Commit Graph

16304 Commits

Author SHA1 Message Date
Romain Gaillard bcb5e6b218 Merge PR #4921 from @romain-gaillard - update Github Secret Scanning Feature Disabled
update: Github Secret Scanning Feature Disabled - Add `secret_scanning_new_repos.disable` 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 10:42:22 +02:00
Josh 6dd993aa24 Merge PR #4918 from @joshnck - Update goodlog-tests.yml
chore: Update `goodlog-tests.yml` - Explicitly add the execute permission to the `.github/workflows/matchgrep.sh` via `chmod +x` 

---------

thanks: @joshnck
2024-07-19 11:19:33 +02:00
Florian Roth 49f757197a Merge PR #4917 from @Neo23x0 - Update antivirus related rules
update: Antivirus Exploitation Framework Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Hacktool Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Password Dumper Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Ransomware Detection - Add additional keywords and strings to enhance coverage
update: Antivirus Relevant File Paths Alerts - Add additional keywords and strings to enhance coverage
update: Antivirus Web Shell Detection - Add additional keywords and strings to enhance coverage
update: Relevant Anti-Virus Signature Keywords In Application Log - Add additional keywords and strings to enhance coverage 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-17 16:35:51 +02:00
Nasreddine Bencherchali af9ffdb2fd Merge branch 'SigmaHQ:master' into master
Create Release / Create Release (push) Waiting to run
r2024-07-17
2024-07-17 11:04:40 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
frack113 3c7fcf6bbb Merge PR #4916 from @frack113 - Move some rules to Emerging-Threats folder
chore: OceanLotus Registry Activity - move to emerging-threats
chore: OilRig APT Registry Persistence - move to emerging-threats
chore: Potential Ursnif Malware Activity - Registry - move to emerging-threats
chore: Leviathan Registry Key Activity - move to emerging-threats
2024-07-17 10:28:18 +02:00
Nasreddine Bencherchali f2985e65c2 Revert "Update registry_set_susp_run_key_img_folder.yml"
This reverts commit cd7cc10ed8.
2024-07-16 11:32:40 +02:00
Nasreddine Bencherchali cd7cc10ed8 Update registry_set_susp_run_key_img_folder.yml 2024-07-16 11:31:31 +02:00
sai prashanth pulisetti 568f1aef33 Merge PR #4878 from @prashanthpulisetti - Update "Create Remote Thread" based rules
update: Rare Remote Thread Creation By Uncommon Source Image - Add dialer.exe
update: Remote Thread Creation By Uncommon Source Image - Update filters
update: Remote Thread Creation In Uncommon Target Image - Update filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-15 15:26:33 +02:00
github-actions[bot] 73f0078e92 Merge PR #4915 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-15 13:31:18 +02:00
nischalkhadgi62 96f5ae8cff Merge PR #4903 from @nischalkhadgi62 - Add Directory Service Restore Mode(DSRM) Registry Value Tampering
new: Directory Service Restore Mode(DSRM) Registry Value Tampering 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 23:18:19 +02:00
Josh 784ae8d01a Merge PR #4902 from @joshnck - Add BitlockerTogo.EXE Execution
new: BitlockerTogo.EXE Execution 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 20:22:59 +02:00
Nick Moore 97034d23b6 Merge PR #4899 from @kelnage - Add Kubernetes rules in audit log format
new: Kubernetes Admission Controller Modification
new: Kubernetes CronJob/Job Modification
new: Kubernetes Rolebinding Modification
new: Kubernetes Secrets Modified or Deleted
new: Kubernetes Unauthorized or Unauthenticated Access 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 16:09:01 +02:00
James C f95d5397b5 Merge PR #4900 from @jamesc-grafana - Add new AWS cloudtrail rules
new: Ingress/Egress Security Group Modification
new: LoadBalancer Security Group Modification
new: Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure
new: New Network ACL Entry Added
new: New Network Route Added
new: Potential Malicious Usage of CloudTrail System Manager
new: RDS Database Security Group Modification 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 14:42:54 +02:00
fornotes d4cb9fde6f Merge PR #4906 from @fornotes - Update and add new dll sideloading rules
update: Potential System DLL Sideloading From Non System Locations - Add new entries to increase coverage
new: Potential DLL Sideloading Of DbgModel.DLL
new: Potential DLL Sideloading Of MpSvc.DLL
new: Potential DLL Sideloading Of MsCorSvc.DLL 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 12:57:37 +02:00
Nasreddine Bencherchali c2915a678b Merge PR #4912 from @nasbench - update pySigma-validators-sigmahq to version 0.7.0 and sigma_cli_conf.yml
chore: update `pySigma-validators-sigmahq` to version 0.7.0 and `sigma_cli_conf.yml`

