Commit Graph

12578 Commits

Author SHA1 Message Date
Swachchhanda Shrawan Poudel 4989d43ae9 Merge PR #4946 from @swachchhanda000 - Add Suspicious Process Masquerading As SvcHost.EXE
new: Suspicious Process Masquerading As SvcHost.EXE 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-07 10:48:12 +02:00
Josh 22f02953b5 Merge PR #4952 from @joshnck - Fix Potential DLL Sideloading Of DbgModel.DLL
fix: Potential DLL Sideloading Of DbgModel.DLL - Exclude Dell Support Assistant 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-07 10:25:18 +02:00
GtUGtHGtNDtEUaE 782f0f524e Merge PR #4945 from @GtUGtHGtNDtEUaE - Fix typo in field name for rules leveraging EID 5145
fix: Remote Task Creation via ATSVC Named Pipe - Fixed field name from `Accesses` to `AccessList`
fix: Persistence and Execution at Scale via GPO Scheduled Task - Fixed field name from `Accesses` to `AccessList`
fix: Remote Service Activity via SVCCTL Named Pipe - Fixed field name from `Accesses` to `AccessList`
2024-08-01 22:46:23 +02:00
github-actions[bot] 6b78144668 Merge PR #4942 from @nasbench - promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:14 +02:00
Mohamed Ashraf 65d76a30aa Merge PR #4934 from @X-Junior - Update and add new file_access rules
fix: Access To Potentially Sensitive Sysvol Files By Uncommon Applications - Fix error in filter modifier
new: Access To Chromium Browsers Sensitive Files By Uncommon Applications
new: Access To Crypto Currency Wallets By Uncommon Applications
update: Access To .Reg/.Hive Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Access To Browser Credential Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Access To Windows Credential History File By Uncommon Applications - Update filters
update: Access To Windows DPAPI Master Keys By Uncommon Applications - Update filters
update: Access To Windows Outlook Mail Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Credential Manager Access By Uncommon Applications - Update filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-31 10:33:46 +02:00
Fukusuke Takahashi 41dfd8ff0c Merge PR #4940 from @fukusuket - Update unreachable references blog.menasec[.]net
chore: Suspicious CLR Logs Creation
chore: Remote Task Creation via ATSVC Named Pipe - Zeek
chore: Possible Impacket SecretDump Remote Activity - Zeek
chore: Suspicious PsExec Execution - Zeek
chore: AD Privileged Users or Groups Reconnaissance
chore: Remote Task Creation via ATSVC Named Pipe
chore: Impacket PsExec Execution
chore: Possible Impacket SecretDump Remote Activity
chore: Suspicious PsExec Execution
chore: Remote Service Activity via SVCCTL Named Pipe
chore: Suspicious DotNET CLR Usage Log Artifact
chore: DotNet CLR DLL Loaded By Scripting Applications
chore: Potential Credential Dumping Activity Via LSASS
chore: DNS RCE CVE-2020-1350 

---------

thanks: @fukusuket
2024-07-31 10:16:56 +02:00
Romain Gaillard e1803cbc8e Merge PR #4931 from @romain-gaillard - Add additional GitHub audit detection rules
new: Github SSH Certificate Configuration Changed
new: Github Fork Private Repositories Setting Enabled/Cleared
new: Github Repository/Organization Transferred 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-29 23:17:11 +02:00
fornotes b4efa2198a Merge PR #4933 from @fornotes - Add Remote Thread Created In Shell Application
new : Remote Thread Created In Shell Application 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-29 22:48:11 +02:00
Nasreddine Bencherchali 779111a0dd Merge PR #4928 from @nasbench - Fix FPs and issues found in testing
fix: Potential DLL Sideloading Of DbgModel.DLL - Update selection name to match the condition
fix: NTLM Logon - Remove unnecessary field
fix: Potential Commandline Obfuscation Using Unicode Characters - Remove legitimate currency characters as they could be used in document names
fix: Suspicious SYSTEM User Process Creation - Update `ping` filter to account for other FP variants found in the wild.
2024-07-24 09:22:49 +02:00
fornotes ab325541c2 Merge PR #4924 from @fornotes - Fix Anydesk Temporary Artefact
fix: Anydesk Temporary Artefact - Remove unnecessary logic from the detection section.
2024-07-23 15:09:22 +02:00
Matt Anderson 6df2ba31ba Merge PR #4919 from @MATTANDERS0N - Added new detections related BOINC
new: Headless Process Launched Via Conhost.EXE
new: Potential BOINC Software Execution (UC-Berkeley Signature)
new: Powershell Executed From Headless ConHost Process
new: Process Launched Without Image Name
new: Renamed BOINC Client Execution 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-23 15:06:26 +02:00
fornotes b53c9bd2f6 Merge PR #4920 from @fornotes - Update file_access based rules
new: Unattend.XML File Access Attempt
new: Microsoft Teams Sensitive File Access By Uncommon Application
remove: Suspicious File Event With Teams Objects
remove: Suspicious Unattend.xml File Access
chore: rename multiple `file_access` rules to follow the SigmaHQ convention

