Commit Graph

16130 Commits

Author SHA1 Message Date
Nasreddine Bencherchali 8f8ce06ffb Merge PR #4833 from @nasbench - New rules related to Forest Blizzard activity
new: Forest Blizzard APT - Custom Protocol Handler Creation
new: Forest Blizzard APT - Custom Protocol Handler DLL Registry Set
new: Forest Blizzard APT - File Creation Activity
new: Forest Blizzard APT - JavaScript Constrained File Creation
new: Forest Blizzard APT - Process Creation Activity
2024-04-24 10:04:28 +02:00
pratinavchandra e1a713d264 Merge PR #4823 from @pratinavchandra - Update CLI flag for Gatekeeper Bypass via Xattr
update: Gatekeeper Bypass via Xattr - Update command line flag 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-19 11:10:38 +02:00
signalblur a1a3b29692 Merge PR #4795 from @signalblur - Update Linux Command History Tampering rule
update: Linux Command History Tampering - Increase coverage to include other history files 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-17 14:28:17 +02:00
nikitah4x 5b4bfd6ffd Merge PR #4814 from @nikitah4x - Add new rule to detect MFA bypass in Cisco Duo
new: Cisco Duo Successful MFA Authentication Via Bypass Code

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-17 12:28:38 +02:00
signalblur 86ca651ea6 Merge PR #4801 from @signalblur - Add Pnscan rule
new: Pnscan Binary Data Transmission Activity 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-16 14:36:41 +02:00
Fukusuke Takahashi 4dc77dc175 Merge PR #4819 from @fukusuket - Fix regex escape
fix: Invoke-Obfuscation Via Stdin - explicitly escape { to make it clear that it is a literal
2024-04-16 12:57:45 +02:00
Fukusuke Takahashi 1a85bc5b5a Merge PR #4799 from @fukusuket - Fix typo in selection name
chore: fix typo in selection name
2024-04-15 17:01:15 +02:00
Hongbo ae49e3a465 Merge PR #4787 from @ya0guang - Fix typo in test_logsource.py
chore: fix typo in `test_logsource.py`
2024-04-15 17:00:21 +02:00
Hongbo 9e6952ec6a Merge PR #4789 from @ya0guang - Fix typo in test_rules.py
chore: fix typo in `test_rules.py` condition
2024-04-15 16:58:02 +02:00
Hongbo a235795ddd Merge PR #4790 from @ya0guang - Update test_rules.py
chore: fix typo in `test_rules.py`
2024-04-15 16:56:41 +02:00
PiRomant 8c46c94a60 Merge PR #4798 from @PiRomant - Update Hashes field to use contains modifier
update: HackTool - CoercedPotato Execution - Update Hashes field to use contains modifier
update: HackTool - HandleKatz LSASS Dumper Execution - Update Hashes field to use contains modifier
update: HackTool - SysmonEOP Execution - Update Hashes field to use contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 16:43:49 +02:00
frack113 045a9a5faa Merge PR #4803 from @frack113 - Update regex based rules
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation VAR+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Stdin - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Use Clip - Update rule to use regex for better accuracy in CLI 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-15 16:37:15 +02:00
Swachchhanda Shrawan Poudel b40d86599c Merge PR #4806 from @swachchhanda000 - Potential KeyScrambler.exe DLL Side-loading
new: Potential KeyScrambler.exe DLL Side-loading

