[New/Tuning] Windows Rules to detect top threats/TTPs 24/25 (#5001)
* [New/Tuning] Windows Top Threats 2024/2025 1) MSHTA: - tuning to exclude FPs - new rule `Remote Script via Microsoft HTML Application` compatible with 3d party EDR/sysmon/system/winlog integration and that does not require correlation or multiple type of events. 2) MSIEXEC: * Update defense_evasion_mshta_susp_child.toml * Update defense_evasion_script_via_html_app.toml * Update defense_evasion_mshta_susp_child.toml * Create defense_evasion_msiexec_remote_payload.toml * Update defense_evasion_msiexec_remote_payload.toml * ++ * Create execution_scripting_remote_webdav.toml * Create execution_windows_fakecaptcha_cmd_ps.toml * Create command_and_control_rmm_netsupport_susp_path.toml * Update command_and_control_rmm_netsupport_susp_path.toml * ++ * Update execution_jscript_fake_updates.toml * Create command_and_control_dns_susp_tld.toml * ++ * Create command_and_control_remcos_rat_iocs.toml * Update execution_windows_fakecaptcha_cmd_ps.toml * Update execution_scripts_archive_file.toml * Update defense_evasion_masquerading_renamed_autoit.toml * ++ * Create execution_nodejs_susp_patterns.toml * Update execution_nodejs_susp_patterns.toml * Update execution_windows_fakecaptcha_cmd_ps.toml * Fix unit test errors * Update defense_evasion_network_connection_from_windows_binary.toml * Add system index * Add tag * Update rules/windows/command_and_control_remcos_rat_iocs.toml Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> * Remove duplicate * Update defense_evasion_msiexec_child_proc_netcon.toml * Update defense_evasion_masquerading_renamed_autoit.toml * Update defense_evasion_masquerading_renamed_autoit.toml * Update defense_evasion_masquerading_renamed_autoit.toml * Create credential_access_browsers_unusual_parent.toml * Update credential_access_browsers_unusual_parent.toml * ++ * Update defense_evasion_masquerading_renamed_autoit.toml * Update rules/windows/command_and_control_dns_susp_tld.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/command_and_control_remcos_rat_iocs.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/defense_evasion_mshta_susp_child.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/discovery_host_public_ip_address_lookup.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/discovery_host_public_ip_address_lookup.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/execution_windows_phish_clickfix.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update discovery_host_public_ip_address_lookup.toml * Update execution_windows_phish_clickfix.toml * Update rules/windows/defense_evasion_script_via_html_app.toml * Update rules/windows/command_and_control_dns_susp_tld.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/discovery_host_public_ip_address_lookup.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/command_and_control_dns_susp_tld.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/credential_access_browsers_unusual_parent.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/command_and_control_dns_susp_tld.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/discovery_host_public_ip_address_lookup.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/discovery_host_public_ip_address_lookup.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update rules/windows/execution_nodejs_susp_patterns.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update discovery_host_public_ip_address_lookup.toml * Update rules/windows/command_and_control_dns_susp_tld.toml Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> * Update defense_evasion_masquerading_renamed_autoit.toml * Update defense_evasion_script_via_html_app.toml --------- Co-authored-by: eric-forte-elastic <eric.forte@elastic.co> Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com> Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
This commit is contained in:
@@ -0,0 +1,105 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies DNS queries to commonly abused Top Level Domains by common LOLBINs or executable running from world writable
|
||||
directories or unsigned binaries. This behavior matches on common malware C2 abusing less formal domain names.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-endpoint.events.network-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*"
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Network Activity to a Suspicious Top Level Domain"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Network Activity to a Suspicious Top Level Domain
|
||||
|
||||
#### Possible investigation steps
|
||||
|
||||
- Investigate the process execution chain (parent process tree) for unknown processes or malicious scripts.
|
||||
- Review if the domain reputation and the frequency of network activities as well as any download/upload activity.
|
||||
- Verify if the executed process is persistent on the host like common mechanisms Startup folder, task or Run key.
|
||||
- Investigate other alerts associated with the user/host during the past 48 hours.
|
||||
- Extract this communication's indicators of compromise (IoCs) and use traffic logs to search for other potentially compromised hosts.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Trusted domain from an expected process running in the environment.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Initiate the incident response process based on the outcome of the triage.
|
||||
- Isolate the involved host to prevent further post-compromise behavior.
|
||||
- Immediately block the identified indicators of compromise (IoCs).
|
||||
- Implement any temporary network rules, procedures, and segmentation required to contain the attack.
|
||||
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
|
||||
- Update firewall rules to be more restrictive.
|
||||
- Reimage the host operating system or restore the compromised files to clean versions.
|
||||
- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and malware components.
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
references = ["https://www.cybercrimeinfocenter.org/top-20-tlds-by-malicious-phishing-domains"]
|
||||
risk_score = 73
|
||||
rule_id = "e516bf56-d51b-43e8-91ec-9e276331f433"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Command and Control",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Data Source: Sysmon",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
network where host.os.type == "windows" and dns.question.name != null and
|
||||
(
|
||||
process.name : ("MSBuild.exe", "mshta.exe", "wscript.exe", "powershell.exe", "pwsh.exe", "msiexec.exe", "rundll32.exe",
|
||||
"bitsadmin.exe", "InstallUtil.exe", "python.exe", "regsvr32.exe", "dllhost.exe", "node.exe",
|
||||
"java.exe", "javaw.exe", "*.pif", "*.com", "*.scr") or
|
||||
?process.code_signature.trusted != true or
|
||||
?process.code_signature.subject_name : ("AutoIt Consulting Ltd", "OpenJS Foundation", "Python Software Foundation") or
|
||||
process.executable : ("?:\\Users\\*.exe", "", "?:\\ProgramData\\*.exe")
|
||||
) and
|
||||
dns.question.name regex """.*\.(top|buzz|xyz|rest|ml|cf|gq|ga|onion|monster|cyou|quest|cc|bar|cfd|click|cam|surf|tk|shop|club|icu|pw|ws|online|fun|life|boats|store|hair|skin|motorcycles|christmas|lol|makeup|mom|bond|beauty|biz|live|work|zip|country|accountant|date|party|science|loan|win|men|faith|review|racing|download|host)"""
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1071"
|
||||
name = "Application Layer Protocol"
|
||||
reference = "https://attack.mitre.org/techniques/T1071/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1071.004"
|
||||
name = "DNS"
|
||||
reference = "https://attack.mitre.org/techniques/T1071/004/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0011"
|
||||
name = "Command and Control"
|
||||
reference = "https://attack.mitre.org/tactics/TA0011/"
|
||||
|
||||
|
||||
@@ -0,0 +1,104 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies known execution traces of the REMCOS Remote Access Trojan. Remcos RAT is used by attackers to perform actions on infected machines remotely.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-endpoint.events.registry-*",
|
||||
"logs-endpoint.events.file-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Potential REMCOS Trojan Execution"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Potential REMCOS Trojan Execution
|
||||
|
||||
Remcos RAT is used by attackers to perform actions on infected machines remotely.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the origin of the REMCOS file and the execution chain to identify the initial vector..
|
||||
- Examine if the process is set to persist in the affected system via scheduled task, Startup folder or Run key.
|
||||
- Check the network, files and child processes activity associated with the every suspicious process in the execution chain of REMCOS.
|
||||
- Correlate the event with other security alerts or logs from data sources like Elastic Defend or Microsoft Defender for Endpoint to gather additional context and identify any related malicious activities.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the attacker.
|
||||
- Terminate any suspicious processes identified in the alert, such as PowerShell, cmd.exe, or other flagged executables, to halt any ongoing malicious activity.
|
||||
- Review and revoke any unauthorized user accounts or privileges that may have been created or modified using tools like net.exe or schtasks.exe.
|
||||
- Conduct a thorough scan of the affected system using endpoint protection tools to identify and remove any malware or unauthorized software installed by the attacker.
|
||||
- Restore the system from a known good backup if any critical system files or configurations have been altered or compromised.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
||||
- Implement enhanced monitoring and logging for ScreenConnect and other remote access tools to detect similar activities in the future, ensuring that alerts are promptly reviewed and acted upon."""
