Commit Graph

15899 Commits

Author SHA1 Message Date
Sean Johnstone fa85c19b97 Merge PR #4523 from @sj-sec - Add New AWS Rule S3 Bucket Versioning Disable
new: AWS S3 Bucket Versioning Disable

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-10-29 01:17:14 +02:00
Nasreddine Bencherchali c08c29a4d1 Merge PR #4525 from @nasbench
new: Suspicious Unsigned Thor Scanner Execution
2023-10-29 01:11:50 +02:00
Wagga 8bf3282194 Merge PR #4524 from @wagga40 - Fix Typos In Metadata Fields
update: Registry Persistence via Service in Safe Mode - Fix typo in title
chore: Fix multiple typo in metadata fields and comments

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-28 13:15:09 +02:00
Nasreddine Bencherchali a51f60c887 Merge PR #4506 from @nasbench - Update README.md
chore: update README.md
2023-10-28 12:57:47 +02:00
Nasreddine Bencherchali 52e39113b9 Merge PR #4503 from @nasbench - Multiple Updates & Fixes
fix: Suspicious Sysmon as Execution Parent - Typo and restructure
update: Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
update: Antivirus Relevant File Paths Alerts
update: Dump Ntds.dit To Suspicious Location
update: MSI Installation From Suspicious Locations
update: PowerShell Profile Modification - Reduce rule level to medium
update: Obfuscated IP Download Activity

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-10-28 12:55:32 +02:00
Nasreddine Bencherchali fe3b8c4b7f Merge PR #4505 from @nasbench - Add New Rules Related to Onyx & Dimaond Sleet APT Exploitation Activity
fix: Potential System DLL Sideloading From Non System Locations
new: Diamond Sleet APT DNS Communication Indicators
new: Diamond Sleet APT File Creation Indicators
new: Diamond Sleet APT DLL Sideloading Indicators
new: Diamond Sleet APT Process Activity Indicators
new: Diamond Sleet APT Scheduled Task Creation - Registry
new: Diamond Sleet APT Scheduled Task Creation
new: Onyx Sleet APT File Creation Indicators
2023-10-28 12:54:05 +02:00
frack113 9f1d77290d Merge PR #4496 from @frack113 - Update & Add Findstr.EXE Rules
update: Recon Command Output Piped To Findstr.EXE - Logic re-write
new: Security Tools Keyword Lookup Via Findstr.EXE

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-10-28 12:51:30 +02:00
z00t 284730b966 Merge PR #4509 from @faisalusuf - Add New Rules Related to Okta Breach
new: Okta 2023 Breach Indicator Of Compromise
new: Okta Password Health Report Query
new: Okta Admin Functions Access Through Proxy
new: New Okta User Created
update: Okta New Admin Console Behaviours - Field notation
update: Potential Okta Password in AlternateID Field - Field notation

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-10-28 12:50:04 +02:00
Fukusuke Takahashi 587da70c94 Merge PR #4519 from @fukusuket - Update PowerShell Classic Rule To Use Data Field
update: Suspicious XOR Encoded PowerShell Command Line - PowerShell
update: Uncommon PowerShell Hosts
update: Delete Volume Shadow Copies Via WMI With PowerShell
update: PowerShell Downgrade Attack - PowerShell
update: PowerShell Called from an Executable Version Mismatch
update: Netcat The Powershell Version
update: Remote PowerShell Session (PS Classic)
update: Renamed Powershell Under Powershell Channel
update: Suspicious PowerShell Download
update: Use Get-NetTCPConnection
update: Zip A Folder With PowerShell For Staging In Temp - PowerShell
update: Tamper Windows Defender - PSClassic
update: Suspicious Non PowerShell WSMAN COM Provider
update: Suspicious XOR Encoded PowerShell Command Line - PowerShell

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-28 12:43:58 +02:00
citronninja 3f8eb891e8 Merge PR #4463 from @citronninja - Add New Rules Related to VsCode Tunnel Usage & Abuse
new: VsCode Code Tunnel Execution File Indicator
new: DNS Query To Devtunnels And VsCode Tunnels
new: Visual Studio Code Tunnel Remote File Creation
new: Renamed VsCode Code Tunnel Execution - File Indicator
new: Visual Studio Code Tunnel Execution
new: Visual Studio Code Tunnel Shell Execution
new: Renamed Visual Studio Code Tunnel Execution
new: Visual Studio Code Tunnel Service Installation
update: Potentially Suspicious Child Process Of VsCode

