Nasreddine Bencherchali
c3d807f53a
Add More Malicious PowerShell Script/Cmdlet Names
2022-05-24 22:02:08 +01:00
Florian Roth
c7b90f108f
Merge pull request #3039 from jstnk9/master
...
New sigma rule to detect the use of Jlaive antivirus defense evasion
2022-05-24 20:25:42 +02:00
Florian Roth
a6202f7961
Merge pull request #3041 from SigmaHQ/rule-devel
...
refactor: old rule additions, rule: new powershell rules
2022-05-24 20:24:42 +02:00
Florian Roth
4b100116d4
Merge pull request #3031 from CD-R0M/master
...
Create proc_creation_win_rundll32_parent_explorer.yml
2022-05-24 20:19:11 +02:00
Florian Roth
0e62d5b204
fix: bugs in rules
2022-05-24 20:18:41 +02:00
zakibro
7a33aac1ed
Update lnx_auditd_keylogging_with_pam_d.yml
...
adding missing uuid
2022-05-24 17:15:54 +02:00
zakibro
89d88288d6
New detection - Linux Keylogging
2022-05-24 17:05:38 +02:00
Florian Roth
37cef9b153
rule: PowerShell obfuscate Net.WebClient
2022-05-24 15:20:21 +02:00
Florian Roth
642a334d9e
rule: suspicious PowerShell encoded command patterns
2022-05-24 15:20:01 +02:00
Florian Roth
a296bfe667
rule: suspicious anydesk start location
2022-05-24 15:19:45 +02:00
Florian Roth
9d11505aa8
refactor: rule additions
2022-05-24 15:19:25 +02:00
jstnk9
6f1602d243
New sigma rule to detect the use of Jlaive antivirus defense evasion
2022-05-24 02:40:08 +02:00
Tim Shelton
0fb943dc2c
FP: fixing modifier
2022-05-23 21:43:43 +00:00
Tim Shelton
c807191ab7
FP: filtering out Amaazon AWS header
2022-05-23 21:41:13 +00:00
CD-R0M
87de0d39db
Update proc_creation_win_rundll32_parent_explorer.yml
2022-05-23 16:49:40 -04:00
phantinuss
61c10d73e0
fix: FP found in testing environment
2022-05-23 16:45:27 +02:00
CD-R0M
9c26e12358
Update proc_creation_win_rundll32_parent_explorer.yml
2022-05-22 15:23:25 -04:00
CD-R0M
e9976bc3db
Update proc_creation_win_rundll32_parent_explorer.yml
2022-05-22 15:21:41 -04:00
CD-R0M
1e728d9598
Create proc_creation_win_rundll32_parent_explorer.yml
2022-05-21 17:07:31 -04:00
Florian Roth
bea6f18d35
Merge pull request #3024 from redsand/win_system_susp_eventlog_cleared
...
Making a derived detection for system/application/security event logs…
2022-05-20 20:56:00 +02:00
Florian Roth
946e4582a3
Merge pull request #3030 from SigmaHQ/aurora-false-positive-fixing
...
fix: detection with Windows Defender
2022-05-20 20:05:43 +02:00
Florian Roth
e86d007d35
Merge pull request #3027 from elhoim/rename_suspicious
...
Renamed suspicious in filenames to susp
2022-05-20 19:28:24 +02:00
Florian Roth
e8f59c8d0f
fix: detection with Windows Defender
2022-05-20 19:27:48 +02:00
MatilJ
10f0a82b94
Fix detection
2022-05-19 21:09:47 +03:00
Tim Shelton
600a7cd0e8
Re-adding accidently removed entry
2022-05-19 17:16:39 +00:00
Tim Shelton
60e6a147b4
merging remote change
2022-05-19 16:11:58 +00:00
Tim Shelton
3f6cabcae8
Updating to include match on Channel
2022-05-19 16:08:34 +00:00
David ANDRE
74b9f97b9c
Renamed suspicious in filenames to susp
2022-05-19 09:37:04 +02:00
Florian Roth
003e5bee6d
Merge pull request #3018 from SigmaHQ/rule-devel
...
refactor: rule addition
2022-05-19 07:50:36 +02:00
Florian Roth
3fe86e3b84
rule: grpconv execution
2022-05-18 17:56:26 +02:00
Florian Roth
04a3dfeb01
Merge pull request #3025 from nasbench/master
...