|
||||
references = [
|
||||
"https://any.run/malware-trends/remcos",
|
||||
"https://attack.mitre.org/software/S0332/",
|
||||
"https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set"
|
||||
]
|
||||
risk_score = 73
|
||||
rule_id = "d8b2f85a-cf1c-40fc-acf0-bb5d588a8ea6"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Command and Control",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Windows Security Event Logs"
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
any where host.os.type == "windows" and
|
||||
(
|
||||
(event.category == "file" and event.type == "deletion" and file.path like "C:\\Users\\*\\AppData\\Local\\Temp\\TH????.tmp") or
|
||||
|
||||
(event.category == "file" and file.path : "?:\\Users\\*\\AppData\\Roaming\\remcos\\logs.dat") or
|
||||
|
||||
(event.category == "registry" and
|
||||
registry.value : ("Remcos", "Rmc-??????", "licence") and
|
||||
registry.path : (
|
||||
"*\\Windows\\CurrentVersion\\Run\\Remcos",
|
||||
"*\\Windows\\CurrentVersion\\Run\\Rmc-??????",
|
||||
"*\\SOFTWARE\\Remcos-*\\licence",
|
||||
"*\\Software\\Rmc-??????\\licence"
|
||||
)
|
||||
)
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1219"
|
||||
name = "Remote Access Tools"
|
||||
reference = "https://attack.mitre.org/techniques/T1219/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0011"
|
||||
name = "Command and Control"
|
||||
reference = "https://attack.mitre.org/tactics/TA0011/"
|
||||
|
||||
@@ -0,0 +1,102 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies execution of the NetSupport remote access software from non-default paths. Adversaries may abuse NetSupport
|
||||
Manager to control a target victim machine.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "NetSupport Manager Execution from an Unusual Path"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating NetSupport Manager Execution from an Unusual Path
|
||||
|
||||
NetSupport Manager, is a remote access tool, facilitates legitimate remote support but can be exploited by adversaries to execute unauthorized commands.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the origin of the NetSupport file and if it's related to an authorized IT Support case.
|
||||
- Examine if the NetSupport process is set to persist in the affected system via scheduled task, Startup folder or Run key.
|
||||
- Check the network, files and child processes activity associated with the NetSupport client32.exe process.
|
||||
- Correlate the event with other security alerts or logs from data sources like Elastic Defend or Microsoft Defender for Endpoint to gather additional context and identify any related malicious activities.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate IT support activities using NetSupport by IT support accounts.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the attacker.
|
||||
- Terminate any suspicious processes identified in the alert, such as PowerShell, cmd.exe, or other flagged executables, to halt any ongoing malicious activity.
|
||||
- Review and revoke any unauthorized user accounts or privileges that may have been created or modified using tools like net.exe or schtasks.exe.
|
||||
- Conduct a thorough scan of the affected system using endpoint protection tools to identify and remove any malware or unauthorized software installed by the attacker.
|
||||
- Restore the system from a known good backup if any critical system files or configurations have been altered or compromised.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
||||
- Implement enhanced monitoring and logging for ScreenConnect and other remote access tools to detect similar activities in the future, ensuring that alerts are promptly reviewed and acted upon."""
|
||||
references = [
|
||||
"https://www.netsupportsoftware.com/",
|
||||
]
|
||||
risk_score = 73
|
||||
rule_id = "5f73aef2-7abc-4fd9-ac0d-ab8ec3e13891"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Command and Control",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Crowdstrike",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
(process.name : "client32.exe" or ?process.pe.original_file_name == "client32.exe" or process.parent.name : "client32.exe") and
|
||||
(
|
||||
process.executable :
|
||||
("?:\\Users\\*.exe",
|
||||
"?:\\ProgramData\\*.exe",
|
||||
"\\Device\\HarddiskVolume?\\Users\\*.exe",
|
||||
"\\Device\\HarddiskVolume?\\ProgramData\\*.exe") or
|
||||
?process.parent.executable : ("?:\\Users\\*\\client32.exe", "?:\\ProgramData\\*\\client32.exe")
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1219"
|
||||
name = "Remote Access Tools"
|
||||
reference = "https://attack.mitre.org/techniques/T1219/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0011"
|
||||
name = "Command and Control"
|
||||
reference = "https://attack.mitre.org/tactics/TA0011/"
|
||||
|
||||
@@ -0,0 +1,125 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/27"
|
||||
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/27"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies instances where an unusual process spawns a chrome browser child process. This behavior could be related to malware
|
||||
stealing browser information.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Browser Process Spawned from an Unusual Parent"
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Browser Process Spawned from an Unusual Parent
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the process execution details to confirm that a web browser process (e.g., chrome.exe, msedge.exe, firefox.exe) has an unusual or suspicious parent process. Focus on the process.parent.name, process.name, and process.args fields.
