Commit Graph

12441 Commits

Author SHA1 Message Date
github-actions[bot] 367ebd9395 Merge PR #4700 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test
2024-02-01 02:09:31 +01:00
frack113 ebaa1ab3f8 Merge PR #4697 from @frack113 - Fix errors in rule status and logsource
fix: Potential Dropper Script Execution Via WScript/CScript - Fix error in rule status
fix: HackTool - EDRSilencer Execution - Filter Added - Fix error in logsource
2024-01-31 00:56:01 +01:00
Nasreddine Bencherchali be359ef3f2 Merge PR #4681 from @nasbench - Add Missing Ref & Tags
Create Release / Create Release (push) Has been cancelled
fix: Kerberos Manipulation - Update field to use Status instead of incorrect "FailureCode"
fix: Metasploit SMB Authentication - Remove unnecessary field
fix: Service Installation in Suspicious Folder - Update FP filter
update: Malicious PowerShell Commandlets - ProcessCreation - "Start-Dnscat2"
remove: Dnscat Execution - Deprecated in favour of an integration in the "Malicious PowerShell Cmdlet" type of rules
remove: SAM Dump to AppData
update: Critical Hive In Suspicious Location Access Bits Cleared - Enhance metadata and logic
update: Malicious PowerShell Commandlets - PoshModule - "Start-Dnscat2"
update: Malicious PowerShell Commandlets - ScriptBlock - "Start-Dnscat2"
update: Malicious PowerShell Scripts - FileCreation - Add "dnscat2.ps1"
update: Malicious PowerShell Scripts - PoshModule - Add "dnscat2.ps1"
update: Monitoring For Persistence Via BITS - Use "Image" and "OriginalFileName" fields instead of CLI only
update: New or Renamed User Account with '$' Character - Reduced level to "medium"
update: New Process Created Via Taskmgr.EXE - Added full paths to the filtered binaries to decrease false negatives
update: Potential Dropper Script Execution Via WScript/CScript - Re-wrote the logic by removing the paths "C:\Users" and "C:\ProgramData". As these are very common and will generate high FP rate. Instead switched the paths to a more robust list and extended the list of extension covered. Also reduced the level to "medium"
update: Potential Fake Instance Of Hxtsr.EXE Executed - Remove "C:" prefix from detection logic
update: Prefetch File Deleted - Update selection to remove 'C:' prefix
update: Sensitive File Access Via Volume Shadow Copy Backup - Made the rule more generic by updating the title and removing the IOC from conti. (will be added in a dedicated rule)
update: Shell Process Spawned by Java.EXE - Add "bash.exe"
update: Suspicious PowerShell Download - Powershell Script - Add "DownloadFileAsync" and "DownloadStringAsync" functions
update: Suspicious Processes Spawned by Java.EXE - Remove "bash.exe" as its doesn't fit the logic
update: Sysmon Application Crashed - Add 32bit version of sysmon binary
update: Tap Driver Installation - Security - Reduce level to "low"
update: Write Protect For Storage Disabled - Remove "storagedevicepolicies" as the string "storage" already covers it

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 13:37:20 +01:00
Luca 7f582c3d16 Merge PR #4686 from @CrimpSec - Add new rule for SharpMove based on PE metadata and CLI options
new: HackTool - SharpMove Tool Execution 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 12:03:08 +01:00
Swachchhanda Shrawan Poudel 2fc5330394 Merge PR #4678 from @swachchhanda000 - Adds and updates Pikabot and rundll32 related rules
new: Pikabot Fake DLL Extension Execution Via Rundll32.EXE
update: Potential Pikabot C2 Activity - Added "searchfilterhost.exe"
update: Potential Pikabot Discovery Activity - Added "SearchProtocolHost.exe" and "SearchFilterHost.exe"
update: Potential Pikabot Hollowing Activity - Added "searchfilterhost"
update: Rundll32 Execution With Uncommon DLL Extension - Enhanced FP filters 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 11:59:52 +01:00
t-pol d7206ad1de Merge PR #4685 from @t-pol - Add EDR-Silencer rule based on filter name indicator
new: HackTool - EDRSilencer Execution - Filter Added 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-29 11:58:14 +01:00
tr0mb1r 5b3ae271a1 Merge PR #4690 from @tr0mb1r - filter Websense named pipe
fix: CobaltStrike Named Pipe Patterns - Add Websense named pipe filter