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:58:20 +02:00
frack113 691dca6fd2 Merge PR #4808 from @frack113 - FP Bad practice GPO
fix: Windows Binaries Write Suspicious Extensions - Add new filter for when "bat" or "powershell" scripts are written via GPO to run at startup.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:43:35 +02:00
frack113 8687ba8ce6 Merge PR #4813 from @frack113 - Add Image to avoid FP
fix: File And SubFolder Enumeration Via Dir Command - Fix false positive with Firefox and similar CLI apps.
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:42:32 +02:00
frack113 c21a4e10b8 Merge PR #4807 from @frack113 - Update ATT&CK tags
chore: update ATT&CK tags for `Active Directory Structure Export Via Csvde.EXE`
2024-04-15 10:46:47 +02:00
Mohamed Ashraf f21281ab29 Merge PR #4815 from - Add new malware user-Agent 2024-04-15 10:26:56 +02:00
github-actions[bot] 9104b4d22b Merge PR #4816 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-04-15 10:25:48 +02:00
Florian Roth 626a6fc6e3 Merge pull request #4811 from ruppde/master
Update proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml
2024-04-14 09:25:37 +02:00
Florian Roth f8ca605446 docs: added modification date 2024-04-14 08:32:09 +02:00
Arnim Rupp 146c91c4b9 Update proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml
Fix FP reported by @Neo23x0
2024-04-12 19:25:13 +02:00
TheLawsOfChaos 93b71ec1bb Update proc_creation_win_exploit_cve_2017_11882.yml (#4810)
Removed https://embedi[.]com/ link as it points to a malaysian casino page now, added a different short blog and the github PoC.
2024-04-12 07:26:46 +02:00
phantinuss 9078b857a1 Merge PR #4805 from @phantinuss - fix: FP with chocolatey shimgen tool
fix: Dynamic .NET Compilation Via Csc.EXE - FP with chocolatey
2024-04-09 12:34:37 +02:00
phantinuss 4319f5807f Merge PR #4802 from @phantinuss - FP Fixes
fix: Windows Binaries Write Suspicious Extensions - fix selection
fix: Rundll32 Execution With Uncommon DLL Extension - add optional filter for MS Edge update
2024-04-05 08:47:18 +02:00
phantinuss 6505e72604 Merge PR #4797 from @phantinuss - fix: filter PS1 policy check for AppLocker mode
fix: Windows Binaries Write Suspicious Extensions - filter PS1 policy check for AppLocker mode
2024-04-03 10:08:50 +02:00
Arnim Rupp 71ae004b32 Merge PR #4794 from @ruppde - Potential Exploitation of CVE-2024-3094
new: Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: Thomas Patzke <thomas@patzke.org>
2024-04-02 15:01:14 +02:00
phantinuss 3e389b1ffd Merge PR #4788 from @phantinuss - fix: regularly loaded by wsmprovhost.exe
update: Suspicious Volume Shadow Copy VSS_PS.dll Load - regularly loaded by wsmprovhost.exe
2024-04-02 09:27:58 +02:00
github-actions[bot] a8e1ecd658 Merge PR #4791 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-04-01 15:14:10 +02:00
github-actions[bot] 720397d731 Merge PR #4792 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-04-01 15:13:17 +02:00
Nasreddine Bencherchali f0395b815b Merge PR #4774 from @nasbench - Fix and update multiple rules
Create Release / Create Release (push) Has been cancelled
fix: EVTX Created In Uncommon Location - Reduce level and remove filters
fix: Files With System Process Name In Unsuspected Locations - Add additional paths
fix: New RUN Key Pointing to Suspicious Folder
new: CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection
new: MaxMpxCt Registry Value Changed
update: Potentially Suspicious CMD Shell Output Redirect - Enhance logic
update: Suspicious Command Patterns In Scheduled Task Creation - Enhance logic

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
r2024-03-26
2024-03-26 19:09:21 +01:00
Leo Tsaousis 0d63f52ff5 Merge PR #4694 from @LAripping - Add native Kubernetes detections
new: Container With A hostPath Mount Created
new: Creation Of Pod In System Namespace
new: Deployment Deleted From Kubernetes Cluster
new: Kubernetes Events Deleted
new: Kubernetes Secrets Enumeration
new: New Kubernetes Service Account Created
new: Potential Remote Command Execution In Pod Container
new: Potential Sidecar Injection Into Running Deployment
new: Privileged Container Deployed
new: RBAC Permission Enumeration Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-26 18:26:46 +01:00
cyb3rjy0t 16d8345ca7 Merge PR #4725 from @cyb3rjy0t - Add new Azure AD rules
new: Certificate-Based Authentication Enabled
new: New Root Certificate Authority Added 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-26 18:25:59 +01:00
Nasreddine Bencherchali 8cbcaea48a Merge PR #4783 from @nasbench - Update registry rules logic and fix some false positives
fix: New TimeProviders Registered With Uncommon DLL Name - Add new legitimate entry to avoid FPs
new: Service Binary in User Controlled Folder
remove: Adwind RAT / JRAT - Registry
remove: Service Binary in Uncommon Folder
update: Add Port Monitor Persistence in Registry - Update logic to avoid hardcoded HKLM values
update: Change Winevt Channel Access Permission Via Registry - Update logic to avoid hardcoded HKLM values
update: CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry - Add more entries to increase coverage and update metadata information
update: Default RDP Port Changed to Non Standard Port - Update logic to avoid hardcoded HKLM values
update: Disable Administrative Share Creation at Startup - Update logic to avoid hardcoded HKLM values
update: Disable Microsoft Defender Firewall via Registry - Update logic to avoid hardcoded HKLM values
update: Disable Windows Event Logging Via Registry - Update logic to avoid hardcoded HKLM values
update: Displaying Hidden Files Feature Disabled - Update logic to avoid hardcoded HKLM values
update: FlowCloud Registry Marker - Update logic to avoid hardcoded HKLM values
update: New PortProxy Registry Entry Added - Update logic to avoid hardcoded HKLM values
update: Potential CobaltStrike Service Installations - Registry - Update logic to avoid hardcoded HKLM values
update: Register New IFiltre For Persistence - Update logic to avoid hardcoded HKLM values
update: Registry Persistence via Service in Safe Mode - Update logic to avoid hardcoded HKLM values
update: Run Once Task Configuration in Registry - Update logic to avoid hardcoded HKLM values
update: Security Support Provider (SSP) Added to LSA Configuration - Update logic to avoid hardcoded HKLM values
update: ServiceDll Hijack - Update logic to avoid hardcoded HKLM values
update: Sysmon Driver Altitude Change - Update logic to avoid hardcoded HKLM values
update: Windows Defender Service Disabled - Registry - Update logic to avoid hardcoded HKLM values

