Commit Graph

16304 Commits

Author SHA1 Message Date
pratinavchandra 2837671f38 Merge PR #4782 from @pratinavchandra - Add Launch Agent/Daemon Execution Via Launchctl
new: Launch Agent/Daemon Execution Via Launchctl 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 16:55:33 +02:00
Swachchhanda Shrawan Poudel bd454b60aa Merge PR #4818 from @swachchhanda000 - Add Potentially Suspicious Child Process Of KeyScrambler.exe
new: Potentially Suspicious Child Process Of KeyScrambler.exe 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:48:35 +02:00
frack113 fb3a72b433 Merge PR #4852 from @frack113 - Add Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock
new: Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:18:39 +02:00
frack113 7d6f32d1be Merge PR #4850 from @frack113 - Cleanup rule conditions to align with standard
chore: Cleanup conditions
update: Scheduled Task Creation From Potential Suspicious Parent Location - Add additional "temporary folder" locations.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 12:10:33 +02:00
frack113 aaf51bf880 Merge PR #4830 from @frack113 - Enhance Wbadmin based rules
new: All Backups Deleted Via Wbadmin.EXE
new: Sensitive File Dump Via Wbadmin.EXE
new: File Recovery From Backup Via Wbadmin.EXE
new: Sensitive File Recovery From Backup Via Wbadmin.EXE
update: Windows Backup Deleted Via Wbadmin.EXE - Enhance logic and increase coverage

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 11:15:30 +02:00
frack113 9341930635 Merge PR #4851 from @frack113 - Fix typo in modifier usage
fix: Forest Blizzard APT - Process Creation Activity - Typo in modifier
2024-05-13 10:36:01 +02:00
Joe 6412c1a02b Merge PR #4822 from @hasselj - Add Potentially Suspicious Malware Callback Communication - Linux
new: Potentially Suspicious Malware Callback Communication - Linux
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 17:07:43 +02:00
frack113 fe26ffa0f2 Merge PR #4838 from @frack113 - Add Access To Windows Outlook Mail Files By Uncommon Application
new: Access To Windows Outlook Mail Files By Uncommon Application

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:56:57 +02:00
Josh 0192a5207e Merge PR #4839 from @joshnck - Add New RDP Connection Initiated From Domain Controller
new: New RDP Connection Initiated From Domain Controller 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:32:09 +02:00
Ahmed Farouk b175b15033 Merge PR #4845 from @ahmedfarou22 - Proxy WebDAV Rule Improvements/New Rule
new: Suspicious External WebDAV Execution
remove: Search-ms and WebDAV Suspicious Indicators in URL
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:16:42 +02:00
frack113 392e3a39c8 Merge PR #4843 from @frack113 - Add New-NetFirewallRule usage related rules
new: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add new EID and paths
update: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Add new EID and paths

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 15:58:39 +02:00
frack113 7cdcb7605c Merge PR #4844 from @frack113 - Update UAC based rules
update: UAC Disabled - update metadata
new: UAC Secure Desktop Prompt Disabled
new: UAC Notification Disabled 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 13:39:30 +02:00
frack113 2cfa9a2d1f Merge PR #4847 from @frack113 - Update test Workflow to use pySigma-validators-sigmahq
chore: update workflow to use "pySigma-validators-sigmahq"
2024-05-10 10:32:54 +02:00
github-actions[bot] f7ec533704 Merge PR #4841 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from "experimental" to "test"
2024-05-02 10:34:25 +02:00
github-actions[bot] 45b93fcfab Merge PR #4842 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-05-02 10:33:45 +02:00
Expected 39db80478e Merge PR #4834 from @CertainlyP - Add Outbound Network Connection Initiated By Microsoft Dialer
Create Release / Create Release (push) Waiting to run
new: Outbound Network Connection Initiated By Microsoft Dialer 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
r2024-04-29
2024-04-29 12:54:38 +02:00
James C 6ac6153976 Merge PR #4836 from @jamesc-grafana - Update AWS Rule to use fieldref modifier instead of contains
update: AWS User Login Profile Was Modified - use fieldref instead of contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-29 12:53:54 +02:00
Nasreddine Bencherchali 481337a8c3 Merge PR #4837 from @nasbench - fix fp reported in #4820
fix: ADS Zone.Identifier Deleted By Uncommon Application - Filter out "chrome" and "firefox" processes.
2024-04-26 15:39:44 +02:00
Nasreddine Bencherchali f61c1f4509 Merge PR #4832 from @nasbench - Update LOLBIN rules
update: Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE - Update logic to add additional variation of the extensions
update: Arbitrary File Download Via ConfigSecurityPolicy.EXE - Update description
update: C# IL Code Compilation Via Ilasm.EXE - Add flags to increase accuracy of the rule instead of it focusing on "any" execution
update: COM Object Execution via Xwizard.EXE - Update logic
update: JScript Compiler Execution - Update metadata
update: ManageEngine Endpoint Central Dctask64.EXE Potential Abuse - Update logic to account for flags and increase accuracy
update: Potential Application Whitelisting Bypass via Dnx.EXE - Update description
update: Potential Arbitrary Command Execution Via FTP.EXE - Use "windash" modifier and update description
update: Potential Arbitrary File Download Via Cmdl32.EXE - Remove unnecessary spaces to account for flags being at the end.
update: Renamed ZOHO Dctask64 Execution - Add additional imphash values
update: Windows Kernel Debugger Execution - Reduce level to "medium"
update: Xwizard.EXE Execution From Non-Default Location - Update description