|
||||
- Examine the command line arguments for signs of remote debugging flags (e.g., --remote-debugging-port, --remote-debugging-pipe) or injected DLLs that could indicate attempts to hijack browser sessions.
|
||||
- Check whether the parent process is a scripting host (e.g., wscript.exe, cscript.exe), system utility, or unexpected binary (e.g., cmd.exe, rundll32.exe, powershell.exe) rather than the legitimate browser updater or system launcher.
|
||||
- Investigate if the suspicious parent process has a known reputation or hash linked to malware or credential-stealing tools by correlating with threat intelligence sources.
|
||||
- Look for additional related processes spawned by the browser that might indicate malicious activity, such as network connections to unusual external IPs or data exfiltration attempts.
|
||||
- Review authentication logs to identify if any credential theft attempts occurred shortly after the suspicious browser activity, focusing on abnormal logins, failed authentications, or credential access patterns.
|
||||
- Cross-reference with endpoint telemetry (e.g., Defender for Endpoint, Sysmon) to identify whether this event is part of a broader intrusion attempt involving code injection or persistence mechanisms.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Certain enterprise management or testing tools may launch browsers with remote debugging enabled for automation purposes. Identify and document such legitimate tools and processes.
|
||||
- Development environments may use browser remote debugging features during legitimate software testing. Exclude known dev/test machines or users from triggering alerts in production environments.
|
||||
- Security testing frameworks or internal red team activities may use similar techniques. Coordinate with authorized security teams to whitelist scheduled exercises.
|
||||
- Browser extensions or third-party plugins could sometimes spawn processes that appear unusual. Validate if the behavior aligns with known, legitimate extensions.
|
||||
- Automated IT scripts or orchestration tools might start browsers in debugging mode for monitoring purposes. Whitelist these cases based on process path, signature, or command-line arguments.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Isolate the affected endpoint from the network to prevent potential credential theft or data exfiltration.
|
||||
- Terminate any suspicious processes identified in the alert, including both the browser and its anomalous parent process.
|
||||
- Collect forensic artifacts (process memory, browser profiles, injected modules) for further investigation and potential IOCs.
|
||||
- Reset credentials for accounts that may have been exposed through the compromised browser session.
|
||||
- Deploy updated endpoint protection signatures and enable stricter application control policies to prevent browsers from being launched by untrusted processes.
|
||||
- Enhance monitoring for browser processes launched with debugging flags or code injection indicators across the environment.
|
||||
- Escalate to the SOC or IR team to determine whether this event is part of a larger credential theft campaign or linked to other lateral movement activity."""
|
||||
references = ["https://www.elastic.co/security-labs/katz-and-mouse-game"]
|
||||
risk_score = 73
|
||||
rule_id = "46b01bb5-cff2-4a00-9f87-c041d9eab554"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Credential Access",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.name : ("chrome.exe", "msedge.exe") and
|
||||
process.parent.executable != null and process.command_line != null and
|
||||
(
|
||||
process.command_line :
|
||||
("\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\"",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\"",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --headless --disable-logging --log-level=3 --v=0",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --headless --log-level=3",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --headless",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --remote-debugging-port=922? --profile-directory=\"Default\"*",
|
||||
"\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --headless --restore-last-session --remote-debugging-port=45452*") or
|
||||
|
||||
(process.args : "--remote-debugging-port=922?" and process.args : "--window-position=-*,-*")
|
||||
) and
|
||||
not process.parent.executable :
|
||||
("C:\\Windows\\explorer.exe",
|
||||
"C:\\Program Files (x86)\\*.exe",
|
||||
"C:\\Program Files\\*.exe",
|
||||
"C:\\Windows\\System32\\rdpinit.exe",
|
||||
"C:\\Windows\\System32\\sihost.exe",
|
||||
"C:\\Windows\\System32\\RuntimeBroker.exe",
|
||||
"C:\\Windows\\System32\\SECOCL64.exe")
|
||||
'''
|
||||
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1555"
|
||||
name = "Credentials from Password Stores"
|
||||
reference = "https://attack.mitre.org/techniques/T1555/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1555.003"
|
||||
name = "Credentials from Web Browsers"
|
||||
reference = "https://attack.mitre.org/techniques/T1555/003/"
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0006"
|
||||
name = "Credential Access"
|
||||
reference = "https://attack.mitre.org/tactics/TA0006/"
|
||||
|
||||
|
||||
@@ -0,0 +1,93 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/21"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/21"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies abuse of the Console Window Host (conhost.exe) to execute commands via proxy. This behavior is used as a defense
|
||||
evasion technique to blend-in malicious activity with legitimate Windows software.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Proxy Execution via Console Window Host"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Proxy Execution via Console Window Host
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the conhost child processes and the parent process to identify the initial vector.
|
||||
- Identify the user account that performed the action and whether it should perform this kind of action.
|
||||
- Investigate other alerts associated with the user/host during the past 48 hours.
|
||||
- Validate the activity is not related to planned patches, updates, network administrator activity, or legitimate software installations.
|
||||
- Assess whether this behavior is prevalent in the environment by looking for similar occurrences across hosts.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- This is a dual-use tool, meaning its usage is not inherently malicious. Analysts can dismiss the alert if the administrator is aware of the activity, no other suspicious activity was identified.
|
||||
|
||||
### Response and Remediation
|
||||
|
||||
- Initiate the incident response process based on the outcome of the triage.
|
||||
- Isolate the involved host to prevent further post-compromise behavior.
|
||||
- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and malware components.
|
||||
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
references = ["https://lolbas-project.github.io/lolbas/Binaries/Conhost/"]
|
||||
risk_score = 73
|
||||
rule_id = "fcd16fe8-eb29-42b3-8aee-6c9ad777a2f6"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Defense Evasion",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.name : "conhost.exe" and process.args : "--headless" and
|
||||
process.command_line : ("*powershell*", "*cmd *", "*cmd.exe *", "*script*", "*mshta*", "*curl *", "*curl.exe *", "*^*^*^*", "*.bat*", "*.cmd*", "*schtasks*", "*@SSL*", "*http*", "* \\\\*", "*.vbs*", "*.js*", "*mhsta*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1202"
|
||||
name = "Indirect Command Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1202/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
@@ -0,0 +1,93 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/21"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/21"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies attempts to execute commands via proxy using the Windows OpenSSH client. This may indicate an attempt to bypass
|
||||
application control via trusted windows binaries.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Proxy Execution via Windows OpenSSH"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Proxy Execution via Windows OpenSSH
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the ssh child processes and the parent process to identify the initial vector.
|
||||
- Identify the user account that performed the action and whether it should perform this kind of action.
|
||||
- Investigate other alerts associated with the user/host during the past 48 hours.
|
||||
- Validate the activity is not related to planned patches, updates, network administrator activity, or legitimate software installations.
|
||||
- Assess whether this behavior is prevalent in the environment by looking for similar occurrences across hosts.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- This is a dual-use tool, meaning its usage is not inherently malicious. Analysts can dismiss the alert if the administrator is aware of the activity, no other suspicious activity was identified.
|
||||
|
||||
### Response and Remediation
|
||||
|
||||
- Initiate the incident response process based on the outcome of the triage.
|
||||
- Isolate the involved host to prevent further post-compromise behavior.
|
||||
- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and malware components.
|
||||
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
references = ["https://lolbas-project.github.io/lolbas/Binaries/Ssh/"]
|
||||
risk_score = 73
|
||||
rule_id = "8cd49fbc-a35a-4418-8688-133cc3a1e548"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Defense Evasion",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and process.name : ("ssh.exe", "sftp.exe") and
|
||||
process.command_line : ("*Command=*powershell*", "*schtasks*", "*Command=*@echo off*", "*Command=*http*", "*Command=*mshta*", "*Command=*msiexec*",
|
||||
"*Command=*cmd /c*", "*Command=*cmd.exe*", "*Command=\"cmd /c*", "*LocalCommand=scp*&&*", "*LocalCommand=?scp*&&*", "*Command=*script*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1202"
|
||||
name = "Indirect Command Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1202/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2020/09/01"
|
||||
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/26"
|
||||
updated_date = "2025/09/01"
|
||||
|
||||
[transform]
|
||||
[[transform.osquery]]
|
||||
@@ -33,8 +33,8 @@ authenticode.path JOIN hash ON services.path = hash.path WHERE authenticode.resu
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies a suspicious AutoIt process execution. Malware written as an AutoIt script tends to rename the AutoIt
|
||||
executable to avoid detection.
