Commit Graph

16185 Commits

Author SHA1 Message Date
Cygnetix dc35ae5600 Merge PR #4904 from @cygnetix - Fix typo in Suspicious SignIns From A Non Registered Device
chore: fix typo in `Suspicious SignIns From A Non Registered Device`

Thanks: cygnetix
2024-07-09 11:01:08 +02:00
Swachchhanda Shrawan Poudel 0bb6f0c0d7 Merge PR #4831 from @swachchhanda000 - Add Kapeka backdoor related Sigma rules
new: Kapeka Backdoor Autorun Persistence
new: Kapeka Backdoor Configuration Persistence
new: Kapeka Backdoor Execution Via RunDLL32.EXE
new: Kapeka Backdoor Loaded Via Rundll32.EXE
new: Kapeka Backdoor Persistence Activity
new: Kapeka Backdoor Scheduled Task Creation
new: Potential Kapeka Decrypted Backdoor Indicator 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-04 00:17:47 +02:00
Arnim Rupp 0511e57c81 Merge PR #4898 from @ruppde - Fix Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process
fix: Potential Exploitation of CVE-2024-3094 - Suspicious SSH Child Process - Remove `selection_2` as it generates tons of false positives.
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-03 19:48:53 +02:00
rahulchandran19 651bee3ee6 Merge PR #4894 from @rahulchandran19 - Fix broken logic with Application Removed Via Wmic.EXE
fix: Application Removed Via Wmic.EXE - Add missing "all" modifier to fix the broken logic. 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-02 12:06:46 +02:00
Ryan Plas 1d40f1d20b Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
chore: update Microsoft references link to use the "learn" subdomain instead of "docs". 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @ryanplasma
2024-07-02 12:00:11 +02:00
github-actions[bot] 7682688ca9 Merge PR #4892 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:51:28 +02:00
github-actions[bot] 47085e9489 Merge PR #4891 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:42:32 +02:00
Nick Moore 71867434d7 Merge PR #4890 from @kelnage - Update New Behaviours Okta Admin Console rule
update: Okta New Admin Console Behaviours - update to reflect Okta log data structure
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-26 23:31:17 +02:00
Nasreddine Bencherchali 5ea4f993ee Update Rules (#4872)
chore: delete "Pipfile" and "Pipfile.lock"
fix: Filter Driver Unloaded Via Fltmc.EXE - Add exclusion for ManageEngine
fix: Suspicious Child Process Of Wermgr.EXE - Exclude "WerConCpl.dll"
new: DNS Query To AzureWebsites.NET By Non-Browser Process
new: Files With System DLL Name In Unsuspected Locations
new: HackTool - Evil-WinRm Execution - PowerShell Module
new: HackTool - LaZagne Execution
new: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process
update: Copying Sensitive Files with Credential Data - Use "windash" modifier
update: Explorer Process Tree Break - Use "windash" modifier
update: Files With System Process Name In Unsuspected Locations - Remove old filter
update: Lolbin Unregmp2.exe Use As Proxy - Use "windash" modifier
update: LSASS Process Reconnaissance Via Findstr.EXE - Use "windash" modifier
update: New Remote Desktop Connection Initiated Via Mstsc.EXE - Use "windash" modifier
update: Potential Proxy Execution Via Explorer.EXE From Shell Process - Update metadata and moved to Threat Hunting folder
update: Potential Windows Defender AV Bypass Via Dump64.EXE Rename - Enhance logic
update: Renamed ProcDump Execution - Add new flag option
update: Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location - Use "windash" modifier

---------

Thanks: @qasimqlf
Thanks: @celalettin-turgut
Thanks: @cY83rR0H1t
2024-06-25 11:26:45 +02:00
Andreas Braathen 5397ea4f0a Merge PR #4882 from @netgrain - New rules related to LocaltoNet tunneling
new: Communication To LocaltoNet Tunneling Service Initiated
new: Communication To LocaltoNet Tunneling Service Initiated - Linux 

---------

Co-authored-by: Andreas Braathen <andreasb@mnemonic.io>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-20 13:09:49 +02:00
github-actions[bot] 5a05ffc541 Merge PR #4879 from @nasbench - archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-20 11:44:19 +02:00
Arnim Rupp 0ccbda753a Merge PR #4873 from @ruppde - Add the string "mikatz" to relevant rules
update: Antivirus Hacktool Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Antivirus Password Dumper Detection - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
update: Relevant Anti-Virus Signature Keywords In Application Log - Add the string "mikatz" because of "HackTool:Win32/Mikatz"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 23:17:16 +02:00
Daniel Cortez d7bd6001d1 Merge PR #4773 from @DefenderDaniel - Add rules covering Nscurl usage
new: File Download Via Nscurl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-05 10:22:39 +02:00
z00t 06eaf2c1de Merge PR #4778 from @faisalusuf - Add new rule covering suspicious usage of Qemu
new: Potentially Suspicious Usage Of Qemu

