From 517ee0dc034683c23638ebac03351e4cd74f1be3 Mon Sep 17 00:00:00 2001 From: dstepanic17 <57736958+dstepanic17@users.noreply.github.com> Date: Fri, 20 Nov 2020 05:28:16 -0800 Subject: [PATCH] image-load-sched-task-ms-office (#566) --- ...s_image_load_scheduled_task_ms_office.toml | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml diff --git a/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml b/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml new file mode 100644 index 000000000..778ba6a22 --- /dev/null +++ b/rules/windows/persistence_suspicious_image_load_scheduled_task_ms_office.toml @@ -0,0 +1,49 @@ +[metadata] +creation_date = "2020/11/17" +ecs_version = ["1.6.0"] +maturity = "production" +updated_date = "2020/11/17" + +[rule] +author = ["Elastic"] +description = """ +Identifies a suspicious image load (taskschd.dll) from Microsoft Office processes. This behavior may indicate +adversarial activity where a scheduled task is configured via Windows Component Object Model (COM). This technique can +be used to configure persistence and evade monitoring by avoiding the usage of the traditional Windows binary +(schtasks.exe) used to manage scheduled tasks. +""" +index = ["winlogbeat-*", "logs-endpoint.events.*"] +language = "eql" +license = "Elastic License" +name = "Suspicious Image Load (taskschd.dll) from MS Office" +references = [ + "https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16", + "https://www.clearskysec.com/wp-content/uploads/2020/10/Operation-Quicksand.pdf", +] +risk_score = 21 +rule_id = "baa5d22c-5e1c-4f33-bfc9-efa73bb53022" +severity = "low" +tags = ["Elastic", "Host", "Windows", "Threat Detection", "Execution"] +type = "eql" + +query = ''' +library where process.name in ("WINWORD.EXE", "EXCEL.EXE", "POWERPNT.EXE", "MSPUB.EXE", "MSACCESS.EXE") and + event.action == "load" and + event.category == "library" and + file.name == "taskschd.dll" +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1053" +name = "Scheduled Task/Job" +reference = "https://attack.mitre.org/techniques/T1053/" + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +