Commit Graph

9991 Commits

Author SHA1 Message Date
Swachchhanda Shrawan Poudel 4989d43ae9 Merge PR #4946 from @swachchhanda000 - Add Suspicious Process Masquerading As SvcHost.EXE
new: Suspicious Process Masquerading As SvcHost.EXE 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-07 10:48:12 +02:00
Josh 22f02953b5 Merge PR #4952 from @joshnck - Fix Potential DLL Sideloading Of DbgModel.DLL
fix: Potential DLL Sideloading Of DbgModel.DLL - Exclude Dell Support Assistant 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-07 10:25:18 +02:00
GtUGtHGtNDtEUaE 782f0f524e Merge PR #4945 from @GtUGtHGtNDtEUaE - Fix typo in field name for rules leveraging EID 5145
fix: Remote Task Creation via ATSVC Named Pipe - Fixed field name from `Accesses` to `AccessList`
fix: Persistence and Execution at Scale via GPO Scheduled Task - Fixed field name from `Accesses` to `AccessList`
fix: Remote Service Activity via SVCCTL Named Pipe - Fixed field name from `Accesses` to `AccessList`
2024-08-01 22:46:23 +02:00
github-actions[bot] 6b78144668 Merge PR #4942 from @nasbench - promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:14 +02:00
Mohamed Ashraf 65d76a30aa Merge PR #4934 from @X-Junior - Update and add new file_access rules
fix: Access To Potentially Sensitive Sysvol Files By Uncommon Applications - Fix error in filter modifier
new: Access To Chromium Browsers Sensitive Files By Uncommon Applications
new: Access To Crypto Currency Wallets By Uncommon Applications
update: Access To .Reg/.Hive Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Access To Browser Credential Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Access To Windows Credential History File By Uncommon Applications - Update filters
update: Access To Windows DPAPI Master Keys By Uncommon Applications - Update filters
update: Access To Windows Outlook Mail Files By Uncommon Applications - Update filters and move to threat hunting folder
update: Credential Manager Access By Uncommon Applications - Update filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-31 10:33:46 +02:00
Fukusuke Takahashi 41dfd8ff0c Merge PR #4940 from @fukusuket - Update unreachable references blog.menasec[.]net
chore: Suspicious CLR Logs Creation
chore: Remote Task Creation via ATSVC Named Pipe - Zeek
chore: Possible Impacket SecretDump Remote Activity - Zeek
chore: Suspicious PsExec Execution - Zeek
chore: AD Privileged Users or Groups Reconnaissance
chore: Remote Task Creation via ATSVC Named Pipe
chore: Impacket PsExec Execution
chore: Possible Impacket SecretDump Remote Activity
chore: Suspicious PsExec Execution
chore: Remote Service Activity via SVCCTL Named Pipe
chore: Suspicious DotNET CLR Usage Log Artifact
chore: DotNet CLR DLL Loaded By Scripting Applications
chore: Potential Credential Dumping Activity Via LSASS
chore: DNS RCE CVE-2020-1350 

---------

thanks: @fukusuket
2024-07-31 10:16:56 +02:00
fornotes b4efa2198a Merge PR #4933 from @fornotes - Add Remote Thread Created In Shell Application
new : Remote Thread Created In Shell Application 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-29 22:48:11 +02:00
Nasreddine Bencherchali 779111a0dd Merge PR #4928 from @nasbench - Fix FPs and issues found in testing
fix: Potential DLL Sideloading Of DbgModel.DLL - Update selection name to match the condition
fix: NTLM Logon - Remove unnecessary field
fix: Potential Commandline Obfuscation Using Unicode Characters - Remove legitimate currency characters as they could be used in document names
fix: Suspicious SYSTEM User Process Creation - Update `ping` filter to account for other FP variants found in the wild.
2024-07-24 09:22:49 +02:00
fornotes ab325541c2 Merge PR #4924 from @fornotes - Fix Anydesk Temporary Artefact
fix: Anydesk Temporary Artefact - Remove unnecessary logic from the detection section.
2024-07-23 15:09:22 +02:00
Matt Anderson 6df2ba31ba Merge PR #4919 from @MATTANDERS0N - Added new detections related BOINC
new: Headless Process Launched Via Conhost.EXE
new: Potential BOINC Software Execution (UC-Berkeley Signature)
new: Powershell Executed From Headless ConHost Process
new: Process Launched Without Image Name
new: Renamed BOINC Client Execution 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-23 15:06:26 +02:00
fornotes b53c9bd2f6 Merge PR #4920 from @fornotes - Update file_access based rules
new: Unattend.XML File Access Attempt
new: Microsoft Teams Sensitive File Access By Uncommon Application
remove: Suspicious File Event With Teams Objects
remove: Suspicious Unattend.xml File Access
chore: rename multiple `file_access` rules to follow the SigmaHQ convention

