Commit Graph

4831 Commits

Author SHA1 Message Date
phantinuss f04419c730 Merge PR #4470 From phantinuss - Fix FPs Found In Testing
fix: Generic Password Dumper Activity on LSASS - FP with GoogleUpdate.exe
fix: Rundll32 Execution Without DLL File - FP with another zzzzInvokeManagedCustomActionOutOfProc MSI installer
fix: Suspicious Shim Database Installation via Sdbinst.EXE - FP with being started as a background service
fix: Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation - FP with $WinREAgent folder
fix: Files With System Process Name In Unsuspected Locations - FP with wuaucltcore

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-09 00:07:56 +02:00
Ali Alwashali 6075db0e2e Merge PR #4467 from @alwashali - New Rules Related To ScreenConnect RMM Activity
new: Remote Access Tool - ScreenConnect Command Execution
new: Remote Access Tool - ScreenConnect File Transfer
new: Remote Access Tool - ScreenConnect Temporary File
new: Remote Access Tool - ScreenConnect Remote Command Execution

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:09:49 +02:00
SILJAEUROPA a7fc610b70 Merge PR #4452 from @SILJAEUROPA - Add New Rules To AddInUtil Potential Abuse
new: Network Connection Initiated By AddinUtil.EXE
new: Suspicious AddinUtil.EXE CommandLine Execution
new: Uncommon Child Process Of AddinUtil.EXE
new: Uncommon AddinUtil.EXE CommandLine Execution
new: AddinUtil.EXE Execution From Uncommon Directory

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:07:50 +02:00
Nasreddine Bencherchali e230acd7ed Merge PR #4427 from @nasbench - Multiple Fixes & Enhancements
new: Application Terminated Via Wmic.EXE
new: Browser Execution In Headless Mode
new: Chromium Browser Headless Execution To Mockbin Like Site
new: DarkGate User Created Via Net.EXE
new: DMP/HDMP File Creation
new: Malicious Driver Load
new: Malicious Driver Load By Name
new: Potentially Suspicious DMP/HDMP File Creation
new: Remote DLL Load Via Rundll32.EXE
new: Renamed CURL.EXE Execution
new: Vulnerable Driver Load
new: Vulnerable Driver Load By Name
update: 7Zip Compressing Dump Files - Increase coverage
update: Amsi.DLL Loaded Via LOLBIN Process - Reduce level to `medium`
update: COM Hijack via Sdclt - Fix Logic
update: Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE - Increase coverage
update: Creation of an Executable by an Executable - Fix FP
update: DLL Load By System Process From Suspicious Locations - Reduce level to `medium`
update: DNS Query Request By Regsvr32.EXE - Reduce level to `medium`
update: DNS Query To MEGA Hosting Website - DNS Client - Update title and reduce level to `medium`
update: DNS Query To MEGA Hosting Website - Reduce level to `low` and update metadata
update: DNS Query To Remote Access Software Domain From Non-Browser App - Increase coverage with new domains
update: DNS Query To Ufile.io - DNS Client - Update title and reduce level to `low`
update: DNS Query To Ufile.io - Update title and reduce level to `low`
update: DNS Query Tor .Onion Address - Sysmon - Update title
update: DNS Server Discovery Via LDAP Query - Reduce level to `low` and update FP filters
update: DriverQuery.EXE Execution - Increase coverage
update: File Download From Browser Process Via Inline Link
update: Greedy File Deletion Using Del - Increase coverage
update: Leviathan Registry Key Activity - Fix logic
update: Network Connection Initiated By Regsvr32.EXE - Reduce level to `medium` and metadata update
update: Non Interactive PowerShell Process Spawned - Increase coverage
update: OceanLotus Registry Activity - Fix Logic
update: Office Application Startup - Office Test - Fix Logic
update: OneNote Attachment File Dropped In Suspicious Location - Fix FP
update: Potential Dead Drop Resolvers - Increase coverage with new domains
update: Potential Persistence Via COM Hijacking From Suspicious Locations - Increase coverage and fix logic
update: Potential Persistence Via COM Search Order Hijacking - Fix Logic
update: Potential Process Hollowing Activity - Update FP filters
update: Potential Recon Activity Using DriverQuery.EXE - Increase coverage
update: Potential Unquoted Service Path Reconnaissance Via Wmic.EXE - Reduce level to `medium`
update: Potentially Suspicious Event Viewer Child Process - Update metadata
update: PowerShell Initiated Network Connection - Update description
update: PowerShell Module File Created By Non-PowerShell Process - Fix FP
update: PsExec Tool Execution From Suspicious Locations - PipeName - Reduce level to `medium`
update: Python Image Load By Non-Python Process - Update description and title
update: Python Initiated Connection - Update FP filter
update: Remote Thread Creation By Uncommon Source Image - Update FP filter
update: Renamed AutoIt Execution - Increase coverage
update: Suspicious Chromium Browser Instance Executed With Custom Extensions - Increase coverage
update: Suspicious WebDav Client Execution Via Rundll32.EXE - New Title
update: Sysinternals Tools AppX Versions Execution - Reduce level to `low`
update: Sysmon Blocked Executable - Update logsource
update: UAC Bypass via Event Viewer - Fix Logic
update: UNC2452 Process Creation Patterns - Fix logic
update: Usage Of Malicious POORTRY Signed Driver - Deprecated
update: Vulnerable AVAST Anti Rootkit Driver Load - Deprecated
update: Vulnerable Dell BIOS Update Driver Load - Deprecated
update: Vulnerable Driver Load By Name - Deprecated
update: Vulnerable GIGABYTE Driver Load - Deprecated
update: Vulnerable HW Driver Load - Deprecated
update: Vulnerable Lenovo Driver Load - Deprecated
update: WebDav Client Execution Via Rundll32.EXE
update: Windows Update Error - Reduce level to `informational` and status to `stable`
update: Winrar Compressing Dump Files - Increase Coverage