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-29 11:50:59 +01:00
Qasim Qlf 7a4eb6cb58 Merge PR #4693 from @qasimqlf - Update selection to remove overlap
chore: PowerShell ShellCode - Remove "selection" as it was overlapping with "selection2"
2024-01-26 12:19:13 +01:00
phantinuss 399cca35df Merge PR #4684 from @phantinuss - Multiple FP fixes & rule updates
fix: Firewall Rule Modified In The Windows Firewall Exception List - new optional filter Brave browser
fix: Outbound RDP Connections Over Non-Standard Tools - new FP filter for RAS TSplus
fix: PowerShell Core DLL Loaded By Non PowerShell Process - new optional filter for chocolatey
fix: Remote Thread Creation In Mstsc.Exe From Suspicious Location - Fix a broken path string
fix: Remote Thread Creation In Uncommon Target Image - Reduce level to medium and remove explorer as target due to FP rates.
fix: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Fix the filters to be more generic
new: Rare Remote Thread Creation By Uncommon Source Image - A split of 66d31e5f-52d6-40a4-9615-002d3789a119
update: All Rules Have Been Deleted From The Windows Firewall Configuration - Remove program files filter to increase coverage. As deleting rules shouldn't be a "normal" behavior.
update: CreateRemoteThread API and LoadLibrary - Reduce level to medium and convert to a TH rule
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add additional paths to increase coverage
update: Powershell Install a DLL in System Directory - enhance rule context in big script blocks
update: Remote Thread Creation By Uncommon Source Image - Reduced level to medium and move high indicators to 02d1d718-dd13-41af-989d-ea85c7fab93f 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-23 12:15:04 +01:00
Swachchhanda Shrawan Poudel 2ee4323654 Merge PR #4679 from @swachchhanda000 - Suspicious unsigned DLL Loaded by RunDLL32/RegSvr32
new: Unsigned DLL Loaded by RunDLL32/RegSvr32
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-22 11:40:10 +01:00
jstnk9 8cc98415b4 Merge PR #4682 from @jstnk9 - Add new rules related to MODE.COM usage in changing code pages
new: CodePage Modification Via MODE.COM
new: CodePage Modification Via MODE.COM To Russian Language 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-22 11:37:16 +01:00
xiangchen96 efb61f92e6 Merge PR #4680 from @xiangchen96 - new domains from miningocean.org
update: Network Communication With Crypto Mining Pool - new domains from `miningocean.org`
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-19 16:48:29 +01:00
tr0mb1r feded2fc13 Merge PR #4672 from @tr0mb1r - move to TH and filter vmware tools
fix: System Information Discovery Via Wmic.EXE - Move to threat hunting and add additional filter to reduce noise coming from VMware Tools

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-15 15:25:04 +01:00
Florian Roth e6e0ffbdce Merge PR #4674 from @Neo23x0 - Increase hack tool coverage
update: Hacktool Execution - Imphash - Add additional imphash values to increase coverage
update: Findstr Launching .lnk File - Increase coverage by adding cases where the commandline ends with a double or a single quote.
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-15 15:24:03 +01:00
Florian Roth 8e064aaac3 Merge PR #4673 from @Neo23x0 - Update broken reference link
chore: update broken link in `NetNTLM Downgrade Attack - Registry`
2024-01-15 11:59:49 +01:00
Bryan Lim 24b9ed72c1 Merge PR #4621 from @zestsg - Add New GCP / Google Workspace Related Rules
new: GCP Break-glass Container Workload Deployed
new: Google Workspace Application Access Levels Modified
new: GCP Access Policy Deleted 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-12 12:49:02 +01:00
frack113 a2f8a82c40 Merge PR #4530 from @frack113 - Pingcastle PUA
new: PUA - PingCastle Execution
new: PUA - PingCastle Execution From Potentially Suspicious Parent
new: Renamed PingCastle Binary Execution
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-12 12:06:49 +01:00
Josh 9bde39e17d Merge PR #4668 from @joshnck - Remove SOFTWARE registry key prefix
update: Potential Persistence Via MyComputer Registry Keys - Remove `SOFTWARE` registry key anchor to increase coverage for `WOW6432Node` cases