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 18:53:48 +02:00
Florian Roth 49f757197a Merge PR #4917 from @Neo23x0 - Update antivirus related rules
update: Antivirus Exploitation Framework Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Hacktool Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Password Dumper Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Ransomware Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Relevant File Paths Alerts - Add additional keywords and strings to enhance coverage
update: Antivirus Web Shell Detection - Add additional keywords and strings to enhance coverage
update: Relevant Anti-Virus Signature Keywords In Application Log - Add additional keywords and strings to enhance coverage 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-17 16:35:51 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
frack113 3c7fcf6bbb Merge PR #4916 from @frack113 - Move some rules to Emerging-Threats folder
chore: OceanLotus Registry Activity - move to emerging-threats
chore: OilRig APT Registry Persistence - move to emerging-threats
chore: Potential Ursnif Malware Activity - Registry - move to emerging-threats
chore: Leviathan Registry Key Activity - move to emerging-threats
2024-07-17 10:28:18 +02:00
sai prashanth pulisetti 568f1aef33 Merge PR #4878 from @prashanthpulisetti - Update "Create Remote Thread" based rules
update: Rare Remote Thread Creation By Uncommon Source Image - Add dialer.exe
update: Remote Thread Creation By Uncommon Source Image - Update filters
update: Remote Thread Creation In Uncommon Target Image - Update filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-15 15:26:33 +02:00
nischalkhadgi62 96f5ae8cff Merge PR #4903 from @nischalkhadgi62 - Add Directory Service Restore Mode(DSRM) Registry Value Tampering
new: Directory Service Restore Mode(DSRM) Registry Value Tampering 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 23:18:19 +02:00
Josh 784ae8d01a Merge PR #4902 from @joshnck - Add BitlockerTogo.EXE Execution
new: BitlockerTogo.EXE Execution 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 20:22:59 +02:00
fornotes d4cb9fde6f Merge PR #4906 from @fornotes - Update and add new dll sideloading rules
update: Potential System DLL Sideloading From Non System Locations - Add new entries to increase coverage
new: Potential DLL Sideloading Of DbgModel.DLL
new: Potential DLL Sideloading Of MpSvc.DLL
new: Potential DLL Sideloading Of MsCorSvc.DLL 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 12:57:37 +02:00
Nasreddine Bencherchali c2915a678b Merge PR #4912 from @nasbench - update pySigma-validators-sigmahq to version 0.7.0 and sigma_cli_conf.yml
chore: update `pySigma-validators-sigmahq` to version 0.7.0 and `sigma_cli_conf.yml`

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-07-11 11:24:01 +02:00
Swachchhanda Shrawan Poudel 0bb6f0c0d7 Merge PR #4831 from @swachchhanda000 - Add Kapeka backdoor related Sigma rules
new: Kapeka Backdoor Autorun Persistence
new: Kapeka Backdoor Configuration Persistence
new: Kapeka Backdoor Execution Via RunDLL32.EXE
new: Kapeka Backdoor Loaded Via Rundll32.EXE
new: Kapeka Backdoor Persistence Activity
new: Kapeka Backdoor Scheduled Task Creation
new: Potential Kapeka Decrypted Backdoor Indicator 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-04 00:17:47 +02:00
rahulchandran19 651bee3ee6 Merge PR #4894 from @rahulchandran19 - Fix broken logic with Application Removed Via Wmic.EXE
fix: Application Removed Via Wmic.EXE - Add missing "all" modifier to fix the broken logic. 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-02 12:06:46 +02:00
Ryan Plas 1d40f1d20b Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
chore: update Microsoft references link to use the "learn" subdomain instead of "docs". 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @ryanplasma
2024-07-02 12:00:11 +02:00
github-actions[bot] 47085e9489 Merge PR #4891 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:42:32 +02:00
Nasreddine Bencherchali 5ea4f993ee Update Rules (#4872)
chore: delete "Pipfile" and "Pipfile.lock"
fix: Filter Driver Unloaded Via Fltmc.EXE - Add exclusion for ManageEngine
fix: Suspicious Child Process Of Wermgr.EXE - Exclude "WerConCpl.dll"
new: DNS Query To AzureWebsites.NET By Non-Browser Process
new: Files With System DLL Name In Unsuspected Locations
new: HackTool - Evil-WinRm Execution - PowerShell Module
new: HackTool - LaZagne Execution
new: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process
update: Copying Sensitive Files with Credential Data - Use "windash" modifier
update: Explorer Process Tree Break - Use "windash" modifier
update: Files With System Process Name In Unsuspected Locations - Remove old filter
update: Lolbin Unregmp2.exe Use As Proxy - Use "windash" modifier
update: LSASS Process Reconnaissance Via Findstr.EXE - Use "windash" modifier
update: New Remote Desktop Connection Initiated Via Mstsc.EXE - Use "windash" modifier
update: Potential Proxy Execution Via Explorer.EXE From Shell Process - Update metadata and moved to Threat Hunting folder
update: Potential Windows Defender AV Bypass Via Dump64.EXE Rename - Enhance logic
update: Renamed ProcDump Execution - Add new flag option
update: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location - Use "windash" modifier

