From 11636b159d88d25867ec75593ef5b9c4db647550 Mon Sep 17 00:00:00 2001 From: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> Date: Mon, 5 Aug 2024 11:27:58 -0300 Subject: [PATCH] [New Rule] Outlook Home Page Registry Modification (#3946) --- ...command_and_control_outlook_home_page.toml | 73 +++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 rules/windows/command_and_control_outlook_home_page.toml diff --git a/rules/windows/command_and_control_outlook_home_page.toml b/rules/windows/command_and_control_outlook_home_page.toml new file mode 100644 index 000000000..10b8c8dca --- /dev/null +++ b/rules/windows/command_and_control_outlook_home_page.toml @@ -0,0 +1,73 @@ +[metadata] +creation_date = "2024/08/01" +integration = ["endpoint", "windows"] +maturity = "production" +updated_date = "2024/08/01" + +[rule] +author = ["Elastic"] +description = """ +Identifies modifications in registry keys associated with abuse of the Outlook Home Page functionality for command and +control or persistence. +""" +from = "now-9m" +index = ["winlogbeat-*", "logs-endpoint.events.registry-*", "logs-windows.sysmon_operational-*", "endgame-*"] +language = "eql" +license = "Elastic License v2" +name = "Outlook Home Page Registry Modification" +references = [ + "https://cloud.google.com/blog/topics/threat-intelligence/breaking-the-rules-tough-outlook-for-home-page-attacks/", + "https://github.com/trustedsec/specula" +] +risk_score = 47 +rule_id = "ac5a2759-5c34-440a-b0c4-51fe674611d6" +severity = "medium" +tags = [ + "Domain: Endpoint", + "OS: Windows", + "Use Case: Threat Detection", + "Tactic: Command and Control", + "Tactic: Persistence", + "Data Source: Elastic Endgame", + "Data Source: Elastic Defend", + "Data Source: Sysmon" +] +timestamp_override = "event.ingested" +type = "eql" + +query = ''' +registry where host.os.type == "windows" and event.action != "deletion" and registry.value : "URL" and + registry.path : ( + "HKEY_USERS\\*\\SOFTWARE\\Microsoft\\Office\\*\\Outlook\\Webview\\Inbox\\URL", + "HKU\\*\\SOFTWARE\\Microsoft\\Office\\*\\Outlook\\Webview\\Inbox\\URL", + "\\REGISTRY\\USER\\*\\SOFTWARE\\Microsoft\\Office\\*\\Outlook\\Webview\\Inbox\\URL" + ) and registry.data.strings : "*http*" +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +id = "TA0011" +name = "Command and Control" +reference = "https://attack.mitre.org/tactics/TA0011/" + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1137" +name = "Office Application Startup" +reference = "https://attack.mitre.org/techniques/T1137/" +[[rule.threat.technique.subtechnique]] +id = "T1137.004" +name = "Outlook Home Page" +reference = "https://attack.mitre.org/techniques/T1137/004/" + + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +