Commit Graph

293 Commits

Author SHA1 Message Date
Nasreddine Bencherchali 8afa3ed1b6 Renamed + Update 2022-07-04 13:38:08 +01:00
Nasreddine Bencherchali 78f039311a Fix error 2022-07-03 19:45:18 +01:00
Nasreddine Bencherchali f9d6f468c3 Update 2022-07-03 19:43:03 +01:00
Florian Roth e07b2f115b Merge pull request #3173 from nasbench/master
Update + New Rules
2022-06-29 17:22:02 +02:00
Florian Roth 71edfa3550 Merge pull request #3176 from redsand/fp_reorder_system_ignore_all
False positive whre system needs to be filtered first against any wri…
2022-06-29 16:50:25 +02:00
Tim Shelton ef4d3efa3a False positive whre system needs to be filtered first against any writes, as its related to drivers especially backups 2022-06-29 13:25:24 +00:00
Nasreddine Bencherchali 5e42c4086a Add new PowerShell Function and Scripts 2022-06-28 22:18:44 +01:00
Florian Roth 2da48f5052 Merge pull request #3167 from SigmaHQ/rule-devel
Rules: Bitsadmin coverage and minor improvements
2022-06-28 17:25:03 +02:00
Florian Roth 46e22d6d73 rule: WerFault process memory dump 2022-06-27 15:53:06 +02:00
Florian Roth be5ee96e6f refactor: lsass dump file, nano dump default 2022-06-27 15:49:15 +02:00
phantinuss e2a719a312 fix: typo 2022-06-27 08:47:30 +02:00
Nasreddine Bencherchali 71d895c17b Update file_event_win_notepad_plus_plus_persistence.yml
Reduce level to account for FP found in testing env
2022-06-21 11:43:42 +01:00
Florian Roth 10e39e41f7 Merge pull request #3143 from SigmaHQ/rule-devel
Rule level refactoring: critical > high
2022-06-19 15:04:46 +02:00
Florian Roth 6caeb2fff6 docs: added link 2022-06-18 18:19:55 +02:00
Florian Roth f728893364 refactor: rule level adjustments - critical to high 2022-06-18 17:43:22 +02:00
Nasreddine Bencherchali 7ada37a364 Update file_event_win_winword_cve_2021_40444.yml 2022-06-17 12:17:28 +01:00
Nasreddine Bencherchali 9e0ef7251b Update file_event_win_winword_cve_2021_40444.yml 2022-06-17 11:59:17 +01:00
Nasreddine Bencherchali cde97e7168 Update file_event_win_winword_cve_2021_40444.yml 2022-06-17 11:55:13 +01:00
Nasreddine Bencherchali d5146fe0d4 Update file_event_win_winword_cve_2021_40444.yml 2022-06-17 11:53:17 +01:00
Nasreddine Bencherchali 2ab106ddee Small Update and New Rule 2022-06-16 23:37:50 +01:00
Nasreddine Bencherchali 40564ac49f Update file_event_win_notepad_plus_plus_persistence.yml 2022-06-10 20:06:03 +01:00
Nasreddine Bencherchali 41dd9246fd GUP LOLBIN Rules + Update AccCheckConsole Rule 2022-06-10 19:07:25 +01:00
Florian Roth 7c837334b1 Update file_event_win_susp_diagcab.yml 2022-06-09 18:27:50 +02:00
frack113 879ea39b6d Add file_event_win_susp_diagcab 2022-06-08 13:39:49 +02:00
Max Altgelt c32e0b27a5 feat: new rule for persistence using Office startup 2022-06-07 14:25:52 +01:00
frack113 f16dc71e2a Merge pull request #3101 from nasbench/master
New/Update Rules
2022-06-07 11:11:10 +02:00
Nasreddine Bencherchali 7327dd53e5 New/Update Rules
- Renamed "sql_injection_keywords.yml" to "web_sql_injection_keywords.yml" to conform with the rest of the rule in the WEB directory
- Renamed "xss_keywords.yml" to "web_xss_keywords.yml" to conform with the rest of the rule in the WEB directory
- Renamed "proc_create_win_msdt_susp_parent.yml" to "proc_creation_win_msdt_susp_parent.yml" to conform with other process creation rules
-  Renamed "proc_create_win_sdiagnhost_susp_child.yml" to "proc_creation_win_sdiagnhost_susp_child.yml" to conform with other process creation rules
- Moved the rule "win_powershell_snapins_hafnium.yml" to process_creation folder instead of the WEB folder
- Created "web_susp_windows_path_uri.yml" to detect URI that contains susp windows paths
- Updated the description "web_webshell_keyword.yml" and added 3 more cases
-  Created "file_event_win_cve_2021_44077_poc_default_files.yml" to detect the default dropped file from the POC of CVE-2021-44077 (Showcased in the DFIR report)
- Created "proc_creation_win_renamed_plink.yml" to detect renamed usage of "Plink"
2022-06-06 21:16:52 +01:00
frack113 a98e88b722 Filter valid ext 2022-06-06 21:51:15 +02:00
frack113 ae93919e95 Add file_event_win_susp_winword_startup 2022-06-05 10:29:17 +02:00
Florian Roth 7bd4d68580 Merge branch 'master' into aurora-false-positive-fixing 2022-06-04 12:52:14 +02:00
Florian Roth 6d9587dab2 fix: Aurora FPs / NVidia driver update 2022-06-04 12:44:51 +02:00
frack113 8de0027ca3 refactor condition 2022-06-03 15:35:24 +02:00
Nasreddine Bencherchali 97856b562a Add "\" to "Image|endswith" modifier
- Added the "\\" (backslash) for the "(Parent)Image|endswith" modifiers to avoid possible confusion.