---------

Thanks: @qasimqlf
Thanks: @celalettin-turgut
Thanks: @cY83rR0H1t
2024-06-25 11:26:45 +02:00
Andreas Braathen 5397ea4f0a Merge PR #4882 from @netgrain - New rules related to LocaltoNet tunneling
new: Communication To LocaltoNet Tunneling Service Initiated
new: Communication To LocaltoNet Tunneling Service Initiated - Linux 

---------

Co-authored-by: Andreas Braathen <andreasb@mnemonic.io>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-20 13:09:49 +02:00
Arnim Rupp 0ccbda753a Merge PR #4873 from @ruppde - Add the string "mikatz" to relevant rules
update: Antivirus Hacktool Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Antivirus Password Dumper Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Relevant Anti-Virus Signature Keywords In Application Log - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 23:17:16 +02:00
z00t 06eaf2c1de Merge PR #4778 from @faisalusuf - Add new rule covering suspicious usage of Qemu
new: Potentially Suspicious Usage Of Qemu

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: threatHNTR
2024-06-03 14:23:51 +02:00
Sajid Nawaz Khan 09b822cfec Merge PR #4869 from @ssnkhan - Add new rules detecting Windows Recall feature enabling
new: Windows Recall Feature Enabled Via Reg.EXE
new: Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted
new: Windows Recall Feature Enabled - Registry 

---------

Co-authored-by: Sajid Nawaz Khan <snkhan@Sajids-MacBook-Pro.local>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-03 12:13:50 +02:00
github-actions[bot] d84959e50f Merge PR #4867 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:29:22 +02:00
Florian Roth 2bf502fb9c Merge PR #4866 from @Neo23x0 - Update network connection rules
new: Network Connection Initiated From Users\Public Folder
update: Outbound Network Connection Initiated By Cmstp.EXE - Exclude local IPs and ranges
update: Network Connection Initiated To Mega.nz - Reduce level to "low"
new: Network Communication Initiated To Portmap.IO Domain
update: Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder - Add additional file paths
update: Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location - Add additional file paths
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 13:53:53 +02:00
skaynum 9f10345076 Merge PR #4840 from @skaynum - Add new rules related to MySQL daemon and potential phishing attempts
new: Uncommon File Creation By Mysql Daemon Process
new: Potential Suspicious Browser Launch From Document Reader Process
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 16:48:54 +02:00
Vasiliy Burov 92fd446b7d Merge PR #4859 from @vburov - Update casing of Win32_ShadowCopy for multiple rules
chore: update casing of `Win32_ShadowCopy` for multiple rules

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:33:46 +02:00
CR-OfirTal 4163fde77f Merge PR #4860 from @CR-OfirTal - Fix a typo in the regex of some rules
remove: Potential NT API Stub Patching
fix: Dynamic .NET Compilation Via Csc.EXE - Fix typo in regex
fix: Csc.EXE Execution Form Potentially Suspicious Parent - Fix typo in regex
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:27:34 +02:00
frack113 1c1081d87a Merge PR #4862 from @frack113 - Add Uncommon Process Access Rights For Target Image
new: Uncommon Process Access Rights For Target Image

