Commit Graph

348 Commits

Author SHA1 Message Date
github-actions[bot] b8e67f13d5 Merge PR #4943 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:40 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
github-actions[bot] 73f0078e92 Merge PR #4915 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-15 13:31:18 +02:00
Nasreddine Bencherchali c2915a678b Merge PR #4912 from @nasbench - update pySigma-validators-sigmahq to version 0.7.0 and sigma_cli_conf.yml
chore: update `pySigma-validators-sigmahq` to version 0.7.0 and `sigma_cli_conf.yml`

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-07-11 11:24:01 +02:00
dr0pd34d 5f9d70c0ef Merge PR #4910 from @dr0pd34d - Add Microsoft Word Add-In Loaded
new: Microsoft Word Add-In Loaded 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 02:31:31 +02:00
Nasreddine Bencherchali 9c59a06874 Merge PR #4911 from @nas_bench - Update sigma_cli_conf.yml
chore: update `sigma_cli_conf.yml`
2024-07-11 00:16:05 +02:00
github-actions[bot] 7682688ca9 Merge PR #4892 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:51:28 +02:00
github-actions[bot] 5a05ffc541 Merge PR #4879 from @nasbench - archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-20 11:44:19 +02:00
github-actions[bot] 3be29eb79e Merge PR #4868 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:28:40 +02:00
github-actions[bot] e9cb6fc400 Merge PR #4855 from @nasbench - Update rule ref archive cache
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-05-27 12:53:54 +02:00
Josh 0192a5207e Merge PR #4839 from @joshnck - Add New RDP Connection Initiated From Domain Controller
new: New RDP Connection Initiated From Domain Controller 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:32:09 +02:00
frack113 2cfa9a2d1f Merge PR #4847 from @frack113 - Update test Workflow to use pySigma-validators-sigmahq
chore: update workflow to use "pySigma-validators-sigmahq"
2024-05-10 10:32:54 +02:00
github-actions[bot] 45b93fcfab Merge PR #4842 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-05-02 10:33:45 +02:00
Andreas Braathen 2ef1a3b096 Merge PR #4825 from @netgrain - New analytic for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection - File Creation
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 14:46:07 +02:00
Nasreddine Bencherchali b349447e7d Merge PR #4826 from @nasbench - Add coverage for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-24 14:59:24 +02:00
nikitah4x 5b4bfd6ffd Merge PR #4814 from @nikitah4x - Add new rule to detect MFA bypass in Cisco Duo
new: Cisco Duo Successful MFA Authentication Via Bypass Code

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-17 12:28:38 +02:00
Hongbo ae49e3a465 Merge PR #4787 from @ya0guang - Fix typo in test_logsource.py
chore: fix typo in `test_logsource.py`
2024-04-15 17:00:21 +02:00
Hongbo 9e6952ec6a Merge PR #4789 from @ya0guang - Fix typo in test_rules.py
chore: fix typo in `test_rules.py` condition
2024-04-15 16:58:02 +02:00
Hongbo a235795ddd Merge PR #4790 from @ya0guang - Update test_rules.py
chore: fix typo in `test_rules.py`
2024-04-15 16:56:41 +02:00
github-actions[bot] 9104b4d22b Merge PR #4816 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-04-15 10:25:48 +02:00
github-actions[bot] 720397d731 Merge PR #4792 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-04-01 15:13:17 +02:00
Leo Tsaousis 0d63f52ff5 Merge PR #4694 from @LAripping - Add native Kubernetes detections
new: Container With A hostPath Mount Created
new: Creation Of Pod In System Namespace
new: Deployment Deleted From Kubernetes Cluster
new: Kubernetes Events Deleted
new: Kubernetes Secrets Enumeration
new: New Kubernetes Service Account Created
new: Potential Remote Command Execution In Pod Container
new: Potential Sidecar Injection Into Running Deployment
new: Privileged Container Deployed
new: RBAC Permission Enumeration Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-26 18:26:46 +01:00
security-companion ba2baa1cec Merge PR #4776 from @security-companion - Fix broken reference links
chore: fix some broken reference links