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-26 13:40:11 +02:00
frack113 22b3416fee Merge PR #4829 from @frack113 - Add Network Connection Initiated By RegAsm.EXE
new: Network Connection Initiated By RegAsm.EXE
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-25 16:31:56 +02:00
dan21san c31507f74e Merge PR #4824 from @dan21san - New PUA SoftPerfect
new: PUA - SoftPerfect Netscan Execution

---------

Co-authored-by: Degasperi <Daniel.Degasperi.ext@wuerth-phoenix.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 15:18:58 +02:00
Andreas Braathen 7a947f43f8 Merge PR #4827 from @netgrain - New analytic for python pth files
new: Python Path Configuration File Creation - Linux
new: Python Path Configuration File Creation - Macos
new: Python Path Configuration File Creation - Windows

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 14:57:26 +02:00
Andreas Braathen 2ef1a3b096 Merge PR #4825 from @netgrain - New analytic for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection - File Creation
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 14:46:07 +02:00
Nasreddine Bencherchali b349447e7d Merge PR #4826 from @nasbench - Add coverage for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-24 14:59:24 +02:00
Nasreddine Bencherchali 8f8ce06ffb Merge PR #4833 from @nasbench - New rules related to Forest Blizzard activity
new: Forest Blizzard APT - Custom Protocol Handler Creation
new: Forest Blizzard APT - Custom Protocol Handler DLL Registry Set
new: Forest Blizzard APT - File Creation Activity
new: Forest Blizzard APT - JavaScript Constrained File Creation
new: Forest Blizzard APT - Process Creation Activity
2024-04-24 10:04:28 +02:00
pratinavchandra e1a713d264 Merge PR #4823 from @pratinavchandra - Update CLI flag for Gatekeeper Bypass via Xattr
update: Gatekeeper Bypass via Xattr - Update command line flag 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-19 11:10:38 +02:00
signalblur a1a3b29692 Merge PR #4795 from @signalblur - Update Linux Command History Tampering rule
update: Linux Command History Tampering - Increase coverage to include other history files 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-17 14:28:17 +02:00
nikitah4x 5b4bfd6ffd Merge PR #4814 from @nikitah4x - Add new rule to detect MFA bypass in Cisco Duo
new: Cisco Duo Successful MFA Authentication Via Bypass Code