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-03-26 13:28:49 +01:00
Nasreddine Bencherchali c0f7733837 Merge PR #4781 from @nasbench - KamiKakaBot Malware Related Rules
new: Potential KamiKakaBot Activity - Lure Document Execution
new: Potential KamiKakaBot Activity - Shutdown Schedule Task Creation
new: Potential KamiKakaBot Activity - Winlogon Shell Persistence

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-03-25 12:35:50 +01:00
xiangchen96 961932ee3f Merge PR #4780 from @xiangchen96 - Minor fix for ip lookup rules
update: Suspicious DNS Query for IP Lookup Service APIs - Fix ip.cn
update: Suspicious Network Connection to IP Lookup Service APIs - Fix ip.cn
2024-03-22 12:24:22 +01:00
Nasreddine Bencherchali 8894f912b8 Merge PR #4779 from @nasbench - Update README.md
chore: update README.md
2024-03-21 16:39:14 +01:00
xiangchen96 759e224a90 Merge PR #4777 from xiangchen96 - add IP lookup services
update: Suspicious DNS Query for IP Lookup Service APIs - Add new domains
update: Suspicious Network Connection to IP Lookup Service APIs - Add new domains

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-03-21 10:13:22 +01:00
security-companion ba2baa1cec Merge PR #4776 from @security-companion - Fix broken reference links
chore: fix some broken reference links

Thanks: @security-companion
2024-03-21 02:38:12 +01:00
Mostafa Moradian 49adcf9a00 Merge PR #4775 from @mostafa - change action name to sigma-rules-validator
chore: change action name to sigma-rules-validator