Thanks: @security-companion
2024-03-21 02:38:12 +01:00
Mostafa Moradian d52189daa3 Merge PR #4772 from @mostafa - update sigma validation CI workflow to fix errors
chore: update sigma validation CI workflow to fix errors.
2024-03-15 18:21:15 +01:00
Mostafa Moradian 416de03cdc Merge PR #4769 from @mostafa - Update sigma validation workflow
chore: Add comment to the code
chore: Ignore inaccessible file
chore: Switch to using the action for validating Sigma rules

Thanks: @mostafa
2024-03-15 11:03:15 +01:00
github-actions[bot] 250e7d7fa8 Merge PR #4770 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-03-15 11:02:08 +01:00
Mostafa Moradian 5d39223dd5 Merge PR #4724 from @mostafa - Update validation script and CI
chore: update sigma validation script and CI

Thanks: @mostafa
2024-03-12 12:49:55 +01:00
frack113 48baf1187b Merge PR #4752 from @frack113 - Update rules to use the windash modifier
update: File Enumeration Via Dir Command - Update logic to use a wildcard in addition, for better accuracy.
chore: update multiple rules to use the windash modifier 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-11 12:01:30 +01:00
Josh Brower eac04262c2 Merge PR #4695 from @defensivedepth - Add new rules based on OpenCanary tooling
new: OpenCanary - FTP Login Attempt
new: OpenCanary - GIT Clone Request
new: OpenCanary - HTTP GET Request
new: OpenCanary - HTTP POST Login Attempt
new: OpenCanary - HTTPPROXY Login Attempt
new: OpenCanary - MSSQL Login Attempt Via SQLAuth
new: OpenCanary - MSSQL Login Attempt Via Windows Authentication
new: OpenCanary - MySQL Login Attempt
new: OpenCanary - NTP Monlist Request
new: OpenCanary - REDIS Action Command Attempt
new: OpenCanary - SIP Request
new: OpenCanary - SMB File Open Request
new: OpenCanary - SNMP OID Request
new: OpenCanary - SSH Login Attempt
new: OpenCanary - SSH New Connection Attempt
new: OpenCanary - Telnet Login Attempt
new: OpenCanary - TFTP Request
new: OpenCanary - VNC Connection Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-08 16:24:19 +01:00
github-actions[bot] 24a70692f3 Merge PR #4747 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-03-01 15:38:04 +01:00
Nasreddine Bencherchali 8af1ab8cac Merge PR #4738 from @nasbench - Small fixes and metadata updates
new: HackTool - CobaltStrike Malleable Profile Patterns - Proxy
remove: CobaltStrike Malformed UAs in Malleable Profiles
remove: CobaltStrike Malleable (OCSP) Profile
remove: CobaltStrike Malleable Amazon Browsing Traffic Profile
remove: CobaltStrike Malleable OneDrive Browsing Traffic Profile
remove: iOS Implant URL Pattern
update: Chafer Malware URL Pattern - Reduce level to high and move to ET folder
2024-02-26 22:01:53 +01:00
z00t dbdf7f2424 Merge PR #4737 from @faisalusuf - Add New Bitbucket Related Rules
new: Bitbucket Full Data Export Triggered
new: Bitbucket Global Permission Changed
new: Bitbucket Global Secret Scanning Rule Deleted
new: Bitbucket Global SSH Settings Changed
new: Bitbucket Audit Log Configuration Updated
new: Bitbucket Project Secret Scanning Allowlist Added
new: Bitbucket Secret Scanning Exempt Repository Added
new: Bitbucket Secret Scanning Rule Deleted
new: Bitbucket Unauthorized Access To A Resource
new: Bitbucket Unauthorized Full Data Export Triggered
new: Bitbucket User Details Export Attempt Detected
new: Bitbucket User Login Failure
new: Bitbucket User Login Failure Via SSH
new: Bitbucket User Permissions Export Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-26 21:07:58 +01:00
github-actions[bot] 0993b7852c Merge PR #4722 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-02-15 11:05:58 +01:00
jstnk9 5fac8cb7df Merge PR #4692 from @jstnk9 - Add new rules related to IExpress abuse
new: New Self Extracting Package Created Via IExpress.EXE
new: Self Extraction Directive File Created In Potentially Suspicious Location
new: Potentially Suspicious Self Extraction Directive File Created
new: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-02-08 16:57:23 +01:00
Douglas Rose a572fc50b5 Merge PR #4714 from @douglasrose75 - Add Rule Covering Exploitation Indicators For CVE 2022-42475
new: Exploitation Indicator Of CVE-2022-42475