---------

Co-authored-by: Kylian ALAZARD <k.alazard@ucd481d7e4c92c.np-estoc.fr>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-10-28 12:42:55 +02:00
Tuutaans 1d40bd3ae2 Merge PR #4498 from @Tuutaans - Update PowerShell Security Software Discovery Rule
update: Security Software Discovery Via Powershell Script - Enhance logic, increase level to medium and demote to experimental

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: “Anish <“07tutaans@gmail.com”>
2023-10-28 12:41:41 +02:00
gs3cl 7071370989 Merge PR #4508 from @gs3cl - Update Hacktool and Network Scanner Linux Rules
update: Linux HackTool Execution - Increase coverage by adding more tools
update: Linux Network Service Scanning Tools Execution - Increase coverage by adding more tools

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-10-28 12:40:22 +02:00
frack113 1584787f33 Merge PR #4512 from @frack113 - Add Missing Emerging Threats Tag
chore: add missing tag `detection.emerging_threats` for emerging threats rules
2023-10-26 10:50:30 +02:00
frack113 86d5b6465f Merge PR #4511 from @frack113 - Add Missing Threat Hunting Tags.
chore: add missing `detection.threat_hunting` tag for threat hunting rules
2023-10-26 10:46:43 +02:00
EzLucky 8dc32d6dff Merge PR #4501 from @EzLucky - Update Coverage For Potential SPN Enumeration Via Setspn.EXE
update: Potential SPN Enumeration Via Setspn.EXE - Increase coverage by adding `/q` switch 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-23 19:37:39 +02:00
ts-lbf f928fcb936 Merge PR #4497 from @ts-lbf - New Rule Related To CVE-2023-20198 Exploitation
new: Exploitation Indicators Of CVE-2023-20198 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-23 19:36:26 +02:00
phantinuss 4852ee4648 Merge PR #4500 From @phantinuss
Create Release / Create Release (push) Waiting to run
chore: clarify latest release location in release message
r2023-10-23
2023-10-23 11:45:45 +02:00
Thurein Oo 816110fa50 Merge PR #4494 from @ThureinOo - Add CVE-2023-43261 Detection
new: Potential Information Discolosure CVE-2023-43261 Exploitation - Proxy
new: Potential Information Discolosure CVE-2023-43261 Exploitation - Web

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-23 10:38:41 +02:00
Nasreddine Bencherchali edf0ff5cc8 Merge PR #4491 from @nasbench - Rule Updates & Fixes
new: Lazarus APT DLL Sideloading Activity
new: File Download From IP Based URL Via CertOC.EXE
new: File Download From IP URL Via Curl.EXE
update: Remote Thread Creation By Uncommon Source Image
update: Remote Thread Creation In Uncommon Target Image
update: ADSI-Cache File Creation By Uncommon Tool
update: Files With System Process Name In Unsuspected Locations
update: PowerShell Module File Created By Non-PowerShell Process
update: PSScriptPolicyTest Creation By Uncommon Process
update: Suspicious LNK Double Extension File Created
update: PowerShell Profile Modification
update: Alternate PowerShell Hosts Pipe
update: File Download via CertOC.EXE
update: Suspicious File Download From IP Via Curl.EXE
update: Arbitrary File Download Via GfxDownloadWrapper.EXE
update: Potentially Suspicious Office Document Executed From Trusted Location

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-23 10:35:57 +02:00
Swachchhanda Shrawan Poudel 4dc36bf6bd Merge PR #4493 From @swachchhanda000
new: LSASS Process Memory Dump Creation Via Taskmgr.EXE

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-19 18:07:12 +02:00
phantinuss f91066f09f Merge PR #4490 From @phantinuss - Fix FP Found In Testing
fix: Suspicious Sysmon as Execution Parent - add WERFaultSecure.exe as exception
fix: System File Execution Location Anomaly - add pwsh 7 preview path as exception
2023-10-18 16:40:32 +02:00
Thurein Oo 4647bf829a Merge PR #4488 From @ThureinOo
new: PowerShell Script Execution Policy Enabled
update: Potential PowerShell Execution Policy Tampering 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-18 14:08:22 +02:00
Nasreddine Bencherchali 95793d73bd Merge PR #4482 From @nasbench - Add New Automation Workflows
chore: update workflows and add quality of life updates and automation to the repository

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-18 11:53:44 +02:00
Andreas Braathen cc4d2115b1 Merge PR #4413 From @netgrain - Add New Threat Hunting Rules Related To DllRegisterServer Abuse
new: Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly
new: Rundll32.EXE Calling DllRegisterServer Export Function Explicitly

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-18 11:38:25 +02:00
dependabot[bot] 136c6c39a2 chore(deps): bump urllib3 from 1.26.17 to 1.26.18 (#4485)
Bumps [urllib3](https://github.com/urllib3/urllib3) from 1.26.17 to 1.26.18.
- [Release notes](https://github.com/urllib3/urllib3/releases)
- [Changelog](https://github.com/urllib3/urllib3/blob/main/CHANGES.rst)
- [Commits](https://github.com/urllib3/urllib3/compare/1.26.17...1.26.18)

---
updated-dependencies:
- dependency-name: urllib3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-10-18 10:45:41 +02:00
phantinuss 79bce2c04e Merge PR #4484 From @phantinuss - Fix FP Found In Testing
fix: Direct Syscall of NtOpenProcess - falsepositives meta data
fix: Potential Shellcode Injection - remove System.ni.dll as there are multiple FPs with ntdll.dll
fix: Suspicious Shim Database Installation via Sdbinst.EXE - FP with another sdbinst execution by svchost
2023-10-17 17:01:34 +02:00
frack113 020fc8061f Merge PR #4479 From @frack113 - Upgrade Rules Status
chore: Upgrade status level from `experimental` to `test` for rules that have not changed in 300 days

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-10-17 14:35:26 +02:00
Micah Babinski 92874dad39 Merge PR #4481 From @mbabinski - Add New DarkGate AutoIt Rules
new: DarkGate - Autoit3.EXE File Creation By Uncommon Process
new: DarkGate - Autoit3.EXE Execution Parameters
update: DarkGate - User Created Via Net.EXE

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-16 14:12:40 +02:00
Thurein Oo 13c729648b Merge PR #4453 From @ThureinOo
update: Potential Webshell Creation On Static Website - Increase coverage with new extensions.

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-16 14:10:57 +02:00
frack113 2bd24966c2 Merge PR #4480 From @frack113 - Upgrade ET Rules Status
chore: Upgrade status level from `experimental` to `test` for emerging-threats rules that have not changed in 300 days
2023-10-15 20:39:13 +02:00
Nasreddine Bencherchali 7364ce00b1 Merge PR #4476 from @nasbench - re-organize cloud folder and other things
fix: Azure Active Directory Hybrid Health AD FS New Server - Update Logsource to align with the rest of the azure rules
fix: Azure Active Directory Hybrid Health AD FS Service Delete - Update Logsource to align with the rest of the azure rules
fix: Number Of Resource Creation Or Deployment Activities - Update Logsource to align with the rest of the azure rules
fix: Granting Of Permissions To An Account - Update Logsource to align with the rest of the azure rules
fix: Rare Subscription-level Operations In Azure - Update Logsource to align with the rest of the azure rules
fix: Google Workspace Application Removed - Update logsource product field to `gcp`
fix: Google Workspace Granted Domain API Access - Update logsource product field to `gcp`
fix: Google Workspace MFA Disabled - Update logsource product field to `gcp`
fix: Google Workspace Role Modified or Deleted - Update logsource product field to `gcp`
fix: Google Workspace Role Privilege Deleted - Update logsource product field to `gcp`
fix: Google Workspace User Granted Admin Privileges - Update logsource product field to `gcp`
2023-10-12 13:32:24 +02:00
Florian Roth 61e8d427c1 Merge PR #4477 from @Neo23x0 - CoercedPotato activity
new: HackTool - CoercedPotato Named Pipe Creation
new: HackTool - CoercedPotato Execution
update: Renamed CURL.EXE Execution - Extended filter

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-12 12:52:45 +02:00
phantinuss 2f9b90584c Merge PR #4476 From @phantinuss - Fix False Positives Found In Testing
fix: Potentially Suspicious AccessMask Requested From LSASS - FP with Avira from Windows temp folder
fix: Direct Syscall of NtOpenProcess - FP with another Firefox process and removing drive letters
fix: Control Panel Items - FP with command line observed from taskhost.exe
fix: Rundll32 Execution Without DLL File - remove non-essential ParentCommandLine dependency in filter
fix: Schtasks Creation Or Modification With SYSTEM Privileges - remove non-essential ParentImage dependency in filter
fix: Suspicious Elevated System Shell - remove non-essential ParentImage dependency in filter
fix: Suspicious Elevated System Shell - FP with Avira update utility
fix: Execution of Suspicious File Type Extension - FP with OpenOffice

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-12 12:47:45 +02:00
cyb3rjy0t 905abc4d64 Merge PR #4209 From @cyb3rjy0t - New TH Rule Related To E-Mail Forwarding Activity
new: Mail Forwarding/Redirecting Activity In O365

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-11 14:55:56 +02:00
j4son b257925e53 Merge PR #4267 From @haodangj - New Rules Related To BlueSky Ransomware and MSSQL Failed Logon
new: MSSQL Server Failed Logon
new: MSSQL Server Failed Logon From External Network
new: BlueSky Ransomware Artefacts

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-11 14:07:33 +02:00
Scoubi 34cea54750 Merge PR #4399 From @Scoubi - New Rules Related To INDEX_ALLOCATION Potential Abuse
new: Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream
new: Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream - CLI

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-11 14:06:28 +02:00
Greg 871f41df73 Merge PR #4239 From @greg-workspace - Add Rule Related To CVE-2023-27363
new: Potential CVE-2023-27363 Exploitation - HTA File Creation By FoxitPDFReader

---------

Co-authored-by: Greg <greg@MBP13-2020.local>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-11 13:58:19 +02:00
brady b91fa627d3 Merge PR #4387 From @br4dy5
new: Certificate Use With No Strong Mapping

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-11 13:46:17 +02:00
Tuutaans 889aae65a5 Merge PR #4472 From @Tuutaans - New Registry Rule Related To HVCI
Create Release / Create Release (push) Waiting to run
new: Hypervisor Enforced Code Integrity Disabled

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
r2023-10-09
2023-10-09 11:17:56 +02:00
phantinuss f04419c730 Merge PR #4470 From phantinuss - Fix FPs Found In Testing
fix: Generic Password Dumper Activity on LSASS - FP with GoogleUpdate.exe
fix: Rundll32 Execution Without DLL File - FP with another zzzzInvokeManagedCustomActionOutOfProc MSI installer
fix: Suspicious Shim Database Installation via Sdbinst.EXE - FP with being started as a background service
fix: Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation - FP with $WinREAgent folder
fix: Files With System Process Name In Unsuspected Locations - FP with wuaucltcore

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-09 00:07:56 +02:00
phantinuss 57176251b0 Merge PR #4469 From @phantinuss - Add Release Packages
chore: add workflows, scripts and documentation for release packages

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-09 00:02:20 +02:00
jkb 9d8e81241c Merge PR #4471 From @jkb-s - Update ATT&CK Tags
update: Ntdsutil Abuse - Update ATT&CK tags
2023-10-08 23:04:09 +02:00
Ali Alwashali 6075db0e2e Merge PR #4467 from @alwashali - New Rules Related To ScreenConnect RMM Activity
new: Remote Access Tool - ScreenConnect Command Execution
new: Remote Access Tool - ScreenConnect File Transfer
new: Remote Access Tool - ScreenConnect Temporary File
new: Remote Access Tool - ScreenConnect Remote Command Execution

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:09:49 +02:00
SILJAEUROPA a7fc610b70 Merge PR #4452 from @SILJAEUROPA - Add New Rules To AddInUtil Potential Abuse
new: Network Connection Initiated By AddinUtil.EXE
new: Suspicious AddinUtil.EXE CommandLine Execution
new: Uncommon Child Process Of AddinUtil.EXE
new: Uncommon AddinUtil.EXE CommandLine Execution
new: AddinUtil.EXE Execution From Uncommon Directory