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-04 19:06:57 +02:00
GtUGtHGtNDtEUaE bd45424485 Merge PR #4436 from @GtUGtHGtNDtEUaE - Change Filter Name
chore: Rundll32 Execution Without CommandLine Parameters - Change filter name
2023-09-16 21:21:36 +02:00
cyb3rjy0t 3b27c338f6 Merge PR #4405 from @nasbench & @cyb3rjy0t - Update Diskshadow Related Rules
new: Diskshadow Child Process Spawned
new: Diskshadow Script Mode - Execution From Potential Suspicious Location
new: Diskshadow Script Mode - Uncommon Script Extension Execution
new: Potentially Suspicious Child Process Of DiskShadow.EXE
update: Diskshadow Script Mode Execution

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-15 15:06:36 +02:00
redteampanda-ng e881ad0ddf Merge PR #4444 from @redteampanda-ng - Fix Typo
fix: Suspicious Elevated System Shell
2023-09-14 15:23:06 +02:00
Nasreddine Bencherchali 52b0c9e8b0 Merge PR #4439 from @nas_bench - Fix FP
fix: Suspicious Elevated System Shell - False positives from CompatTelRunner
2023-09-13 11:59:49 +02:00
Nasreddine Bencherchali b4eb5316fd Merge PR #4439 from @nas_bench - Fix FP
fix: Suspicious Elevated System Shell - False positives during updates presumably
2023-09-12 10:56:39 +02:00
frack113 30979206a4 Merge PR #4435 from @frack113 - Update Fsutil Suspicious Invocation
update: Fsutil Suspicious Invocation - add "setZeroData" coverage