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-01-11 12:04:04 +01:00
Anish 49a1b4a187 Merge PR #4665 from @Tuutaans - Add Rule CPL Load From Non Default Location
new: System Control Panel Item Loaded From Uncommon Location

---------

Co-authored-by: abo <abo@logpoint.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-11 09:25:04 +01:00
Gott 60f42340d9 Merge PR #4664 from @danielgottt - Windows Filtering Platform Blocked Connection From EDR Agent Binary
new: Windows Filtering Platform Blocked Connection From EDR Agent Binary

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-11 08:56:17 +01:00
Nasreddine Bencherchali d906eb0497 Merge PR #4662 from @nasbench - Updated and added new rules
new: Potential Persistence Via AppCompat RegisterAppRestart Layer
update: Uncommon Extension Shim Database Installation Via Sdbinst.EXE - Add additional commandline flag that might trigger FPs
update: Hypervisor Enforced Code Integrity Disabled - Add additional path for the HVCI config
update: Creation Of Non-Existent System DLL - Remove driver anchor and the System32 filter. The reason behind this is that an attacker can copy the file elsewhere and then use a system utility such as copy or xcopy located in the system32 folder to create it again. Which will bypass the rule.
update: Potential System DLL Sideloading From Non System Locations - Remove the driver anchor from the filter to catch cases where the system is installed on non default C: driver
update: Potential DLL Sideloading Of Non-Existent DLLs From System Folders - Add SignatureStatus in the filter to exclude only valid signatures and decrease bypass.
remove: Svchost DLL Search Order Hijack - Deprecated in favor of the rule 6b98b92b-4f00-4f62-b4fe-4d1920215771. The reason is that for legit cases where the DLL is still present we can't filter out anything. We assume that the loading is done by a non valid/signed DLLs which will catch most cases. In cas the attacker had the option to sign the DLL with a valid signature he can bypass the rule.

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 20:14:20 +01:00
Stephen Lincoln 7a8672f92b Merge PR #4663 from @slincoln-aiq - Update Disable Windows Defender Features Rules
update: Tamper Windows Defender - ScriptBlockLogging - Add additional PowerShell MpPreference Cmdlets
update: Tamper Windows Defender - PSClassic - Add additional PowerShell MpPreference Cmdlets
update: Powershell Defender Disable Scan Feature - Add additional PowerShell MpPreference Cmdlets 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 19:24:20 +01:00
Qasim Qlf c3463f8bd0 Merge PR #4654 from @qasimqlf - replace hardcoded C: with wildcard
fix: Suspicious Greedy Compression Using Rar.EXE - Fix error in path selection

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 14:51:26 +01:00
Anish 2b90adcb28 Merge PR #4661 from @Tuutaans - Suspicious forfiles Child processes
new: Forfiles.EXE Child Process Masquerading
update: Forfiles Command Execution - Remove unnecessary selection and enhance metadata information

---------

Co-authored-by: Anish Bogati <abo@logpoint.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 14:44:05 +01:00
ahouspan ff4dee3c50 Merge PR #4650 from @ahouspan - Process Creation Cmdline Matches Patterns Observed in Pikabot Infections
new: Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
updated: Cscript/Wscript Potentially Suspicious Child Process - WScript.exe Spawns RunDll32.exe

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 14:37:20 +01:00
Stephen Lincoln e62c700822 Merge PR #4649 from @slincoln-aiq - System Information Discovery Using System_Profiler
new: System Information Discovery Using System_Profiler

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 14:29:49 +01:00
Gott 561bab0dec Merge PR #4648 from @danielgottt - EDRSilencer Execution
new: HackTool - EDRSilencer Execution

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 14:21:40 +01:00
Florian Roth 2535a61f71 Merge PR #4647 from @Neo23x0 - add new hack tool by imphash
update: Hacktool Named File Stream Created - Added new Imphash values for `EDRSandBlast`, `EDRSilencer` and `Forensia` utilities.