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:07:50 +02:00
Nasreddine Bencherchali e230acd7ed Merge PR #4427 from @nasbench - Multiple Fixes & Enhancements
new: Application Terminated Via Wmic.EXE
new: Browser Execution In Headless Mode
new: Chromium Browser Headless Execution To Mockbin Like Site
new: DarkGate User Created Via Net.EXE
new: DMP/HDMP File Creation
new: Malicious Driver Load
new: Malicious Driver Load By Name
new: Potentially Suspicious DMP/HDMP File Creation
new: Remote DLL Load Via Rundll32.EXE
new: Renamed CURL.EXE Execution
new: Vulnerable Driver Load
new: Vulnerable Driver Load By Name
update: 7Zip Compressing Dump Files - Increase coverage
update: Amsi.DLL Loaded Via LOLBIN Process - Reduce level to `medium`
update: COM Hijack via Sdclt - Fix Logic
update: Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE - Increase coverage
update: Creation of an Executable by an Executable - Fix FP
update: DLL Load By System Process From Suspicious Locations - Reduce level to `medium`
update: DNS Query Request By Regsvr32.EXE - Reduce level to `medium`
update: DNS Query To MEGA Hosting Website - DNS Client - Update title and reduce level to `medium`
update: DNS Query To MEGA Hosting Website - Reduce level to `low` and update metadata
update: DNS Query To Remote Access Software Domain From Non-Browser App - Increase coverage with new domains
update: DNS Query To Ufile.io - DNS Client - Update title and reduce level to `low`
update: DNS Query To Ufile.io - Update title and reduce level to `low`
update: DNS Query Tor .Onion Address - Sysmon - Update title
update: DNS Server Discovery Via LDAP Query - Reduce level to `low` and update FP filters
update: DriverQuery.EXE Execution - Increase coverage
update: File Download From Browser Process Via Inline Link
update: Greedy File Deletion Using Del - Increase coverage
update: Leviathan Registry Key Activity - Fix logic
update: Network Connection Initiated By Regsvr32.EXE - Reduce level to `medium` and metadata update
update: Non Interactive PowerShell Process Spawned - Increase coverage
update: OceanLotus Registry Activity - Fix Logic
update: Office Application Startup - Office Test - Fix Logic
update: OneNote Attachment File Dropped In Suspicious Location - Fix FP
update: Potential Dead Drop Resolvers - Increase coverage with new domains
update: Potential Persistence Via COM Hijacking From Suspicious Locations - Increase coverage and fix logic
update: Potential Persistence Via COM Search Order Hijacking - Fix Logic
update: Potential Process Hollowing Activity - Update FP filters
update: Potential Recon Activity Using DriverQuery.EXE - Increase coverage
update: Potential Unquoted Service Path Reconnaissance Via Wmic.EXE - Reduce level to `medium`
update: Potentially Suspicious Event Viewer Child Process - Update metadata
update: PowerShell Initiated Network Connection - Update description
update: PowerShell Module File Created By Non-PowerShell Process - Fix FP
update: PsExec Tool Execution From Suspicious Locations - PipeName - Reduce level to `medium`
update: Python Image Load By Non-Python Process - Update description and title
update: Python Initiated Connection - Update FP filter
update: Remote Thread Creation By Uncommon Source Image - Update FP filter
update: Renamed AutoIt Execution - Increase coverage
update: Suspicious Chromium Browser Instance Executed With Custom Extensions - Increase coverage
update: Suspicious WebDav Client Execution Via Rundll32.EXE - New Title
update: Sysinternals Tools AppX Versions Execution - Reduce level to `low`
update: Sysmon Blocked Executable - Update logsource
update: UAC Bypass via Event Viewer - Fix Logic
update: UNC2452 Process Creation Patterns - Fix logic
update: Usage Of Malicious POORTRY Signed Driver - Deprecated
update: Vulnerable AVAST Anti Rootkit Driver Load - Deprecated
update: Vulnerable Dell BIOS Update Driver Load - Deprecated
update: Vulnerable Driver Load By Name - Deprecated
update: Vulnerable GIGABYTE Driver Load - Deprecated
update: Vulnerable HW Driver Load - Deprecated
update: Vulnerable Lenovo Driver Load - Deprecated
update: WebDav Client Execution Via Rundll32.EXE
update: Windows Update Error - Reduce level to `informational` and status to `stable`
update: Winrar Compressing Dump Files - Increase Coverage

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-04 19:06:57 +02:00
dependabot[bot] d58ccffcad chore(deps): bump urllib3 from 1.26.6 to 1.26.17 (#4468)
Bumps [urllib3](https://github.com/urllib3/urllib3) from 1.26.6 to 1.26.17.
- [Release notes](https://github.com/urllib3/urllib3/releases)
- [Changelog](https://github.com/urllib3/urllib3/blob/main/CHANGES.rst)
- [Commits](https://github.com/urllib3/urllib3/compare/1.26.6...1.26.17)

---
updated-dependencies:
- dependency-name: urllib3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-10-04 10:37:01 +02:00
Michael 43277f26fc Merge PR #4461 from @WTFender - Create AWS rule aws_sso_idp_change.yml
new: AWS Identity Center Identity Provider Change

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-29 16:37:01 +02:00
phantinuss 733de447de Merge PR #4464 from @phantinuss - Update Goodlog Test
chore: add threat hunting rules to goodlog tests

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-29 14:33:55 +02:00
RobertSchull c57c076e5e Merge PR #4457 from @RobertSchull - new rules MITRE's Center for Threat Informed Defense
* adding 4 analytics to test branch

* updating names

* Adding link to the CTID website.

* chore: fix metadata and logic

* fix: wording

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-29 13:56:49 +02:00
phantinuss 2a463fb7ea Merge PR #4462 From @phantinuss - Fix FP With Unknown Process
fix: Suspicious Epmap Connection - FP with unknown process
2023-09-28 11:13:34 +02:00