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: threatHNTR
2024-06-03 14:23:51 +02:00
Sajid Nawaz Khan 09b822cfec Merge PR #4869 from @ssnkhan - Add new rules detecting Windows Recall feature enabling
new: Windows Recall Feature Enabled Via Reg.EXE
new: Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted
new: Windows Recall Feature Enabled - Registry 

---------

Co-authored-by: Sajid Nawaz Khan <snkhan@Sajids-MacBook-Pro.local>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-06-03 12:13:50 +02:00
David G c4c836aa33 Merge PR #4870 from @himynamesdave - Fix broken link in README.md
chore: fixing broken link in README.md
2024-06-03 10:32:29 +02:00
github-actions[bot] d84959e50f Merge PR #4867 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:29:22 +02:00
github-actions[bot] 3be29eb79e Merge PR #4868 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:28:40 +02:00
dajducz 48f2d09699 Merge PR #4784 from @tomaszdyduch - Add new DarkGate activity related rule
new: DarkGate - Drop DarkGate Loader In C:\Temp Directory
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 14:53:22 +02:00
Florian Roth 2bf502fb9c Merge PR #4866 from @Neo23x0 - Update network connection rules
new: Network Connection Initiated From Users\Public Folder
update: Outbound Network Connection Initiated By Cmstp.EXE - Exclude local IPs and ranges
update: Network Connection Initiated To Mega.nz - Reduce level to "low"
new: Network Communication Initiated To Portmap.IO Domain
update: Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder - Add additional file paths
update: Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location - Add additional file paths
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 13:53:53 +02:00
pratinavchandra 9bfe3d6e62 Merge PR #4865 from @pratinavchandra - Add new rules related to "tmutil" potential abuse
new: Time Machine Backup Deletion Attempt Via Tmutil - MacOS
new: Time Machine Backup Disabled Via Tmutil - MacOS
new: New File Exclusion Added To Time Machine Via Tmutil - MacOS

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-31 12:52:55 +02:00
Cygnetix ae45e83c73 Merge PR #4864 from @cygnetix - Update CA Policy Updated by Non Approved Actor
update: CA Policy Updated by Non Approved Actor - detect using a map of fields instead of a list
2024-05-28 15:20:18 +02:00
pratinavchandra 6a5cf5c37c Merge PR #4785 from @pratinavchandra - add System Information Discovery Via Sysctl - MacOS
new: System Information Discovery Via Sysctl - MacOS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 18:05:09 +02:00
skaynum 9f10345076 Merge PR #4840 from @skaynum - Add new rules related to MySQL daemon and potential phishing attempts
new: Uncommon File Creation By Mysql Daemon Process
new: Potential Suspicious Browser Launch From Document Reader Process
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 16:48:54 +02:00
Vasiliy Burov 92fd446b7d Merge PR #4859 from @vburov - Update casing of Win32_ShadowCopy for multiple rules
chore: update casing of `Win32_ShadowCopy` for multiple rules

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:33:46 +02:00
CR-OfirTal 4163fde77f Merge PR #4860 from @CR-OfirTal - Fix a typo in the regex of some rules
remove: Potential NT API Stub Patching
fix: Dynamic .NET Compilation Via Csc.EXE - Fix typo in regex
fix: Csc.EXE Execution Form Potentially Suspicious Parent - Fix typo in regex
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:27:34 +02:00
frack113 1c1081d87a Merge PR #4862 from @frack113 - Add Uncommon Process Access Rights For Target Image
new: Uncommon Process Access Rights For Target Image

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 14:23:52 +02:00
Kamran Saifullah 2fcf250978 Merge PR #4863 from @deFr0ggy - Add network connection counterpart rule for cloudflare tunnels
update: Cloudflared Tunnels Related DNS Requests - Update description and related field
new: Network Connection Initiated To Cloudflared Tunnels Domains
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-27 13:10:06 +02:00
github-actions[bot] e9cb6fc400 Merge PR #4855 from @nasbench - Update rule ref archive cache
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-05-27 12:53:54 +02:00
JeremyH f334abfd29 Remove smart quotes from file_event_win_iphlpapi_dll_sideloading.yml (#4856) 2024-05-15 22:21:50 +02:00
Nasreddine Bencherchali ed789f54ce Merge PR #4853 from @nasbench - Add some cosmetic changes and small updates
Create Release / Create Release (push) Has been cancelled
update: Potentially Suspicious Execution Of PDQDeployRunner - Add additional processes to the list
update: Use Icacls to Hide File to Everyone - Remove "C:\Users" to increase coverage
r2024-05-13
2024-05-13 16:59:44 +02:00
pratinavchandra 2837671f38 Merge PR #4782 from @pratinavchandra - Add Launch Agent/Daemon Execution Via Launchctl
new: Launch Agent/Daemon Execution Via Launchctl 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 16:55:33 +02:00
Swachchhanda Shrawan Poudel bd454b60aa Merge PR #4818 from @swachchhanda000 - Add Potentially Suspicious Child Process Of KeyScrambler.exe
new: Potentially Suspicious Child Process Of KeyScrambler.exe 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:48:35 +02:00
frack113 fb3a72b433 Merge PR #4852 from @frack113 - Add Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock
new: Potential Packet Capture Activity Via Start-NetEventSession - ScriptBlock