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 14:11:33 +01:00
Qasim Qlf 8b09c054bb Merge PR #4646 from @qasimqlf - fix the wrong image name
fix: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Fix typo in WMIC image name

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 14:01:30 +01:00
Stephen Lincoln 2abda43af9 Merge PR #4645 from @slincoln-aiq - Update: System Information Discovery Using Ioreg
update: System Information Discovery Using Ioreg - enhanced coverage with additional flags and cli options

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 14:00:01 +01:00
bohops 303cb49b85 Merge PR #4643 from @bohops - Adding dotnet-trace LOLBIN
new: Binary Proxy Execution Via Dotnet-Trace.EXE

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 13:58:15 +01:00
jstnk9 1e37964530 Merge PR #4640 from @jstnk9 - Add new rules related to System Integrity Protection (SIP) enumeration and tamper
new: System Integrity Protection (SIP) Enumeration
new: System Integrity Protection (SIP) Disabled 
---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 13:36:06 +01:00
Anish 16f999115a Merge PR #4641 from @Tuutaans - Update some rules with additional cases
update: Screen Capture Activity Via Psr.EXE - Add -start commandline variation
update: Potential System DLL Sideloading From Non System Locations - Add iernonce.dll 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-01-10 13:34:35 +01:00
st0pp3r 0fa10fab84 Merge PR #4638 from @st0pp3r - HackTool NoFilter Execution
new: HackTool - NoFilter Execution

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-01-10 10:57:10 +01:00
Nasreddine Bencherchali 36290c588d Merge PR #4659 from @nasbench - Reduce Remote PowerShell Session (PS Classic) Level
update: Remote PowerShell Session (PS Classic) - Reduce level to low
2024-01-03 23:30:21 +01:00
github-actions[bot] c3fe2da997 chore: promote older rules status from experimental to test (#4651)
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-01-01 09:00:51 +01:00
Qasim Qlf 17b87ec101 Merge PR #4644 from @qasimqlf - Add Missing CommandLine Field Selection
fix: Suspicious Redirection to Local Admin Share - Add missing CommandLine field selection 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-12-28 19:52:05 +01:00
Stephen Lincoln e0cf5f3bdc Merge PR #4636 from @slincoln-aiq - Fix Typo In Enable LM Hash Storage - ProcCreation
fix: Enable LM Hash Storage - ProcCreation - Removed trailing slash from registry path
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-22 03:03:32 +01:00
Nasreddine Bencherchali e052677142 Merge PR #4577 from @nasbench - Multiple Fixes & Updates
Create Release / Create Release (push) Has been cancelled
fix: Access To Windows Credential History File By Uncommon Application - Enhance FP filters
fix: Access To Windows DPAPI Master Keys By Uncommon Application - Enhance FP filters
fix: Amsi.DLL Load By Uncommon Process - Moved to threat hunting folder and update false positive filters to remove hardcoded C:
fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Typo in condition
fix: Credential Manager Access By Uncommon Application - Enhance FP filters
fix: Elevated System Shell Spawned From Uncommon Parent Location - Enhance FP filters
fix: Execution of Suspicious File Type Extension - Add new extensions to reduce FP
fix: Important Windows Eventlog Cleared - Update selection to remove "Application" log as it was generating a lot of FP in some environments
fix: Malicious PowerShell Commandlets - ScriptBlock - Remove some part of the selection due to FP matches as they were generic cmdlet names
fix: Potential Direct Syscall of NtOpenProcess - Add "Adobe" filter
fix: Potential Shim Database Persistence via Sdbinst.EXE - Update FP filter for "iisexpressshim" sdb
fix: Potentially Suspicious AccessMask Requested From LSASS - Add new FP filter for "procmon" process
fix: PowerView PowerShell Cmdlets - ScriptBlock - Remove some part of the selection due to FP matches as they were generic cmdlet names
fix: PSScriptPolicyTest Creation By Uncommon Process - Add new filter for "sdiagnhost"
fix: Relevant Anti-Virus Signature Keywords In Application Log - Update false positive filters
fix: Remote Access Tool Services Have Been Installed - Security - Fix typo in field name
fix: Suspicious File Creation Activity From Fake Recycle.Bin Folder - Remove RECYCLE.BIN\ as it was added as a typo and is a legitimate location.
fix: Uncommon Child Process Of Conhost.EXE - Add new FP filters
fix: Uncommon File Created In Office Startup Folder - Add new extension to filter out FP generated with MS Access databases
fix: Uncommon PowerShell Hosts - Moved to threat hunting folder and updated false positive filter list
fix: Use Of Remove-Item to Delete File - ScriptBlock - Moved to threat hunting folder and Update logic to be more accurate
fix: User with Privileges Logon - Move to placeholder rules and update the FP filter to account for different workstations
fix: Windows Event Auditing Disabled - Enhance list of false positive filters with additional GUID
fix: WMI Module Loaded By Uncommon Process - Moved to threat hunting folder and update and restructure false positive filters
new: Communication To Uncommon Destination Ports
new: Potentially Suspicious Execution Of Regasm/Regsvcs With Uncommon Extension
remove: Credential Dumping Tools Service Execution
remove: New Service Uses Double Ampersand in Path
remove: Powershell File and Directory Discovery
remove: PowerShell Scripts Run by a Services
remove: Security Event Log Cleared
remove: Suspicious Get-WmiObject
remove: Windows Defender Threat Detection Disabled
update: Access To Browser Credential Files By Uncommon Application - Increase level to medium and enhance filters and selections
update: Add Potential Suspicious New Download Source To Winget - Reduce level to medium
update: ADFS Database Named Pipe Connection By Uncommon Tool - Enhance coverage by improving paths selection
update: CodeIntegrity - Unmet Signing Level Requirements By File Under Validation - Reduce level to low
update: Copy From Or To Admin Share Or Sysvol Folder - Enhance selection to be more accurate
update: Eventlog Cleared - Update FP filter to remove "Application" log and increase coverage
update: Failed Code Integrity Checks - Reduce level to informational
update: HH.EXE Execution - Reduce level to low
update: Locked Workstation - Reduce level to informational
update: Malicious Driver Load By Name - Increase coverage based on LOLDrivers data
update: Meterpreter or Cobalt Strike Getsystem Service Installation - Security - Reduce level to high and restructure selections
update: Meterpreter or Cobalt Strike Getsystem Service Installation - System - Reduce level to high and restructure selections
update: Potential Credential Dumping Activity Via LSASS - Reduce level to medium and comment out noisy access masks
update: Potential PowerShell Execution Policy Tampering - Remove "RemoteSigned" as it doesn't fit with the current logic
update: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location - Reduce level to medium and update logic
update: Potentially Suspicious Malware Callback Communication - Increase coverage by adding new additional ports
update: PUA - Nmap/Zenmap Execution - Reduce level to medium
update: PUA - Process Hacker Execution - Reduce level to medium
update: PUA - Radmin Viewer Utility Execution - Reduce level to medium
update: Rundll32 Execution With Uncommon DLL Extension - Enhance DLL extension list
update: SASS Access From Non System Account - Reduce level to medium and enhance false positive filters
update: Suspicious Executable File Creation - Enhance coverage by removing hardocded "C:"
update: Suspicious Program Location with Network Connections - Increase accuracy by enhancing the selection to focus on the start of the folder and partition
update: Suspicious Schtasks From Env Var Folder - Reduce level to medium
update: Suspicious Shim Database Patching Activity - Add new processes to increase coverage
update: Uncommon Extension Shim Database Installation Via Sdbinst.EXE - Reduce level to medium
update: Whoami Utility Execution - Reduce level to low
update: Whoami.EXE Execution With Output Option - Reduce level to medium
update: Windows Defender Malware Detection History Deletion - Reduce level to informational
update: WMI Event Consumer Created Named Pipe - Reduce leve to medium