|
||||
Identifies renamed Automation Script Interpreter process. Malware written as an AutoIt/AutoHotKey script tends to rename
|
||||
the main executable to avoid detection.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
@@ -47,10 +47,10 @@ index = [
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Renamed AutoIt Scripts Interpreter"
|
||||
name = "Renamed Automation Script Interpreter"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Renamed AutoIt Scripts Interpreter
|
||||
### Investigating Renamed Automation Script Interpreter
|
||||
|
||||
The OriginalFileName attribute of a PE (Portable Executable) file is a metadata field that contains the original name of the executable file when compiled or linked. By using this attribute, analysts can identify renamed instances that attackers can use with the intent of evading detections, application allowlists, and other security protections.
|
||||
|
||||
@@ -98,9 +98,9 @@ This rule checks for renamed instances of AutoIt, which can indicate an attempt
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
risk_score = 47
|
||||
risk_score = 73
|
||||
rule_id = "2e1e835d-01e5-48ca-b9fc-7a61f7f11902"
|
||||
severity = "medium"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
@@ -111,14 +111,18 @@ tags = [
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Crowdstrike",
|
||||
"Data Source: Crowdstrike"
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.pe.original_file_name : "AutoIt*.exe" and not process.name : "AutoIt*.exe"
|
||||
(
|
||||
(process.pe.original_file_name : "AutoIt*.exe" and not process.name : "AutoIt*.exe") or
|
||||
(process.pe.original_file_name == "AutoHotkey.exe" and not process.name : ("AutoHotkey*.exe", "InternalAHK.exe")) or
|
||||
(process.pe.original_file_name == "KIX32.EXE" and not process.name : "KIX*.exe" and process.executable : ("?:\\Users\\*.exe", "?:\\ProgramData\\*.exe", "\\Device\\HarddiskVolume*\\Users\\*.exe", "\\Device\\HarddiskVolume*\\ProgramData\\*.exe"))
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
|
||||
@@ -0,0 +1,111 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/19"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/19"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies Mshta.exe spawning a suspicious child process. This may indicate adversarial activity, as Mshta is often
|
||||
leveraged by adversaries to execute malicious scripts and evade detection.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Suspicious Microsoft HTML Application Child Process"
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Suspicious Microsoft HTML Application Child Process
|
||||
|
||||
Mshta.exe is a legitimate Windows utility used to execute Microsoft HTML Application (HTA) files. Adversaries exploit it to run malicious scripts, leveraging its trusted status to bypass security measures. The detection rule identifies suspicious network activity by Mshta.exe, excluding known benign processes, to flag potential threats. This approach helps in identifying unauthorized network connections indicative of malicious intent.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the process tree to understand the parent-child relationship of mshta.exe, focusing on any unusual or unexpected parent processes that are not excluded by the rule, such as Microsoft.ConfigurationManagement.exe or known benign executables.
|
||||
- Analyze the command-line arguments used by mshta.exe to identify any suspicious or unexpected scripts being executed, especially those not matching the excluded ADSelfService_Enroll.hta.
|
||||
- Examine the network connections initiated by mshta.exe, including destination IP addresses, domains, and ports, to identify any connections to known malicious or suspicious endpoints.
|
||||
- Check for any related alerts or logs from the same host around the time of the mshta.exe activity to identify potential lateral movement or additional malicious behavior.
|
||||
- Investigate the user account associated with the mshta.exe process to determine if it has been compromised or is exhibiting unusual activity patterns.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Mshta.exe may be triggered by legitimate software updates or installations, such as those from Microsoft Configuration Management. To handle this, add exceptions for processes with parent names like Microsoft.ConfigurationManagement.exe.
|
||||
- Certain applications like Amazon Assistant and TeamViewer may use Mshta.exe for legitimate purposes. Exclude these by specifying their executable paths, such as C:\\Amazon\\Amazon Assistant\\amazonAssistantService.exe and C:\\TeamViewer\\TeamViewer.exe.
|
||||
- Custom scripts or internal tools that utilize HTA files for automation might cause false positives. Identify these scripts and exclude them by their specific arguments, such as ADSelfService_Enroll.hta.
|
||||
- Regularly review and update the list of exceptions to ensure that only verified benign activities are excluded, minimizing the risk of overlooking genuine threats.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Isolate the affected system from the network to prevent further unauthorized access or data exfiltration.
|
||||
- Terminate the mshta.exe process if it is confirmed to be making unauthorized network connections.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus and anti-malware tools to identify and remove any malicious scripts or files.
|
||||
- Review and analyze the process tree and network connections associated with mshta.exe to identify any additional compromised processes or systems.