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-07-11 11:24:01 +02:00
dr0pd34d 5f9d70c0ef Merge PR #4910 from @dr0pd34d - Add Microsoft Word Add-In Loaded
new: Microsoft Word Add-In Loaded 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 02:31:31 +02:00
Nick Moore b584e19978 Merge PR #4905 from @kelnage - Fix error in field name
fix: Potential Bucket Enumeration on AWS - Fix error in field name
2024-07-11 00:19:55 +02:00
Nasreddine Bencherchali 9c59a06874 Merge PR #4911 from @nas_bench - Update sigma_cli_conf.yml
chore: update `sigma_cli_conf.yml`
2024-07-11 00:16:05 +02:00
Cygnetix dc35ae5600 Merge PR #4904 from @cygnetix - Fix typo in Suspicious SignIns From A Non Registered Device
chore: fix typo in `Suspicious SignIns From A Non Registered Device`

Thanks: cygnetix
2024-07-09 11:01:08 +02:00
Swachchhanda Shrawan Poudel 0bb6f0c0d7 Merge PR #4831 from @swachchhanda000 - Add Kapeka backdoor related Sigma rules
new: Kapeka Backdoor Autorun Persistence
new: Kapeka Backdoor Configuration Persistence
new: Kapeka Backdoor Execution Via RunDLL32.EXE
new: Kapeka Backdoor Loaded Via Rundll32.EXE
new: Kapeka Backdoor Persistence Activity
new: Kapeka Backdoor Scheduled Task Creation
new: Potential Kapeka Decrypted Backdoor Indicator 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-04 00:17:47 +02:00
Arnim Rupp 0511e57c81 Merge PR #4898 from @ruppde - Fix Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process
fix: Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process - Remove `selection_2` as it generates tons of false positives.
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-03 19:48:53 +02:00
rahulchandran19 651bee3ee6 Merge PR #4894 from @rahulchandran19 - Fix broken logic with Application Removed Via Wmic.EXE
fix: Application Removed Via Wmic.EXE - Add missing "all" modifier to fix the broken logic. 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-02 12:06:46 +02:00
Ryan Plas 1d40f1d20b Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
chore: update Microsoft references link to use the "learn" subdomain instead of "docs". 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @ryanplasma
2024-07-02 12:00:11 +02:00
github-actions[bot] 7682688ca9 Merge PR #4892 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:51:28 +02:00
github-actions[bot] 47085e9489 Merge PR #4891 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:42:32 +02:00
Nick Moore 71867434d7 Merge PR #4890 from @kelnage - Update New Behaviours Okta Admin Console rule
update: Okta New Admin Console Behaviours - update to reflect Okta log data structure
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-26 23:31:17 +02:00
Nasreddine Bencherchali 5ea4f993ee Update Rules (#4872)
chore: delete "Pipfile" and "Pipfile.lock"
fix: Filter Driver Unloaded Via Fltmc.EXE - Add exclusion for ManageEngine
fix: Suspicious Child Process Of Wermgr.EXE - Exclude "WerConCpl.dll"
new: DNS Query To AzureWebsites.NET By Non-Browser Process
new: Files With System DLL Name In Unsuspected Locations
new: HackTool - Evil-WinRm Execution - PowerShell Module
new: HackTool - LaZagne Execution
new: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process
update: Copying Sensitive Files with Credential Data - Use "windash" modifier
update: Explorer Process Tree Break - Use "windash" modifier
update: Files With System Process Name In Unsuspected Locations - Remove old filter
update: Lolbin Unregmp2.exe Use As Proxy - Use "windash" modifier
update: LSASS Process Reconnaissance Via Findstr.EXE - Use "windash" modifier
update: New Remote Desktop Connection Initiated Via Mstsc.EXE - Use "windash" modifier
update: Potential Proxy Execution Via Explorer.EXE From Shell Process - Update metadata and moved to Threat Hunting folder
update: Potential Windows Defender AV Bypass Via Dump64.EXE Rename - Enhance logic
update: Renamed ProcDump Execution - Add new flag option
update: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location - Use "windash" modifier

---------

Thanks: @qasimqlf
Thanks: @celalettin-turgut
Thanks: @cY83rR0H1t
2024-06-25 11:26:45 +02:00
Andreas Braathen 5397ea4f0a Merge PR #4882 from @netgrain - New rules related to LocaltoNet tunneling
new: Communication To LocaltoNet Tunneling Service Initiated
new: Communication To LocaltoNet Tunneling Service Initiated - Linux 

---------

Co-authored-by: Andreas Braathen <andreasb@mnemonic.io>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-20 13:09:49 +02:00
github-actions[bot] 5a05ffc541 Merge PR #4879 from @nasbench - archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-20 11:44:19 +02:00
Arnim Rupp 0ccbda753a Merge PR #4873 from @ruppde - Add the string "mikatz" to relevant rules
update: Antivirus Hacktool Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Antivirus Password Dumper Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Relevant Anti-Virus Signature Keywords In Application Log - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 23:17:16 +02:00
Daniel Cortez d7bd6001d1 Merge PR #4773 from @DefenderDaniel - Add rules covering Nscurl usage
new: File Download Via Nscurl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 10:22:39 +02:00
z00t 06eaf2c1de Merge PR #4778 from @faisalusuf - Add new rule covering suspicious usage of Qemu
new: Potentially Suspicious Usage Of Qemu