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-02-08 16:30:44 +01:00
github-actions[bot] 889efd1663 Merge PR #4701 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-02-01 12:12:53 +01:00
Nasreddine Bencherchali be359ef3f2 Merge PR #4681 from @nasbench - Add Missing Ref & Tags
Create Release / Create Release (push) Has been cancelled
fix: Kerberos Manipulation - Update field to use Status instead of incorrect "FailureCode"
fix: Metasploit SMB Authentication - Remove unnecessary field
fix: Service Installation in Suspicious Folder - Update FP filter
update: Malicious PowerShell Commandlets - ProcessCreation - "Start-Dnscat2"
remove: Dnscat Execution - Deprecated in favour of an integration in the "Malicious PowerShell Cmdlet" type of rules
remove: SAM Dump to AppData
update: Critical Hive In Suspicious Location Access Bits Cleared - Enhance metadata and logic
update: Malicious PowerShell Commandlets - PoshModule - "Start-Dnscat2"
update: Malicious PowerShell Commandlets - ScriptBlock - "Start-Dnscat2"
update: Malicious PowerShell Scripts - FileCreation - Add "dnscat2.ps1"
update: Malicious PowerShell Scripts - PoshModule - Add "dnscat2.ps1"
update: Monitoring For Persistence Via BITS - Use "Image" and "OriginalFileName" fields instead of CLI only
update: New or Renamed User Account with '$' Character - Reduced level to "medium"
update: New Process Created Via Taskmgr.EXE - Added full paths to the filtered binaries to decrease false negatives
update: Potential Dropper Script Execution Via WScript/CScript - Re-wrote the logic by removing the paths "C:\Users" and "C:\ProgramData". As these are very common and will generate high FP rate. Instead switched the paths to a more robust list and extended the list of extension covered. Also reduced the level to "medium"
update: Potential Fake Instance Of Hxtsr.EXE Executed - Remove "C:" prefix from detection logic
update: Prefetch File Deleted - Update selection to remove 'C:' prefix
update: Sensitive File Access Via Volume Shadow Copy Backup - Made the rule more generic by updating the title and removing the IOC from conti. (will be added in a dedicated rule)
update: Shell Process Spawned by Java.EXE - Add "bash.exe"
update: Suspicious PowerShell Download - Powershell Script - Add "DownloadFileAsync" and "DownloadStringAsync" functions
update: Suspicious Processes Spawned by Java.EXE - Remove "bash.exe" as its doesn't fit the logic
update: Sysmon Application Crashed - Add 32bit version of sysmon binary
update: Tap Driver Installation - Security - Reduce level to "low"
update: Write Protect For Storage Disabled - Remove "storagedevicepolicies" as the string "storage" already covers it