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-11 00:30:24 +02:00
phantinuss 6aaa439586 Merge PR #4431 from @phantinuss - Fix False Positives Found In Testing
fix: Potential Dead Drop Resolvers - FP with chrome/FF being installed in appdata
fix: Suspicious Elevated System Shell - update FP for improved script that causes a FP
2023-09-08 11:31:22 +02:00
Nasreddine Bencherchali bdffe3a7fe Merge PR #4406 from @nasbench - Multiple Updates & Additions
new: CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File
new: CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process
new: CVE-2023-40477 Potential Exploitation - .REV File Creation
new: CVE-2023-40477 Potential Exploitation - WinRAR Application Crash
new: IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32
new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols
new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI
new: LOL-Binary Copied From System Directory
new: LSASS Dump Keyword In CommandLine
new: Old TLS1.0/TLS1.1 Protocol Version Enabled
new: Potentially Suspicious Child Process Of WinRAR.EXE
new: VMMap Signed Dbghelp.DLL Potential Sideloading
update: 7Zip Compressing Dump Files - Reduce level
update: LOLBIN Execution From Abnormal Drive
update: LSASS Memory Dump File Creation - Deprecated
update: Potential Browser Data Stealing - Increase coverage with more browsers
update: Potentially Suspicious Compression Tool Parameters
update: Potentially Suspicious Windows App Activity - Fix FP, increase coverage and reduce level
update: Rundll32 Execution Without CommandLine Parameters - Add CLI variations
update: Suspicious Child Process Of Manage Engine ServiceDesk
update: Suspicious Copy From or To System Directory - Add new folder "WinSxS"
update: VMMap Unsigned Dbghelp.DLL Potential Sideloading
update: Winrar Execution in Non-Standard Folder
update: Wscript Execution from Non C Drive - Deprecated

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-07 11:42:15 +02:00
frack113 ffcb5855f5 Merge PR #4309 from @frack113 - New Rules & Update Related To Electron Apps Abuse
new: Potentially Suspicious Electron Application CommandLine
update: Suspicious Electron Application Child Processes - Increase coverage

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 15:11:19 +02:00
securepeacock 9cb124f841 Merge PR #4418 from @securepeacock - Fix typo in title
- fix: New Port Forwarding Rule Added Via Netsh.EXE - Fix typo in title

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-01 23:14:04 +02:00
IntelScott 8efc81a08e Update proc_creation_win_cmd_mklink_osk_cmd.yml
Recommend a change in the Tactic mapping
2023-08-29 16:38:20 -04:00
Tessa Georgen 60b8e9b70f Merge PR #4392 from @tjgeorgen - Update MITRE Tags
- update: update MITRE tags for multiple rules

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-08-28 16:53:27 +02:00
Veramine 0d307c6f8b Merge PR #4397 from @veramine - Update Process Terminated Via Taskkill
- update: Process Terminated Via Taskkill - update metadata and move to TH folder

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-28 14:25:54 +02:00
Nasreddine Bencherchali 67d1036566 Merge pull request #4390 from @nasbench - CVE-2023-36874
new: Potential CVE-2023-36874 Exploitation - Uncommon Report.Wer Location
new: Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation
new: Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution
new: Suspicious Execution Location Of Wermgr.EXE - split from 396f6630-f3ac-44e3-bfc8-1b161bc00c4e
update: Potential Defense Evasion Via Rename Of Highly Relevant Binaries - enhanced child process list
update: Suspicious Child Process Of Wermgr.EXE - update title
fix: SCR File Write Event - update modifier