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 18:53:48 +02:00
Romain Gaillard 29d06798b3 Merge PR #4922 from @romain-gaillard - Update Github High Risk Configuration Disabled
update: Github High Risk Configuration Disabled - Add `business_advanced_security.disabled`, `business_advanced_security.disabled_for_new_repos`, `business_advanced_security.disabled_for_new_user_namespace_repos`, `business_advanced_security.user_namespace_repos_disabled`, `org.advanced_security_disabled_for_new_repos`, `org.advanced_security_disabled_on_all_repos` 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 10:43:48 +02:00
Romain Gaillard bcb5e6b218 Merge PR #4921 from @romain-gaillard - update Github Secret Scanning Feature Disabled
update: Github Secret Scanning Feature Disabled - Add `secret_scanning_new_repos.disable` 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 10:42:22 +02:00
Florian Roth 49f757197a Merge PR #4917 from @Neo23x0 - Update antivirus related rules
update: Antivirus Exploitation Framework Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Hacktool Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Password Dumper Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Ransomware Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Relevant File Paths Alerts - Add additional keywords and strings to enhance coverage
update: Antivirus Web Shell Detection - Add additional keywords and strings to enhance coverage
update: Relevant Anti-Virus Signature Keywords In Application Log - Add additional keywords and strings to enhance coverage 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-17 16:35:51 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
frack113 3c7fcf6bbb Merge PR #4916 from @frack113 - Move some rules to Emerging-Threats folder
chore: OceanLotus Registry Activity - move to emerging-threats
chore: OilRig APT Registry Persistence - move to emerging-threats
chore: Potential Ursnif Malware Activity - Registry - move to emerging-threats
chore: Leviathan Registry Key Activity - move to emerging-threats
2024-07-17 10:28:18 +02:00
sai prashanth pulisetti 568f1aef33 Merge PR #4878 from @prashanthpulisetti - Update "Create Remote Thread" based rules
update: Rare Remote Thread Creation By Uncommon Source Image - Add dialer.exe
update: Remote Thread Creation By Uncommon Source Image - Update filters
update: Remote Thread Creation In Uncommon Target Image - Update filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-15 15:26:33 +02:00
nischalkhadgi62 96f5ae8cff Merge PR #4903 from @nischalkhadgi62 - Add Directory Service Restore Mode(DSRM) Registry Value Tampering
new: Directory Service Restore Mode(DSRM) Registry Value Tampering 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 23:18:19 +02:00
Josh 784ae8d01a Merge PR #4902 from @joshnck - Add BitlockerTogo.EXE Execution
new: BitlockerTogo.EXE Execution 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 20:22:59 +02:00
Nick Moore 97034d23b6 Merge PR #4899 from @kelnage - Add Kubernetes rules in audit log format
new: Kubernetes Admission Controller Modification
new: Kubernetes CronJob/Job Modification
new: Kubernetes Rolebinding Modification
new: Kubernetes Secrets Modified or Deleted
new: Kubernetes Unauthorized or Unauthenticated Access 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 16:09:01 +02:00
James C f95d5397b5 Merge PR #4900 from @jamesc-grafana - Add new AWS cloudtrail rules
new: Ingress/Egress Security Group Modification
new: LoadBalancer Security Group Modification
new: Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure
new: New Network ACL Entry Added
new: New Network Route Added
new: Potential Malicious Usage of CloudTrail System Manager
new: RDS Database Security Group Modification 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 14:42:54 +02:00
fornotes d4cb9fde6f Merge PR #4906 from @fornotes - Update and add new dll sideloading rules
update: Potential System DLL Sideloading From Non System Locations - Add new entries to increase coverage
new: Potential DLL Sideloading Of DbgModel.DLL
new: Potential DLL Sideloading Of MpSvc.DLL
new: Potential DLL Sideloading Of MsCorSvc.DLL 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 12:57:37 +02:00
Nasreddine Bencherchali c2915a678b Merge PR #4912 from @nasbench - update pySigma-validators-sigmahq to version 0.7.0 and sigma_cli_conf.yml
chore: update `pySigma-validators-sigmahq` to version 0.7.0 and `sigma_cli_conf.yml`

