x0 - Update broken reference link
chore: update broken link in `NetNTLM Downgrade Attack - Registry`
2024-01-15 11:59:49 +01:00
Bryan Lim 24b9ed72c1 Merge PR #4621 from @zestsg - Add New GCP / Google Workspace Related Rules
new: GCP Break-glass Container Workload Deployed
new: Google Workspace Application Access Levels Modified
new: GCP Access Policy Deleted 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-12 12:49:02 +01:00
frack113 a2f8a82c40 Merge PR #4530 from @frack113 - Pingcastle PUA
new: PUA - PingCastle Execution
new: PUA - PingCastle Execution From Potentially Suspicious Parent
new: Renamed PingCastle Binary Execution
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-12 12:06:49 +01:00
Josh 9bde39e17d Merge PR #4668 from @joshnck - Remove SOFTWARE registry key prefix
update: Potential Persistence Via MyComputer Registry Keys - Remove `SOFTWARE` registry key anchor to increase coverage for `WOW6432Node` cases

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-01-11 12:04:04 +01:00
Anish 49a1b4a187 Merge PR #4665 from @Tuutaans - Add Rule CPL Load From Non Default Location
new: System Control Panel Item Loaded From Uncommon Location

---------

Co-authored-by: abo <abo@logpoint.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-11 09:25:04 +01:00
Gott 60f42340d9 Merge PR #4664 from @danielgottt - Windows Filtering Platform Blocked Connection From EDR Agent Binary
new: Windows Filtering Platform Blocked Connection From EDR Agent Binary

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-11 08:56:17 +01:00
Nasreddine Bencherchali d906eb0497 Merge PR #4662 from @nasbench - Updated and added new rules
new: Potential Persistence Via AppCompat RegisterAppRestart Layer
update: Uncommon Extension Shim Database Installation Via Sdbinst.EXE - Add additional commandline flag that might trigger FPs
update: Hypervisor Enforced Code Integrity Disabled - Add additional path for the HVCI config
update: Creation Of Non-Existent System DLL - Remove driver anchor and the System32 filter. The reason behind this is that an attacker can copy the file elsewhere and then use a system utility such as copy or xcopy located in the system32 folder to create it again. Which will bypass the rule.
update: Potential System DLL Sideloading From Non System Locations - Remove the driver anchor from the filter to catch cases where the system is installed on non default C: driver
update: Potential DLL Sideloading Of Non-Existent DLLs From System Folders - Add SignatureStatus in the filter to exclude only valid signatures and decrease bypass.
remove: Svchost DLL Search Order Hijack - Deprecated in favor of the rule 6b98b92b-4f00-4f62-b4fe-4d1920215771. The reason is that for legit cases where the DLL is still present we can't filter out anything. We assume that the loading is done by a non valid/signed DLLs which will catch most cases. In cas the attacker had the option to sign the DLL with a valid signature he can bypass the rule.

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 20:14:20 +01:00
Stephen Lincoln 7a8672f92b Merge PR #4663 from @slincoln-aiq - Update Disable Windows Defender Features Rules
update: Tamper Windows Defender - ScriptBlockLogging - Add additional PowerShell MpPreference Cmdlets
update: Tamper Windows Defender - PSClassic - Add additional PowerShell MpPreference Cmdlets
update: Powershell Defender Disable Scan Feature - Add additional PowerShell MpPreference Cmdlets 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 19:24:20 +01:00
Qasim Qlf c3463f8bd0 Merge PR #4654 from @qasimqlf - replace hardcoded C: with wildcard
fix: Suspicious Greedy Compression Using Rar.EXE - Fix error in path selection

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 14:51:26 +01:00