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 13:37:20 +01:00
frack113 a158d8973f Merge PR #4656 from @frack113 - Upgrade rule promotion script to use pySigma
chore: workflow - update promote_rules_status to pySigma
2024-01-26 12:55:24 +01:00
Mohamed Ashraf 3fb5392490 Merge PR #4675 from @X-Junior - New Emerging Threat Rules For Peach Sandstorm APT
Create Release / Create Release (push) Has been cancelled
new: Peach Sandstorm APT Process Activity Indicators
new: Potential Peach Sandstorm APT C2 Communication Activity 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-15 16:01:07 +01:00
github-actions[bot] 16adc03973 Merge PR #4671 from @nasbench - Archive new rule references and update the cache file
chore: archive new rule references and update the cache file
2024-01-15 14:49:42 +01:00
github-actions[bot] aaebc73537 chore: archive new rule references and update cache file (#4652)
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-01-01 09:01:23 +01:00
Nasreddine Bencherchali e052677142 Merge PR #4577 from @nasbench - Multiple Fixes & Updates
Create Release / Create Release (push) Has been cancelled
fix: Access To Windows Credential History File By Uncommon Application - Enhance FP filters
fix: Access To Windows DPAPI Master Keys By Uncommon Application - Enhance FP filters
fix: Amsi.DLL Load By Uncommon Process - Moved to threat hunting folder and update false positive filters to remove hardcoded C:
fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Typo in condition
fix: Credential Manager Access By Uncommon Application - Enhance FP filters
fix: Elevated System Shell Spawned From Uncommon Parent Location - Enhance FP filters
fix: Execution of Suspicious File Type Extension - Add new extensions to reduce FP
fix: Important Windows Eventlog Cleared - Update selection to remove "Application" log as it was generating a lot of FP in some environments
fix: Malicious PowerShell Commandlets - ScriptBlock - Remove some part of the selection due to FP matches as they were generic cmdlet names
fix: Potential Direct Syscall of NtOpenProcess - Add "Adobe" filter
fix: Potential Shim Database Persistence via Sdbinst.EXE - Update FP filter for "iisexpressshim" sdb
fix: Potentially Suspicious AccessMask Requested From LSASS - Add new FP filter for "procmon" process
fix: PowerView PowerShell Cmdlets - ScriptBlock - Remove some part of the selection due to FP matches as they were generic cmdlet names
fix: PSScriptPolicyTest Creation By Uncommon Process - Add new filter for "sdiagnhost"
fix: Relevant Anti-Virus Signature Keywords In Application Log - Update false positive filters
fix: Remote Access Tool Services Have Been Installed - Security - Fix typo in field name
fix: Suspicious File Creation Activity From Fake Recycle.Bin Folder - Remove RECYCLE.BIN\ as it was added as a typo and is a legitimate location.
fix: Uncommon Child Process Of Conhost.EXE - Add new FP filters
fix: Uncommon File Created In Office Startup Folder - Add new extension to filter out FP generated with MS Access databases
fix: Uncommon PowerShell Hosts - Moved to threat hunting folder and updated false positive filter list
fix: Use Of Remove-Item to Delete File - ScriptBlock - Moved to threat hunting folder and Update logic to be more accurate
fix: User with Privileges Logon - Move to placeholder rules and update the FP filter to account for different workstations
fix: Windows Event Auditing Disabled - Enhance list of false positive filters with additional GUID
fix: WMI Module Loaded By Uncommon Process - Moved to threat hunting folder and update and restructure false positive filters
new: Communication To Uncommon Destination Ports
new: Potentially Suspicious Execution Of Regasm/Regsvcs With Uncommon Extension
remove: Credential Dumping Tools Service Execution
remove: New Service Uses Double Ampersand in Path
remove: Powershell File and Directory Discovery
remove: PowerShell Scripts Run by a Services
remove: Security Event Log Cleared
remove: Suspicious Get-WmiObject
remove: Windows Defender Threat Detection Disabled
update: Access To Browser Credential Files By Uncommon Application - Increase level to medium and enhance filters and selections
update: Add Potential Suspicious New Download Source To Winget - Reduce level to medium
update: ADFS Database Named Pipe Connection By Uncommon Tool - Enhance coverage by improving paths selection
update: CodeIntegrity - Unmet Signing Level Requirements By File Under Validation - Reduce level to low
update: Copy From Or To Admin Share Or Sysvol Folder - Enhance selection to be more accurate
update: Eventlog Cleared - Update FP filter to remove "Application" log and increase coverage
update: Failed Code Integrity Checks - Reduce level to informational
update: HH.EXE Execution - Reduce level to low
update: Locked Workstation - Reduce level to informational
update: Malicious Driver Load By Name - Increase coverage based on LOLDrivers data
update: Meterpreter or Cobalt Strike Getsystem Service Installation - Security - Reduce level to high and restructure selections
update: Meterpreter or Cobalt Strike Getsystem Service Installation - System - Reduce level to high and restructure selections
update: Potential Credential Dumping Activity Via LSASS - Reduce level to medium and comment out noisy access masks
update: Potential PowerShell Execution Policy Tampering - Remove "RemoteSigned" as it doesn't fit with the current logic
update: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location - Reduce level to medium and update logic
update: Potentially Suspicious Malware Callback Communication - Increase coverage by adding new additional ports
update: PUA - Nmap/Zenmap Execution - Reduce level to medium
update: PUA - Process Hacker Execution - Reduce level to medium
update: PUA - Radmin Viewer Utility Execution - Reduce level to medium
update: Rundll32 Execution With Uncommon DLL Extension - Enhance DLL extension list
update: SASS Access From Non System Account - Reduce level to medium and enhance false positive filters
update: Suspicious Executable File Creation - Enhance coverage by removing hardocded "C:"
update: Suspicious Program Location with Network Connections - Increase accuracy by enhancing the selection to focus on the start of the folder and partition
update: Suspicious Schtasks From Env Var Folder - Reduce level to medium
update: Suspicious Shim Database Patching Activity - Add new processes to increase coverage
update: Uncommon Extension Shim Database Installation Via Sdbinst.EXE - Reduce level to medium
update: Whoami Utility Execution - Reduce level to low
update: Whoami.EXE Execution With Output Option - Reduce level to medium
update: Windows Defender Malware Detection History Deletion - Reduce level to informational
update: WMI Event Consumer Created Named Pipe - Reduce leve to medium