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Thanks: @Blackmore-Robert
Thanks: @swachchhanda000
Thanks: @celalettin-turgut
Thanks: @AaronS97
2023-12-21 21:04:18 +01:00
frack113 2cb6ccd04d Merge PR #4536 from @frack113 - Add New Rules Related To Sysvol Access
new: Access To Sysvol Policies Share By Uncommon Process
new: Access To Potentially Sensitive Sysvol Files By Uncommon Application 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-21 17:04:40 +01:00
Qasim Qlf efb67a3c67 Merge PR #4635 from @qasimqlf - Fix error in modifier usage
fix: Suspicious Command Patterns In Scheduled Task Creation - Fix error in modifier usage

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-21 16:38:11 +01:00
Sajid Nawaz Khan d88e556516 Merge PR #4628 from @ssnkhan - New: Detect Creation of Cloudflared Quick Tunnels
new: Cloudflared Tunnels Related DNS Requests
new: Cloudflared Portable Execution
new: Cloudflared Quick Tunnel Execution
new: Renamed Cloudflared.EXE Execution
update: Cloudflared Tunnel Connections Cleanup - Enhanced CLI flag selection to remove the unnecessary double dash
update: Cloudflared Tunnel Execution - Enhanced CLI flag selection to remove the unnecessary double dash