|
||||
- Restore the system from a known good backup if malicious activity is confirmed and cannot be fully remediated.
|
||||
- Implement application whitelisting to prevent unauthorized execution of mshta.exe and similar system binaries.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to assess the potential impact on the broader network."""
|
||||
references = [
|
||||
"https://lolbas-project.github.io/lolbas/Binaries/Mshta/",
|
||||
]
|
||||
risk_score = 73
|
||||
rule_id = "48e60a73-08e8-42aa-8f51-4ed92c64dbea"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Defense Evasion",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.parent.name : "mshta.exe" and
|
||||
(
|
||||
process.name : ("cmd.exe", "powershell.exe", "certutil.exe", "bitsadmin.exe", "curl.exe", "msiexec.exe", "schtasks.exe", "reg.exe", "wscript.exe", "rundll32.exe") or
|
||||
process.executable : ("C:\\Users\\*\\*.exe", "\\Device\\HarddiskVolume*\\Users\\*\\*.exe")
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1218"
|
||||
name = "System Binary Proxy Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1218.005"
|
||||
name = "Mshta"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/005/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2024/09/09"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/03/20"
|
||||
updated_date = "2025/08/21"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -83,9 +83,24 @@ sequence by process.entity_id with maxspan=1m
|
||||
"?:\\Program Files\\*.exe",
|
||||
"?:\\Program Files (x86)\\*.exe",
|
||||
"?:\\Windows\\Installer\\MSI*.tmp",
|
||||
"?:\\Windows\\Microsoft.NET\\Framework*\\RegSvcs.exe") and
|
||||
not (process.name : ("rundll32.exe", "regsvr32.exe") and process.args : ("?:\\Program Files\\*", "?:\\Program Files (x86)\\*"))]
|
||||
[any where host.os.type == "windows" and event.category in ("network", "dns") and process.name != null]
|
||||
"?:\\Windows\\Microsoft.NET\\Framework*\\RegSvcs.exe",
|
||||
"C:\\Windows\\System32\\regsvr32.exe",
|
||||
"C:\\Windows\\Sys?????\\certutil.exe",
|
||||
"C:\\Windows\\System32\\WerFault.exe",
|
||||
"C:\\Windows\\System32\\wevtutil.exe",
|
||||
"C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe") and
|
||||
not (process.name : ("rundll32.exe", "regsvr32.exe", "powershell.exe", "regasm.exe", "wscript.exe") and process.args : ("?:\\Program Files\\*", "?:\\Program Files (x86)\\*")) and
|
||||
not (?process.code_signature.subject_name : ("Bruno Software Inc", "Proton AG", "Axis Communications AB", "Citrix Systems, Inc.", "NSUS Limited", "Action1 Corporation", "Solarwinds Worldwide, LLC") and
|
||||
?process.code_signature.trusted == true) and
|
||||
not (?process.pe.original_file_name in ("dxsetup.exe", "MofCompiler.exe", "ShellApp.exe") and
|
||||
?process.code_signature.subject_name : "Microsoft Corporation" and ?process.code_signature.trusted == true) and
|
||||
not ?process.hash.sha256 in ("cfaef8c711db04d6c4a4381c66ac21b9e234e57febedb77fedc9316898b214bc",
|
||||
"2f26f37cce780ca76f0dbac0de233f4c8d84c31b3f37380b9d5faacc3ee2d03e",
|
||||
"7d9c691bfbf3beb78919dfd940fa6d325c3437425d5b0371df39aef6accf858d")
|
||||
]
|
||||
[network where host.os.type == "windows" and process.name != null and
|
||||
not dns.question.name : ("core.bdec.microsoft.com", "go.microsoft.com", "ocsp.digicert.com", "localhost", "www.google-analytics.com",
|
||||
"ocsp.verisign.com", "*.symcb.com")]
|
||||
'''
|
||||
|
||||
|
||||
|
||||
@@ -0,0 +1,110 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/19"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/19"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies attempts to install a file from a remote server using MsiExec. Adversaries may abuse Windows Installers for initial access and delivery of malware.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Potential Remote Install via MsiExec"
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Potential Remote Install via MsiExec
|
||||
|
||||
MsiExec is a Windows utility for installing, maintaining, and removing software. Adversaries exploit it to execute malicious payloads by disguising them as legitimate installations. The detection rule identifies suspicious child processes spawned by MsiExec that initiate network activity, which is atypical for standard installations. By focusing on unusual executable paths and network connections, the rule helps uncover potential misuse indicative of malware delivery or initial access attempts.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the process tree to identify the parent and child processes of the suspicious MsiExec activity, focusing on the process.entity_id and process.parent.name fields to understand the execution flow.
