Florian Roth
6e349030d9
rule: suspicious camera and mic access
2020-06-08 10:18:44 +02:00
Florian Roth
d3e261862d
merged Cyb3rWarD0g's rules
2020-06-06 15:42:22 +02:00
Florian Roth
3697186281
fix: fixed title
2020-06-06 14:04:40 +02:00
Florian Roth
246a95557b
fix: description over multiple lines
2020-06-06 13:56:48 +02:00
Florian Roth
d54209dcc5
rule: ETW disabled
2020-06-06 13:56:19 +02:00
Florian Roth
39b41b5582
rule: moved DebugView rule to process creation category
2020-05-28 10:13:38 +02:00
Florian Roth
76dcc1a16f
rule: renamed debugview
2020-05-28 09:22:25 +02:00
Sander Wiebing
b8ee736f44
Remove AppData folder as suspicious folder
...
A lot of software is using the AppData folder for startup keys. Some examples:
- Microsoft Teams (\AppData\Local\Microsoft\Teams)
- Resilio (\AppData\Roaming\Resilio Sync\)
- Discord ( (\AppData\Local\Discord\)
- Spotify ( (\AppData\Roaming\Spotify\)
Too many to whitelist them all
2020-05-24 15:16:07 +02:00
ecco
67faf4bd41
fix FP + remove powershell rule redundant with sysmon_in_memory_powershell.yml
2020-05-23 10:56:23 -04:00
ecco
10ca3006f5
move rule where needed
2020-05-23 10:07:55 -04:00
ecco
d9bc09c38c
fix test
2020-05-23 10:02:58 -04:00
ecco
78a7852a43
renamed dbghelp rule with new ID and comment and removed a false positive
2020-05-23 09:16:40 -04:00
ecco
75ba5f989c
add 1 more FP to wmi load
2020-05-23 07:44:45 -04:00
ecco
9a7f462d79
move renamed bnaries rule to process creation (they made a lot of false positives in sysmon as there was no event id specified in the rule)
2020-05-23 07:17:56 -04:00
ecco
cfde0625f5
fix false positive matching on every powershell process not run by SYSTEM account
2020-05-23 07:05:09 -04:00
Florian Roth
12e1aeaf9f
Merge pull request #788 from Neo23x0/rule-devel
...
refactor: split up rule for CVE-2020-1048 into 2 rules
2020-05-23 09:54:43 +02:00
Florian Roth
34006d0794
refactor: simplified and extended expression in CVE-2020-1048 rule
2020-05-23 09:16:19 +02:00
Florian Roth
57c8e63acd
refactore: split up rule for CVE-2020-1048 into 2 rules
2020-05-23 09:09:58 +02:00
ecco
ec17c2ab56
filter on createkey only when needed
2020-05-22 10:37:00 -04:00
ecco
0dd089db47
various rules cleaning
2020-05-18 20:29:53 -04:00
ecco
1aa97fe577
flake 8
2020-05-18 10:03:18 -04:00
ecco
088800cd18
fix rule due to sigmac bug?
2020-05-18 09:39:48 -04:00
ecco
e89613aee0
add some false positives checks
2020-05-18 07:19:06 -04:00
Maxime Lamothe-Brassard
25d3a5a893
Remove "condition" from global rule.
...
The condition field in this rule was in the global section which overwrote the condition in sub-rules and generated FPs. For example, once Sigma read the rule, the bottom sub-rule's "condition" was overwritten with "1 of them".
2020-05-17 12:44:57 -07:00
Florian Roth
a46e357874
Merge branch 'master' into rule-devel
2020-05-16 08:59:34 +02:00
Florian Roth
d5e7d4e302
fix: missing condition in CVE-2020-1048 rule
2020-05-16 08:59:05 +02:00
ecco
0575fa8d81
fix CVE 2020-1048 rule
2020-05-15 07:25:05 -04:00
Florian Roth
cc26b26377
Merge branch 'master' into rule-devel
...
# Conflicts:
# rules/windows/sysmon/sysmon_cve-2020-1048.yml
2020-05-15 12:09:47 +02:00
Florian Roth
8e7caf0e4d
rule: CVE-2020-1048
2020-05-15 12:08:31 +02:00
Florian Roth
5854cc4677
fix: small bug in new CVE-2020-1048 rule
2020-05-15 11:37:46 +02:00
Tran Trung Hieu
e53a97fa2f
Update condition to filter out printer port
2020-05-14 18:22:49 +07:00
Tran Trung Hieu
443bf09d27
Add author
2020-05-14 18:10:16 +07:00
Tran Trung Hieu
e74970cea0
Suspicious network connection from notepad.exe
2020-05-14 18:08:30 +07:00
Tran Trung Hieu
97b690d340
Change level from Critical to High
2020-05-14 09:02:54 +07:00
Tran Trung Hieu
d0b1c98d5a
Reformat rule
2020-05-14 00:39:41 +07:00
Tran Trung Hieu
3e5b33388b
New rule to detect possible CVE-2020-1048 exploitation
2020-05-14 00:24:36 +07:00
Florian Roth
1104044f53
fix: delete duplicate rules
2020-05-11 10:55:02 +02:00
Florian Roth
f96c3a5fd4
Merge branch 'master' into rule-devel
...
# Conflicts:
# rules/proxy/proxy_ua_suspicious.yml
# rules/windows/process_creation/win_install_reg_debugger_backdoor.yml
# rules/windows/process_creation/win_susp_csc_folder.yml
2020-05-11 10:44:19 +02:00
Florian Roth
514bd8657b
Merge pull request #704 from Iveco/master
...
Detect Ghost-In-The-Logs (disabling/bypassing ETW)
2020-04-14 14:11:27 +02:00
Florian Roth
3175a48bdc
Casing
2020-04-14 13:40:34 +02:00
Florian Roth
ecdec93800
Casing
2020-04-14 13:39:58 +02:00
Maxime Thiebaut
86c6891427
Add Windows Registry Persistence COM Search Order Hijacking
2020-04-14 12:59:29 +02:00
Iveco
c5211eb94a
Update sysmon_susp_service_installed.yml
...
CI
2020-04-08 18:54:46 +02:00
Iveco
4520082ef7
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
CI
2020-04-08 18:54:37 +02:00
Iveco
6d85650390
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
Fixed Author
2020-04-08 18:41:33 +02:00
Iveco
fc1febdebe
Update sysmon_susp_service_installed.yml
...
Fixed Author
2020-04-08 18:41:25 +02:00
Iveco
3280a1dfb0
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
Fixed CI
2020-04-08 18:23:29 +02:00
Iveco
5e724a0a54
Update sysmon_susp_service_installed.yml
...
Fixed CI
2020-04-08 18:22:51 +02:00
iveco
e87f2705a7
Detect Ghost-In-The-Logs (disabling/bypassing ETW)
2020-04-08 18:01:04 +02:00
Chris O'Brien
fe5dbece3d
Date typos...more than I thought...
2020-04-02 10:00:00 +02:00