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-07-11 11:24:01 +02:00
Nick Moore b584e19978 Merge PR #4905 from @kelnage - Fix error in field name
fix: Potential Bucket Enumeration on AWS - Fix error in field name
2024-07-11 00:19:55 +02:00
Cygnetix dc35ae5600 Merge PR #4904 from @cygnetix - Fix typo in Suspicious SignIns From A Non Registered Device
chore: fix typo in `Suspicious SignIns From A Non Registered Device`

Thanks: cygnetix
2024-07-09 11:01:08 +02:00
Swachchhanda Shrawan Poudel 0bb6f0c0d7 Merge PR #4831 from @swachchhanda000 - Add Kapeka backdoor related Sigma rules
new: Kapeka Backdoor Autorun Persistence
new: Kapeka Backdoor Configuration Persistence
new: Kapeka Backdoor Execution Via RunDLL32.EXE
new: Kapeka Backdoor Loaded Via Rundll32.EXE
new: Kapeka Backdoor Persistence Activity
new: Kapeka Backdoor Scheduled Task Creation
new: Potential Kapeka Decrypted Backdoor Indicator 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-04 00:17:47 +02:00
rahulchandran19 651bee3ee6 Merge PR #4894 from @rahulchandran19 - Fix broken logic with Application Removed Via Wmic.EXE
fix: Application Removed Via Wmic.EXE - Add missing "all" modifier to fix the broken logic. 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-02 12:06:46 +02:00
Ryan Plas 1d40f1d20b Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
chore: update Microsoft references link to use the "learn" subdomain instead of "docs". 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @ryanplasma
2024-07-02 12:00:11 +02:00
github-actions[bot] 47085e9489 Merge PR #4891 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:42:32 +02:00
Nick Moore 71867434d7 Merge PR #4890 from @kelnage - Update New Behaviours Okta Admin Console rule
update: Okta New Admin Console Behaviours - update to reflect Okta log data structure
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-26 23:31:17 +02:00
Nasreddine Bencherchali 5ea4f993ee Update Rules (#4872)
chore: delete "Pipfile" and "Pipfile.lock"
fix: Filter Driver Unloaded Via Fltmc.EXE - Add exclusion for ManageEngine
fix: Suspicious Child Process Of Wermgr.EXE - Exclude "WerConCpl.dll"
new: DNS Query To AzureWebsites.NET By Non-Browser Process
new: Files With System DLL Name In Unsuspected Locations
new: HackTool - Evil-WinRm Execution - PowerShell Module
new: HackTool - LaZagne Execution
new: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process
update: Copying Sensitive Files with Credential Data - Use "windash" modifier
update: Explorer Process Tree Break - Use "windash" modifier
update: Files With System Process Name In Unsuspected Locations - Remove old filter
update: Lolbin Unregmp2.exe Use As Proxy - Use "windash" modifier
update: LSASS Process Reconnaissance Via Findstr.EXE - Use "windash" modifier
update: New Remote Desktop Connection Initiated Via Mstsc.EXE - Use "windash" modifier
update: Potential Proxy Execution Via Explorer.EXE From Shell Process - Update metadata and moved to Threat Hunting folder
update: Potential Windows Defender AV Bypass Via Dump64.EXE Rename - Enhance logic
update: Renamed ProcDump Execution - Add new flag option
update: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location - Use "windash" modifier

---------

Thanks: @qasimqlf
Thanks: @celalettin-turgut
Thanks: @cY83rR0H1t
2024-06-25 11:26:45 +02:00
Andreas Braathen 5397ea4f0a Merge PR #4882 from @netgrain - New rules related to LocaltoNet tunneling
new: Communication To LocaltoNet Tunneling Service Initiated
new: Communication To LocaltoNet Tunneling Service Initiated - Linux 

---------

Co-authored-by: Andreas Braathen <andreasb@mnemonic.io>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-20 13:09:49 +02:00
Arnim Rupp 0ccbda753a Merge PR #4873 from @ruppde - Add the string "mikatz" to relevant rules
update: Antivirus Hacktool Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Antivirus Password Dumper Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Relevant Anti-Virus Signature Keywords In Application Log - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 23:17:16 +02:00
Daniel Cortez d7bd6001d1 Merge PR #4773 from @DefenderDaniel - Add rules covering Nscurl usage
new: File Download Via Nscurl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 10:22:39 +02:00
z00t 06eaf2c1de Merge PR #4778 from @faisalusuf - Add new rule covering suspicious usage of Qemu
new: Potentially Suspicious Usage Of Qemu