Thanks: @mostafa
2024-03-18 16:44:59 +01:00
frack113 b24da5c685 Merge PR #4771 from @frack113 - Fix false positive found in testing
update: Uncommon Outbound Kerberos Connection - Security - Update filter to include device type paths and reduce the level to "medium"
update: Uncommon Outbound Kerberos Connection - Update filters to include tomcat and reduce the level to "medium"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-03-18 12:00:59 +01:00
Josh 68511f711f Merge PR #4759 from @joshnck - Add new rules covering incoming TeamViewer connection activity
new: Remote Access Tool - Team Viewer Session Started On Linux Host
new: Remote Access Tool - Team Viewer Session Started On MacOS Host
new: Remote Access Tool - Team Viewer Session Started On Windows Host 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-15 21:41:29 +01:00
frack113 33bed27a78 Merge PR #4767 from @frack113 - Update additional rules to use the windash modifier
update: Diskshadow Script Mode Execution - Update rule to use the windash modifier
update: IIS Native-Code Module Command Line Installation - Update rule to use the windash modifier
update: Replace.exe Usage - Update rule to use the windash modifier
update: Potential Arbitrary Command Execution Using Msdt.EXE - Update rule to use the windash modifier
update: Suspicious Cabinet File Execution Via Msdt.EXE - Update rule to use the windash modifier
update: DllUnregisterServer Function Call Via Msiexec.EXE - Update rule to use the windash modifier
update: Suspicious Msiexec Execute Arbitrary DLL - Update rule to use the windash modifier
update: Msiexec Quiet Installation - Update rule to use the windash modifier
update: Suspicious Msiexec Quiet Install From Remote Location - Update rule to use the windash modifier
update: Suspicious Response File Execution Via Odbcconf.EXE - Update rule to use the windash modifier
update: Changing Existing Service ImagePath Value Via Reg.EXE - Update rule to use the windash modifier
update: Exports Critical Registry Keys To a File - Update rule to use the windash modifier
update: Exports Registry Key To a File - Update rule to use the windash modifier
update: Imports Registry Key From a File - Update rule to use the windash modifier
update: Imports Registry Key From an ADS - Update rule to use the windash modifier
update: Potential Regsvr32 Commandline Flag Anomaly - Update rule to use the windash modifier
update: Capture Credentials with Rpcping.exe - Update rule to use the windash modifier
update: Potential Execution of Sysinternals Tools - Update rule to use the windash modifier
update: Kernel Memory Dump Via LiveKD - Update rule to use the windash modifier
update: Potential LSASS Process Dump Via Procdump - Update rule to use the windash modifier
update: Sysmon Configuration Update - Update rule to use the windash modifier
update: Uninstall Sysinternals Sysmon - Update rule to use the windash modifier
update: Loaded Module Enumeration Via Tasklist.EXE - Update rule to use the windash modifier
2024-03-15 21:40:15 +01:00
Mostafa Moradian d52189daa3 Merge PR #4772 from @mostafa - update sigma validation CI workflow to fix errors
chore: update sigma validation CI workflow to fix errors.
2024-03-15 18:21:15 +01:00
Mostafa Moradian 416de03cdc Merge PR #4769 from @mostafa - Update sigma validation workflow
chore: Add comment to the code
chore: Ignore inaccessible file
chore: Switch to using the action for validating Sigma rules

Thanks: @mostafa
2024-03-15 11:03:15 +01:00
github-actions[bot] 250e7d7fa8 Merge PR #4770 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-03-15 11:02:08 +01:00
frack113 583f08ecac Merge PR #4768 from @frack113 - Update workflows action version
chore: update workflows action version
2024-03-14 11:29:54 +01:00
frack113 6abf058185 Merge PR #4765 from @frack113 - Update additional rules to use the cidr modifier
update: Communication To Uncommon Destination Ports - Add link-local address range
update: Dfsvc.EXE Network Connection To Non-Local IPs - Update rule to use cidr modifier
update: Microsoft Sync Center Suspicious Network Connections - Add link-local address range
update: Network Connection Initiated By PowerShell Process - Update rule to use cidr modifier
update: Office Application Initiated Network Connection To Non-Local IP - Update rule to use cidr modifier
update: Outbound Network Connection To Public IP Via Winlogon - Add link-local address range
update: Potential CVE-2023-23397 Exploitation Attempt - SMB - Update rule to use cidr modifier
update: Potentially Suspicious Malware Callback Communication - Add link-local address range
update: Potentially Suspicious Wuauclt Network Connection - Update rule to use cidr modifier
update: Publicly Accessible RDP Service - Add link-local address range
update: RDP Over Reverse SSH Tunnel - Update rule to use cidr modifier
update: Rundll32 Internet Connection - Add link-local address range
update: Script Initiated Connection to Non-Local Network - Update rule to use cidr modifier
update: Search-ms and WebDAV Suspicious Indicators in URL - Add link-local address range
update: Search-ms and WebDAV Suspicious Indicators in URL - Add link-local address range
update: WebDav Put Request - Update rule to use cidr modifier

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-13 14:51:21 +01:00
Mostafa Moradian 5d39223dd5 Merge PR #4724 from @mostafa - Update validation script and CI
chore: update sigma validation script and CI

Thanks: @mostafa
2024-03-12 12:49:55 +01:00
Kien a29064f48b Merge PR #4764 from @kietamin - Fix incorrect use of "modifier"
fix: Microsoft VBA For Outlook Addin Loaded Via Outlook - Fix incorrect use of "modifier"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-12 12:40:49 +01:00
Nasreddine Bencherchali 1758511a2e Merge PR #4762 from @nasbench - Fix false positives found in testing
Create Release / Create Release (push) Has been cancelled
fix: Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process - Add multiple new FP filters seen in the wild
fix: Potential System DLL Sideloading From Non System Locations - Add multiple new FP filters seen in the wild
new: CrackMapExec File Indicators
remove: CrackMapExec File Creation Patterns
remove: Suspicious Epmap Connection
r2024-03-11
2024-03-11 16:58:55 +01:00