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:23:52 +02:00
Kamran Saifullah 2fcf250978 Merge PR #4863 from @deFr0ggy - Add network connection counterpart rule for cloudflare tunnels
update: Cloudflared Tunnels Related DNS Requests - Update description and related field
new: Network Connection Initiated To Cloudflared Tunnels Domains
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 13:10:06 +02:00
JeremyH f334abfd29 Remove smart quotes from file_event_win_iphlpapi_dll_sideloading.yml (#4856) 2024-05-15 22:21:50 +02:00
Nasreddine Bencherchali ed789f54ce Merge PR #4853 from @nasbench - Add some cosmetic changes and small updates
Create Release / Create Release (push) Has been cancelled
update: Potentially Suspicious Execution Of PDQDeployRunner - Add additional processes to the list
update: Use Icacls to Hide File to Everyone - Remove "C:\Users" to increase coverage
2024-05-13 16:59:44 +02:00
Swachchhanda Shrawan Poudel bd454b60aa Merge PR #4818 from @swachchhanda000 - Add Potentially Suspicious Child Process Of KeyScrambler.exe
new: Potentially Suspicious Child Process Of KeyScrambler.exe 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:48:35 +02:00
frack113 fb3a72b433 Merge PR #4852 from @frack113 - Add Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock
new: Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:18:39 +02:00
frack113 7d6f32d1be Merge PR #4850 from @frack113 - Cleanup rule conditions to align with standard
chore: Cleanup conditions
update: Scheduled Task Creation From Potential Suspicious Parent Location - Add additional "temporary folder" locations.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 12:10:33 +02:00
frack113 aaf51bf880 Merge PR #4830 from @frack113 - Enhance Wbadmin based rules
new: All Backups Deleted Via Wbadmin.EXE
new: Sensitive File Dump Via Wbadmin.EXE
new: File Recovery From Backup Via Wbadmin.EXE
new: Sensitive File Recovery From Backup Via Wbadmin.EXE
update: Windows Backup Deleted Via Wbadmin.EXE - Enhance logic and increase coverage

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 11:15:30 +02:00
frack113 fe26ffa0f2 Merge PR #4838 from @frack113 - Add Access To Windows Outlook Mail Files By Uncommon Application
new: Access To Windows Outlook Mail Files By Uncommon Application

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:56:57 +02:00
frack113 392e3a39c8 Merge PR #4843 from @frack113 - Add New-NetFirewallRule usage related rules
new: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add new EID and paths
update: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Add new EID and paths

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 15:58:39 +02:00
frack113 7cdcb7605c Merge PR #4844 from @frack113 - Update UAC based rules
update: UAC Disabled - update metadata
new: UAC Secure Desktop Prompt Disabled
new: UAC Notification Disabled 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 13:39:30 +02:00
github-actions[bot] f7ec533704 Merge PR #4841 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from "experimental" to "test"
2024-05-02 10:34:25 +02:00
Expected 39db80478e Merge PR #4834 from @CertainlyP - Add Outbound Network Connection Initiated By Microsoft Dialer
Create Release / Create Release (push) Has been cancelled
new: Outbound Network Connection Initiated By Microsoft Dialer 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-29 12:54:38 +02:00
Nasreddine Bencherchali 481337a8c3 Merge PR #4837 from @nasbench - fix fp reported in #4820
fix: ADS Zone.Identifier Deleted By Uncommon Application - Filter out "chrome" and "firefox" processes.
2024-04-26 15:39:44 +02:00
Nasreddine Bencherchali f61c1f4509 Merge PR #4832 from @nasbench - Update LOLBIN rules
update: Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE - Update logic to add additional variation of the extensions
update: Arbitrary File Download Via ConfigSecurityPolicy.EXE - Update description
update: C# IL Code Compilation Via Ilasm.EXE - Add flags to increase accuracy of the rule instead of it focusing on "any" execution
update: COM Object Execution via Xwizard.EXE - Update logic
update: JScript Compiler Execution - Update metadata
update: ManageEngine Endpoint Central Dctask64.EXE Potential Abuse - Update logic to account for flags and increase accuracy
update: Potential Application Whitelisting Bypass via Dnx.EXE - Update description
update: Potential Arbitrary Command Execution Via FTP.EXE - Use "windash" modifier and update description
update: Potential Arbitrary File Download Via Cmdl32.EXE - Remove unnecessary spaces to account for flags being at the end.
update: Renamed ZOHO Dctask64 Execution - Add additional imphash values
update: Windows Kernel Debugger Execution - Reduce level to "medium"
update: Xwizard.EXE Execution From Non-Default Location - Update description

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-26 13:40:11 +02:00
frack113 22b3416fee Merge PR #4829 from @frack113 - Add Network Connection Initiated By RegAsm.EXE
new: Network Connection Initiated By RegAsm.EXE
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-25 16:31:56 +02:00
dan21san c31507f74e Merge PR #4824 from @dan21san - New PUA SoftPerfect
new: PUA - SoftPerfect Netscan Execution

---------

Co-authored-by: Degasperi <Daniel.Degasperi.ext@wuerth-phoenix.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 15:18:58 +02:00