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: threatHNTR
2024-06-03 14:23:51 +02:00
Sajid Nawaz Khan 09b822cfec Merge PR #4869 from @ssnkhan - Add new rules detecting Windows Recall feature enabling
new: Windows Recall Feature Enabled Via Reg.EXE
new: Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted
new: Windows Recall Feature Enabled - Registry 

---------

Co-authored-by: Sajid Nawaz Khan <snkhan@Sajids-MacBook-Pro.local>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-03 12:13:50 +02:00
David G c4c836aa33 Merge PR #4870 from @himynamesdave - Fix broken link in README.md
chore: fixing broken link in README.md
2024-06-03 10:32:29 +02:00
github-actions[bot] d84959e50f Merge PR #4867 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:29:22 +02:00
github-actions[bot] 3be29eb79e Merge PR #4868 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:28:40 +02:00
dajducz 48f2d09699 Merge PR #4784 from @tomaszdyduch - Add new DarkGate activity related rule
new: DarkGate - Drop DarkGate Loader In C:\Temp Directory
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 14:53:22 +02:00
Florian Roth 2bf502fb9c Merge PR #4866 from @Neo23x0 - Update network connection rules
new: Network Connection Initiated From Users\Public Folder
update: Outbound Network Connection Initiated By Cmstp.EXE - Exclude local IPs and ranges
update: Network Connection Initiated To Mega.nz - Reduce level to "low"
new: Network Communication Initiated To Portmap.IO Domain
update: Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder - Add additional file paths
update: Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location - Add additional file paths
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 13:53:53 +02:00
pratinavchandra 9bfe3d6e62 Merge PR #4865 from @pratinavchandra - Add new rules related to "tmutil" potential abuse
new: Time Machine Backup Deletion Attempt Via Tmutil - MacOS
new: Time Machine Backup Disabled Via Tmutil - MacOS
new: New File Exclusion Added To Time Machine Via Tmutil - MacOS

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 12:52:55 +02:00
Cygnetix ae45e83c73 Merge PR #4864 from @cygnetix - Update CA Policy Updated by Non Approved Actor
update: CA Policy Updated by Non Approved Actor - detect using a map of fields instead of a list
2024-05-28 15:20:18 +02:00
pratinavchandra 6a5cf5c37c Merge PR #4785 from @pratinavchandra - add System Information Discovery Via Sysctl - MacOS
new: System Information Discovery Via Sysctl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 18:05:09 +02:00
skaynum 9f10345076 Merge PR #4840 from @skaynum - Add new rules related to MySQL daemon and potential phishing attempts
new: Uncommon File Creation By Mysql Daemon Process
new: Potential Suspicious Browser Launch From Document Reader Process
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 16:48:54 +02:00
Vasiliy Burov 92fd446b7d Merge PR #4859 from @vburov - Update casing of Win32_ShadowCopy for multiple rules
chore: update casing of `Win32_ShadowCopy` for multiple rules

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:33:46 +02:00
CR-OfirTal 4163fde77f Merge PR #4860 from @CR-OfirTal - Fix a typo in the regex of some rules
remove: Potential NT API Stub Patching
fix: Dynamic .NET Compilation Via Csc.EXE - Fix typo in regex
fix: Csc.EXE Execution Form Potentially Suspicious Parent - Fix typo in regex
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:27:34 +02:00
frack113 1c1081d87a Merge PR #4862 from @frack113 - Add Uncommon Process Access Rights For Target Image
new: Uncommon Process Access Rights For Target Image

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:23:52 +02:00
Kamran Saifullah 2fcf250978 Merge PR #4863 from @deFr0ggy - Add network connection counterpart rule for cloudflare tunnels
update: Cloudflared Tunnels Related DNS Requests - Update description and related field
new: Network Connection Initiated To Cloudflared Tunnels Domains
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 13:10:06 +02:00
github-actions[bot] e9cb6fc400 Merge PR #4855 from @nasbench - Update rule ref archive cache
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-05-27 12:53:54 +02:00
JeremyH f334abfd29 Remove smart quotes from file_event_win_iphlpapi_dll_sideloading.yml (#4856) 2024-05-15 22:21:50 +02:00
Nasreddine Bencherchali ed789f54ce Merge PR #4853 from @nasbench - Add some cosmetic changes and small updates
Create Release / Create Release (push) Waiting to run
update: Potentially Suspicious Execution Of PDQDeployRunner - Add additional processes to the list
update: Use Icacls to Hide File to Everyone - Remove "C:\Users" to increase coverage
r2024-05-13
2024-05-13 16:59:44 +02:00