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: threatHNTR
2024-06-03 14:23:51 +02:00
Sajid Nawaz Khan 09b822cfec Merge PR #4869 from @ssnkhan - Add new rules detecting Windows Recall feature enabling
new: Windows Recall Feature Enabled Via Reg.EXE
new: Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted
new: Windows Recall Feature Enabled - Registry 

---------

Co-authored-by: Sajid Nawaz Khan <snkhan@Sajids-MacBook-Pro.local>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-03 12:13:50 +02:00
github-actions[bot] d84959e50f Merge PR #4867 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:29:22 +02:00
Florian Roth 2bf502fb9c Merge PR #4866 from @Neo23x0 - Update network connection rules
new: Network Connection Initiated From Users\Public Folder
update: Outbound Network Connection Initiated By Cmstp.EXE - Exclude local IPs and ranges
update: Network Connection Initiated To Mega.nz - Reduce level to "low"
new: Network Communication Initiated To Portmap.IO Domain
update: Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder - Add additional file paths
update: Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location - Add additional file paths
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 13:53:53 +02:00
pratinavchandra 9bfe3d6e62 Merge PR #4865 from @pratinavchandra - Add new rules related to "tmutil" potential abuse
new: Time Machine Backup Deletion Attempt Via Tmutil - MacOS
new: Time Machine Backup Disabled Via Tmutil - MacOS
new: New File Exclusion Added To Time Machine Via Tmutil - MacOS

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 12:52:55 +02:00
Cygnetix ae45e83c73 Merge PR #4864 from @cygnetix - Update CA Policy Updated by Non Approved Actor
update: CA Policy Updated by Non Approved Actor - detect using a map of fields instead of a list
2024-05-28 15:20:18 +02:00
pratinavchandra 6a5cf5c37c Merge PR #4785 from @pratinavchandra - add System Information Discovery Via Sysctl - MacOS
new: System Information Discovery Via Sysctl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 18:05:09 +02:00
skaynum 9f10345076 Merge PR #4840 from @skaynum - Add new rules related to MySQL daemon and potential phishing attempts
new: Uncommon File Creation By Mysql Daemon Process
new: Potential Suspicious Browser Launch From Document Reader Process
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 16:48:54 +02:00
Vasiliy Burov 92fd446b7d Merge PR #4859 from @vburov - Update casing of Win32_ShadowCopy for multiple rules
chore: update casing of `Win32_ShadowCopy` for multiple rules

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:33:46 +02:00
CR-OfirTal 4163fde77f Merge PR #4860 from @CR-OfirTal - Fix a typo in the regex of some rules
remove: Potential NT API Stub Patching
fix: Dynamic .NET Compilation Via Csc.EXE - Fix typo in regex
fix: Csc.EXE Execution Form Potentially Suspicious Parent - Fix typo in regex
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:27:34 +02:00
frack113 1c1081d87a Merge PR #4862 from @frack113 - Add Uncommon Process Access Rights For Target Image
new: Uncommon Process Access Rights For Target Image

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:23:52 +02:00
Kamran Saifullah 2fcf250978 Merge PR #4863 from @deFr0ggy - Add network connection counterpart rule for cloudflare tunnels
update: Cloudflared Tunnels Related DNS Requests - Update description and related field
new: Network Connection Initiated To Cloudflared Tunnels Domains
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 13:10:06 +02:00
JeremyH f334abfd29 Remove smart quotes from file_event_win_iphlpapi_dll_sideloading.yml (#4856) 2024-05-15 22:21:50 +02:00
Nasreddine Bencherchali ed789f54ce Merge PR #4853 from @nasbench - Add some cosmetic changes and small updates
Create Release / Create Release (push) Has been cancelled
update: Potentially Suspicious Execution Of PDQDeployRunner - Add additional processes to the list
update: Use Icacls to Hide File to Everyone - Remove "C:\Users" to increase coverage
2024-05-13 16:59:44 +02:00
pratinavchandra 2837671f38 Merge PR #4782 from @pratinavchandra - Add Launch Agent/Daemon Execution Via Launchctl
new: Launch Agent/Daemon Execution Via Launchctl 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 16:55:33 +02:00