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-17 12:28:38 +02:00
signalblur 86ca651ea6 Merge PR #4801 from @signalblur - Add Pnscan rule
new: Pnscan Binary Data Transmission Activity 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-16 14:36:41 +02:00
Fukusuke Takahashi 4dc77dc175 Merge PR #4819 from @fukusuket - Fix regex escape
fix: Invoke-Obfuscation Via Stdin - explicitly escape { to make it clear that it is a literal
2024-04-16 12:57:45 +02:00
Fukusuke Takahashi 1a85bc5b5a Merge PR #4799 from @fukusuket - Fix typo in selection name
chore: fix typo in selection name
2024-04-15 17:01:15 +02:00
Hongbo ae49e3a465 Merge PR #4787 from @ya0guang - Fix typo in test_logsource.py
chore: fix typo in `test_logsource.py`
2024-04-15 17:00:21 +02:00
Hongbo 9e6952ec6a Merge PR #4789 from @ya0guang - Fix typo in test_rules.py
chore: fix typo in `test_rules.py` condition
2024-04-15 16:58:02 +02:00
Hongbo a235795ddd Merge PR #4790 from @ya0guang - Update test_rules.py
chore: fix typo in `test_rules.py`
2024-04-15 16:56:41 +02:00
PiRomant 8c46c94a60 Merge PR #4798 from @PiRomant - Update Hashes field to use contains modifier
update: HackTool - CoercedPotato Execution - Update Hashes field to use contains modifier
update: HackTool - HandleKatz LSASS Dumper Execution - Update Hashes field to use contains modifier
update: HackTool - SysmonEOP Execution - Update Hashes field to use contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 16:43:49 +02:00
frack113 045a9a5faa Merge PR #4803 from @frack113 - Update regex based rules
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation VAR+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Stdin - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Use Clip - Update rule to use regex for better accuracy in CLI 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-15 16:37:15 +02:00
Swachchhanda Shrawan Poudel b40d86599c Merge PR #4806 from @swachchhanda000 - Potential KeyScrambler.exe DLL Side-loading
new: Potential KeyScrambler.exe DLL Side-loading

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:58:20 +02:00
frack113 691dca6fd2 Merge PR #4808 from @frack113 - FP Bad practice GPO
fix: Windows Binaries Write Suspicious Extensions - Add new filter for when "bat" or "powershell" scripts are written via GPO to run at startup.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:43:35 +02:00
frack113 8687ba8ce6 Merge PR #4813 from @frack113 - Add Image to avoid FP
fix: File And SubFolder Enumeration Via Dir Command - Fix false positive with Firefox and similar CLI apps.
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:42:32 +02:00
frack113 c21a4e10b8 Merge PR #4807 from @frack113 - Update ATT&CK tags
chore: update ATT&CK tags for `Active Directory Structure Export Via Csvde.EXE`
2024-04-15 10:46:47 +02:00
Mohamed Ashraf f21281ab29 Merge PR #4815 from - Add new malware user-Agent 2024-04-15 10:26:56 +02:00
github-actions[bot] 9104b4d22b Merge PR #4816 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-04-15 10:25:48 +02:00
Florian Roth 626a6fc6e3 Merge pull request #4811 from ruppde/master
Update proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml
2024-04-14 09:25:37 +02:00
Florian Roth f8ca605446 docs: added modification date 2024-04-14 08:32:09 +02:00
Arnim Rupp 146c91c4b9 Update proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml
Fix FP reported by @Neo23x0
2024-04-12 19:25:13 +02:00
TheLawsOfChaos 93b71ec1bb Update proc_creation_win_exploit_cve_2017_11882.yml (#4810)
Removed https://embedi[.]com/ link as it points to a malaysian casino page now, added a different short blog and the github PoC.
2024-04-12 07:26:46 +02:00
phantinuss 9078b857a1 Merge PR #4805 from @phantinuss - fix: FP with chocolatey shimgen tool
fix: Dynamic .NET Compilation Via Csc.EXE - FP with chocolatey
2024-04-09 12:34:37 +02:00
phantinuss 4319f5807f Merge PR #4802 from @phantinuss - FP Fixes
fix: Windows Binaries Write Suspicious Extensions - fix selection
fix: Rundll32 Execution With Uncommon DLL Extension - add optional filter for MS Edge update
2024-04-05 08:47:18 +02:00
phantinuss 6505e72604 Merge PR #4797 from @phantinuss - fix: filter PS1 policy check for AppLocker mode
fix: Windows Binaries Write Suspicious Extensions - filter PS1 policy check for AppLocker mode
2024-04-03 10:08:50 +02:00
Arnim Rupp 71ae004b32 Merge PR #4794 from @ruppde - Potential Exploitation of CVE-2024-3094
new: Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: Thomas Patzke <thomas@patzke.org>
2024-04-02 15:01:14 +02:00