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-24 12:50:57 +02:00
securepeacock 291ca18d22 Merge pull request #4389 from @securepeacock
chore: Dynamic .NET Compilation Via Csc.EXE - add new reference
2023-08-23 18:59:03 +02:00
securepeacock bad3152ac3 Merge pull request #4388 from @securepeacock
chore: Potential Reconnaissance For Cached Credentials Via Cmdkey.EXE - add new reference
2023-08-23 18:52:22 +02:00
Nasreddine Bencherchali 006b120859 Merge pull request #4374 from mbabinski/master
feat: add search(-ms)/WebDAV abuse rules
2023-08-22 13:51:29 +02:00
phantinuss bc2e0a54e8 fix: level
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-08-22 11:43:40 +02:00
Nasreddine Bencherchali 201066947b feat: update detection & metadata 2023-08-22 11:00:55 +02:00
Nasreddine Bencherchali 3abede2a1c Update rules/windows/process_creation/proc_creation_win_bginfo_uncommon_child_process.yml 2023-08-18 15:15:52 +02:00
Nasreddine Bencherchali 360475d6ff fix: apply suggestions from code review
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-18 15:15:26 +02:00
Nasreddine Bencherchali be9abb9364 feat: update cl diag script rules 2023-08-17 19:26:21 +02:00
Nasreddine Bencherchali c39581217a feat: update rules using file sharing domains 2023-08-17 13:39:59 +02:00
Nasreddine Bencherchali f21e54e206 feat: update bginfo rules 2023-08-16 21:52:52 +02:00
Nasreddine Bencherchali 99387042c6 feat: update bash lolbin rules 2023-08-15 16:20:14 +02:00
Nasreddine Bencherchali 967f31b241 feat: aspnet compile + agentexecutor rename 2023-08-14 14:38:25 +02:00
Nasreddine Bencherchali 2e9bba557d feat: add mfdetours unsigned sideload 2023-08-14 09:43:11 +02:00
Nasreddine Bencherchali cac07b8ecd Merge pull request #4379 from swachchhanda000/lolbas_msedge_and_teams
feat: enhance ftp lolbin rule and fix fp with vsto rule
2023-08-11 14:10:00 +02:00
Nasreddine Bencherchali 0a5d38140d fix: remove already covered rules and fix metadata 2023-08-11 12:55:33 +02:00
Swachchhanda Poudel 32e0100af2 Added two new lolbas rules and slight modifications on exisiting rules 2023-08-11 16:28:46 +05:45
Nasreddine Bencherchali fff8191d65 Merge pull request #4377 from nasbench/new-rules-august-23
feat: new rules & updates
2023-08-10 11:56:34 +02:00
Nasreddine Bencherchali 2259a57b9b fix: duplicate ids and missing selections 2023-08-10 11:20:34 +02:00
Nasreddine Bencherchali aab060e642 Merge branch 'master' of https://github.com/SigmaHQ/sigma into pr/4376 2023-08-10 10:20:03 +02:00
phantinuss 158a1c6cc1 fix: wording 2023-08-09 19:04:37 +02:00
Nasreddine Bencherchali 75085680de feat: update gpg4win rules 2023-08-09 17:08:59 +02:00
Nasreddine Bencherchali a13206f28b Merge pull request #4316 from swachchhanda000/master 2023-08-09 14:39:31 +02:00
phantinuss 7beea4c526 fix: wording 2023-08-09 13:41:27 +02:00
Nasreddine Bencherchali 87b94ac166 feat: updates and enhancements 2023-08-08 21:53:37 +02:00
Nasreddine Bencherchali f52cd142e3 feat: rules update 2023-08-07 16:09:21 +02:00
Nasreddine Bencherchali ba3af8f353 feat: apply suggestions from code review 2023-08-07 11:47:27 +02:00
Nasreddine Bencherchali a5fcba83cb Update proc_creation_win_susp_service_tamper.yml 2023-08-07 11:47:07 +02:00
frack113 6a3edbdfca Add portable gpg.exe detection
Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-08-06 11:00:52 +02:00
Micah Babinski edd3c4dc76 Corrected 'related' section 2023-08-04 19:42:18 -07:00
Micah Babinski acc59520fa Renamed process creation rule to proper format. 2023-08-04 18:19:21 -07:00
Micah Babinski 8d16ed2cc2 Added search(-ms)/WebDAV rules 2023-08-04 17:37:54 -07:00
RenaudFrere edf3e3f3a2 Update proc_creation_win_susp_service_tamper.yml 2023-08-04 16:31:00 +02:00