---------

Co-authored-by: Sajid Nawaz Khan <snkhan@Sajids-MacBook-Pro.local>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-21 12:32:08 +01:00
Stephen Lincoln 267de25efb Merge PR #4633 from @slincoln-aiq - New Rules Related To Desktop Background Change
new: Potentially Suspicious Desktop Background Change Using Reg.EXE
new: Potentially Suspicious Desktop Background Change Via Registry 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-21 11:44:52 +01:00
jstnk9 3bb3b9cb5b Merge PR #4615 from @jstnk9 - Update WMIC Discovery Rule + New System Discovery Rules For MacOS
new: System Information Discovery Using Ioreg
new: System Information Discovery Using sw_vers
new: Potential Base64 Decoded From Images
new: System Information Discovery Via Wmic.EXE
update: Uncommon System Information Discovery Via Wmic.EXE - Updated logic to focus on more specific WMIC query sequence to increase the level and added a related rule to cover the missing gaps in d85ecdd7-b855-4e6e-af59-d9c78b5b861e
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-21 11:09:47 +01:00
tr0mb1r fcc1cfbe98 Merge PR #4632 from @tr0mb1r - Add exclusion for pipe names starting with \pipe\
fix: HackTool - EfsPotato Named Pipe Creation - Add exclusion for pipe names starting with `\pipe\`

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-21 10:11:49 +01:00
AdmU3 6bab8fe4dc Merge PR #4626 from @AdmU3 - Add New Rules Related To tar.exe Usage
new: Compressed File Creation Via Tar.EXE
new: Compressed File Extraction Via Tar.EXE 

---------

Co-authored-by: Admu3 <ahhyy.1405@gmail.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-20 12:28:51 +01:00
Nasreddine Bencherchali 412edd1e1a Merge PR #4631 from @nasbench - add rules related to CISA aa23-347a advisory and other updates
new: DLL Names Used By SVR For GraphicalProton Backdoor
new: Enable LM Hash Storage
new: Enable LM Hash Storage - ProcCreation
new: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor
new: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor - Task Scheduler
update: Compress-Archive Cmdlet Execution - Reudced Level to low and moved to Threat Hunting folder.
update: Disabled Volume Snapshots - Update logic by removing the reg string to also account for potential renamed executions
update: Folder Compress To Potentially Suspicious Output Via Compress-Archive Cmdlet - Update logic to be more specific
update: Potential Recon Activity Via Nltest.EXE - Add dnsgetdc coverage and enhance logic by removing /
update: Potential System DLL Sideloading From Non System Locations - Enhance logic by removing hardcoded C: value to account for other potential system locations
update: RestrictedAdminMode Registry Value Tampering - ProcCreation - Update logic the logic to not care about the data. As this registry value has use cases either be it "0" or "1"
update: RestrictedAdminMode Registry Value Tampering - Update logic the logic to not care about the data. As this registry value has use cases either be it "0" or "1"
update: Write Protect For Storage Disabled - Update logic by removing the reg string to also account for potential renamed executions
update: Zip A Folder With PowerShell For Staging In Temp - PowerShell Module - Update logic to be more specific
update: Zip A Folder With PowerShell For Staging In Temp - PowerShell - Update logic to be more specific
update: Zip A Folder With PowerShell For Staging In Temp - PowerShell Script - Update logic to be more specific

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-12-18 16:46:46 +01:00
mcdave2k1 dc4456fc0f Merge PR #4619 from @mcdave2k1 - Tune false positives with IMAP & SMTP ports
fix: Suspicious Office Outbound Connections - Enhanced the filter by adding new ports that cause FP with SMTP and IMAP communications 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-12-18 11:19:13 +01:00
phantinuss ae5b89dc95 Merge PR #4627 from @phantinuss - Add additional filters to cover both program file folders
fix: Suspicious SYSTEM User Process Creation - add additional filters to cover both program file folders for FP with Java process
2023-12-14 19:50:25 +01:00
Mohamed Ashraf 987a733adc Merge PR #4614 from @X-Junior - updates for multiple rules 4-12-2023
update: PowerShell Execution With Potential Decryption Capabilities
update: Malware User Agent

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-12-11 10:42:44 +01:00