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 13:18:39 +02:00
frack113 7d6f32d1be Merge PR #4850 from @frack113 - Cleanup rule conditions to align with standard
chore: Cleanup conditions
update: Scheduled Task Creation From Potential Suspicious Parent Location - Add additional "temporary folder" locations.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 12:10:33 +02:00
frack113 aaf51bf880 Merge PR #4830 from @frack113 - Enhance Wbadmin based rules
new: All Backups Deleted Via Wbadmin.EXE
new: Sensitive File Dump Via Wbadmin.EXE
new: File Recovery From Backup Via Wbadmin.EXE
new: Sensitive File Recovery From Backup Via Wbadmin.EXE
update: Windows Backup Deleted Via Wbadmin.EXE - Enhance logic and increase coverage

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 11:15:30 +02:00
frack113 9341930635 Merge PR #4851 from @frack113 - Fix typo in modifier usage
fix: Forest Blizzard APT - Process Creation Activity - Typo in modifier
2024-05-13 10:36:01 +02:00
Joe 6412c1a02b Merge PR #4822 from @hasselj - Add Potentially Suspicious Malware Callback Communication - Linux
new: Potentially Suspicious Malware Callback Communication - Linux
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 17:07:43 +02:00
frack113 fe26ffa0f2 Merge PR #4838 from @frack113 - Add Access To Windows Outlook Mail Files By Uncommon Application
new: Access To Windows Outlook Mail Files By Uncommon Application

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:56:57 +02:00
Josh 0192a5207e Merge PR #4839 from @joshnck - Add New RDP Connection Initiated From Domain Controller
new: New RDP Connection Initiated From Domain Controller 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:32:09 +02:00
Ahmed Farouk b175b15033 Merge PR #4845 from @ahmedfarou22 - Proxy WebDAV Rule Improvements/New Rule
new: Suspicious External WebDAV Execution
remove: Search-ms and WebDAV Suspicious Indicators in URL
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:16:42 +02:00
frack113 392e3a39c8 Merge PR #4843 from @frack113 - Add New-NetFirewallRule usage related rules
new: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add new EID and paths
update: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Add new EID and paths

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 15:58:39 +02:00
frack113 7cdcb7605c Merge PR #4844 from @frack113 - Update UAC based rules
update: UAC Disabled - update metadata
new: UAC Secure Desktop Prompt Disabled
new: UAC Notification Disabled 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 13:39:30 +02:00
frack113 2cfa9a2d1f Merge PR #4847 from @frack113 - Update test Workflow to use pySigma-validators-sigmahq
chore: update workflow to use "pySigma-validators-sigmahq"
2024-05-10 10:32:54 +02:00
github-actions[bot] f7ec533704 Merge PR #4841 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from "experimental" to "test"
2024-05-02 10:34:25 +02:00
github-actions[bot] 45b93fcfab Merge PR #4842 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-05-02 10:33:45 +02:00
Expected 39db80478e Merge PR #4834 from @CertainlyP - Add Outbound Network Connection Initiated By Microsoft Dialer
Create Release / Create Release (push) Has been cancelled
new: Outbound Network Connection Initiated By Microsoft Dialer 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
r2024-04-29
2024-04-29 12:54:38 +02:00
James C 6ac6153976 Merge PR #4836 from @jamesc-grafana - Update AWS Rule to use fieldref modifier instead of contains
update: AWS User Login Profile Was Modified - use fieldref instead of contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-29 12:53:54 +02:00
Nasreddine Bencherchali 481337a8c3 Merge PR #4837 from @nasbench - fix fp reported in #4820
fix: ADS Zone.Identifier Deleted By Uncommon Application - Filter out "chrome" and "firefox" processes.
2024-04-26 15:39:44 +02:00
Nasreddine Bencherchali f61c1f4509 Merge PR #4832 from @nasbench - Update LOLBIN rules
update: Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE - Update logic to add additional variation of the extensions
update: Arbitrary File Download Via ConfigSecurityPolicy.EXE - Update description
update: C# IL Code Compilation Via Ilasm.EXE - Add flags to increase accuracy of the rule instead of it focusing on "any" execution
update: COM Object Execution via Xwizard.EXE - Update logic
update: JScript Compiler Execution - Update metadata
update: ManageEngine Endpoint Central Dctask64.EXE Potential Abuse - Update logic to account for flags and increase accuracy
update: Potential Application Whitelisting Bypass via Dnx.EXE - Update description
update: Potential Arbitrary Command Execution Via FTP.EXE - Use "windash" modifier and update description
update: Potential Arbitrary File Download Via Cmdl32.EXE - Remove unnecessary spaces to account for flags being at the end.
update: Renamed ZOHO Dctask64 Execution - Add additional imphash values
update: Windows Kernel Debugger Execution - Reduce level to "medium"
update: Xwizard.EXE Execution From Non-Default Location - Update description

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-26 13:40:11 +02:00