- The modification were mostly done on  default windows binaries to avoid changing logic of other rules.
2022-06-02 13:39:07 +01:00
phantinuss 32169dbc33 chore: harmonization of generic 'nt system' user checks
also a simple (non-commprehensive) test case to find
usages of localized user names
2022-05-27 15:16:31 +02:00
Tim Shelton b35cb0d315 Merge branch 'master' of https://github.com/redsand/sigma into fp_file_event_win_webshell_creation 2022-05-26 18:31:37 +00:00
Tim Shelton 8ef2a37fda clean up condition 2022-05-25 20:24:47 +00:00
Tim Shelton 7369908284 fixing yaml syntax check 2022-05-24 22:52:04 +00:00
Tim Shelton 9a3fc4f543 FP: System image (driver) restoring files. Valid behavior 2022-05-24 22:31:05 +00:00
Nasreddine Bencherchali c3d807f53a Add More Malicious PowerShell Script/Cmdlet Names 2022-05-24 22:02:08 +01:00
Florian Roth a6202f7961 Merge pull request #3041 from SigmaHQ/rule-devel
refactor: old rule additions, rule: new powershell rules
2022-05-24 20:24:42 +02:00
Florian Roth 9d11505aa8 refactor: rule additions 2022-05-24 15:19:25 +02:00
David ANDRE 74b9f97b9c Renamed suspicious in filenames to susp 2022-05-19 09:37:04 +02:00
Nasreddine Bencherchali dcf236fede Quick Updates and Fixes
- Added "Invoke-EventViewer.ps1" script to the rule "file_event_win_powershell_exploit_scripts"
- Added "OriginalFileName" to "proc_creation_win_susp_taskkill"
- Created rule for "winword" being used as a LOLBIN to download and load arbitrary DLLs
2022-05-18 12:50:59 +01:00
Nasreddine Bencherchali f0e05ccb3c Rule Update (Batch 2)
- Added 5 more PowerShell scripts for the rule "file_event_win_powershell_exploit_scripts.yml"
- Created new rule for "certoc" lolbin to cover "Download" option as described in the LOLBAS project
- Created specific rule for the "IEExec" lolbin to cover "Download" option as described in the LOLBAS Project
- Updated some rules to use "OriginalFileName" in addition to the "Image" selection
- Updated some rules to increase coverage.
2022-05-16 22:02:41 +01:00
frack113 196aa6d83d move deprecated rules 2022-05-14 09:42:32 +02:00
frack113 1f7021fedd Merge pull request #2996 from frack113/WerFault
Add file_event_win_werfault_dll_hijacking
2022-05-12 17:13:11 +02:00
Florian Roth ccfa7742da Update file_event_win_werfault_dll_hijacking.yml 2022-05-12 13:59:49 +02:00
Florian Roth 2b0db86440 Merge pull request #3002 from phantinuss/master
Various new Rule Tests
2022-05-11 15:49:46 +02:00
phantinuss 112b715dd6 chore: test rules: reactivate single value list check 2022-05-10 17:13:04 +02:00
frack113 c1a99350e6 Add file_event_win_werfault_dll_hijacking 2022-05-09 19:27:11 +02:00