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Thanks: @Blackmore-Robert
Thanks: @swachchhanda000
Thanks: @celalettin-turgut
Thanks: @AaronS97
2023-12-21 21:04:18 +01:00
Stephen Lincoln 267de25efb Merge PR #4633 from @slincoln-aiq - New Rules Related To Desktop Background Change
new: Potentially Suspicious Desktop Background Change Using Reg.EXE
new: Potentially Suspicious Desktop Background Change Via Registry 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-21 11:44:52 +01:00
jstnk9 3bb3b9cb5b Merge PR #4615 from @jstnk9 - Update WMIC Discovery Rule + New System Discovery Rules For MacOS
new: System Information Discovery Using Ioreg
new: System Information Discovery Using sw_vers
new: Potential Base64 Decoded From Images
new: System Information Discovery Via Wmic.EXE
update: Uncommon System Information Discovery Via Wmic.EXE - Updated logic to focus on more specific WMIC query sequence to increase the level and added a related rule to cover the missing gaps in d85ecdd7-b855-4e6e-af59-d9c78b5b861e
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-21 11:09:47 +01:00
github-actions[bot] 426ff8c412 Merge PR #4629 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2023-12-15 12:00:29 +01:00
Nasreddine Bencherchali 0e27834c13 Merge PR #4612 from @nasbench - Update Json Schema
chore: update json schema
2023-12-01 22:46:32 +01:00
frack113 3990060d02 Merge PR #4609 from @frack113 - Add More PySigma Validators
chore: Add more pySigma Validator
2023-12-01 15:11:24 +01:00
github-actions[bot] af37ad5c4b Merge PR #4608 from @nasbench - Update Archiver Reference List
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2023-12-01 12:06:18 +01:00
Nasreddine Bencherchali 1559c9d95c Merge PR #4583 from @nasbench - Add CVE-2023-4966 Related Rules
new: CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy
new: CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver
new: CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy
new: CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-11-28 15:54:33 +01:00
frack113 56ac238027 Merge PR #4591 from @frack113 - Update tests to pySigma 0.10.9
chore: update tests to pySigma 0.10.9
chore: add Summiting the Pyramid v1.0.0 tags

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-11-27 09:08:01 +01:00