Quick Updates and Fixes
2022-05-18 17:35:18 +02:00
Florian Roth
7d296ef078
fix: change on deleted rule
2022-05-18 17:34:39 +02:00
Florian Roth
99e81ea2eb
Merge branch 'pr/3023'
2022-05-18 17:33:10 +02:00
Florian Roth
a55e8f2ac1
refactor: PoSh Defender Tampering
2022-05-18 17:29:38 +02:00
Florian Roth
15cee5c0b1
Update proc_creation_win_susp_taskkill.yml
2022-05-18 17:28:26 +02:00
frack113
d620f11e84
Merge pull request #3021 from redsand/fix_err_in_assignment
...
User meant to use service vs category. currently no category assignme…
2022-05-18 17:16:30 +02:00
Nasreddine Bencherchali
dcf236fede
Quick Updates and Fixes
...
- Added "Invoke-EventViewer.ps1" script to the rule "file_event_win_powershell_exploit_scripts"
- Added "OriginalFileName" to "proc_creation_win_susp_taskkill"
- Created rule for "winword" being used as a LOLBIN to download and load arbitrary DLLs
2022-05-18 12:50:59 +01:00
Florian Roth
354e8ded4e
Merge pull request #3020 from nasbench/master
...
Rule Update (Batch 2)
2022-05-18 07:05:34 +02:00
Florian Roth
28e0e157fe
Update win_system_susp_eventlog_cleared.yml
2022-05-17 21:32:00 +02:00
Tim Shelton
60a38a95ef
removing duplicate keywords entry
2022-05-17 18:54:01 +00:00
Tim Shelton
b5b7adcb9c
Making a derived detection for system/application/security event logs being cleared, vs any in general. fp due to custom applications clearing their eventlog
2022-05-17 18:49:54 +00:00
Nasreddine Bencherchali
07a79acede
Update proc_creation_win_lolbas_extrac32.yml
2022-05-17 15:33:18 +01:00
Nasreddine Bencherchali
389240855d
Update proc_creation_win_lolbas_extrac32.yml
2022-05-17 15:17:09 +01:00
Nasreddine Bencherchali
3bbeab2a7b
Requested Changes
2022-05-17 15:04:26 +01:00
frack113
7ea6ed3db6
Merge pull request #3016 from frack113/ttdinjec
...
ttdinject lolbin
2022-05-17 06:28:22 +02:00
jbies121
b49633d32b
#2902 : Remove t1547.006
2022-05-16 21:57:30 -05:00
Tim Shelton
4bafd1317b
User meant to use service vs category. currently no category assignment for "system". We need a unit test to detect new sections here, vs backends. this was untested in the field.
2022-05-16 22:18:35 +00:00
Nasreddine Bencherchali
3a629e8a2e
Update proc_creation_win_certoc_download.yml
2022-05-16 22:05:00 +01:00
Nasreddine Bencherchali
f0e05ccb3c
Rule Update (Batch 2)
...
- Added 5 more PowerShell scripts for the rule "file_event_win_powershell_exploit_scripts.yml"
- Created new rule for "certoc" lolbin to cover "Download" option as described in the LOLBAS project
- Created specific rule for the "IEExec" lolbin to cover "Download" option as described in the LOLBAS Project
- Updated some rules to use "OriginalFileName" in addition to the "Image" selection
- Updated some rules to increase coverage.
2022-05-16 22:02:41 +01:00
Florian Roth
73706c96ab
fix: missing modified date mod
2022-05-16 17:24:26 +02:00