|
||||
- Examine the process.executable path to determine if it deviates from typical installation paths, as specified in the query, to assess the likelihood of malicious activity.
|
||||
- Analyze the network or DNS activity associated with the process by reviewing the event.category field for network or dns events, and correlate these with the process.name to identify any unusual or unauthorized connections.
|
||||
- Check the process.args for any unusual or suspicious command-line arguments that might indicate an attempt to execute malicious payloads or scripts.
|
||||
- Investigate the host's recent activity and security logs to identify any other indicators of compromise or related suspicious behavior, leveraging data sources like Elastic Defend, Sysmon, or SentinelOne as mentioned in the rule's tags.
|
||||
- Assess the risk and impact of the detected activity by considering the context of the alert, such as the host's role in the network and any potential data exposure or system compromise.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate software installations or updates may trigger the rule if they involve network activity. Users can create exceptions for known software update processes that are verified as safe.
|
||||
- Custom enterprise applications that use MsiExec for deployment and require network access might be flagged. Identify these applications and exclude their specific executable paths from the rule.
|
||||
- Automated deployment tools that utilize MsiExec and perform network operations could be misidentified. Review these tools and whitelist their processes to prevent false alerts.
|
||||
- Security software or system management tools that leverage MsiExec for legitimate purposes may cause false positives. Confirm these tools' activities and add them to an exclusion list if necessary.
|
||||
- Regularly review and update the exclusion list to ensure it reflects the current environment and any new legitimate software that may interact with MsiExec.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Isolate the affected system from the network immediately to prevent further malicious activity and lateral movement.
|
||||
- Terminate the suspicious child process spawned by MsiExec to halt any ongoing malicious operations.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus or endpoint detection and response (EDR) tools to identify and remove any malicious payloads or remnants.
|
||||
- Review and analyze the process execution and network activity logs to identify any additional indicators of compromise (IOCs) and assess the scope of the intrusion.
|
||||
- Reset credentials and review access permissions for any accounts that may have been compromised or used during the attack.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
||||
- Implement enhanced monitoring and detection rules to identify similar threats in the future, focusing on unusual MsiExec activity and network connections."""
|
||||
risk_score = 73
|
||||
rule_id = "c9847fe9-3bed-4e6b-b319-f9956d6dd02a"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Defense Evasion",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.name : "msiexec.exe" and process.args : ("-i", "/i") and process.command_line : "*http*" and
|
||||
process.args : ("/qn", "-qn", "-q", "/q", "/quiet") and
|
||||
process.parent.name : ("sihost.exe", "explorer.exe", "cmd.exe", "wscript.exe", "mshta.exe", "powershell.exe", "wmiprvse.exe", "pcalua.exe", "forfiles.exe", "conhost.exe") and
|
||||
not process.command_line : ("*--set-server=*", "*UPGRADEADD=*" , "*--url=*",
|
||||
"*USESERVERCONFIG=*", "*RCTENTERPRISESERVER=*", "*app.ninjarmm.com*", "*zoom.us/client*",
|
||||
"*SUPPORTSERVERSTSURI=*", "*START_URL=*", "*AUTOCONFIG=*", "*awscli.amazonaws.com*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1218"
|
||||
name = "System Binary Proxy Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1218.007"
|
||||
name = "Msiexec"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/007/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2020/09/02"
|
||||
integration = ["endpoint", "windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/05/05"
|
||||
updated_date = "2025/08/19"
|
||||
|
||||
[transform]
|
||||
[[transform.osquery]]
|
||||
@@ -139,7 +139,14 @@ sequence by process.entity_id with maxspan=5m
|
||||
process.name : "odbcconf.exe" or
|
||||
process.name : "rcsi.exe" or
|
||||
process.name : "regsvr32.exe" or
|
||||
process.name : "xwizard.exe")]
|
||||
process.name : "xwizard.exe") and
|
||||
|
||||
not (process.name : "mshta.exe" and
|
||||
process.parent.executable : ("C:\\Program Files (x86)\\Bentley\\*.exe",
|
||||
"C:\\Program Files\\Bentley\\*.exe",
|
||||
"C:\\Program Files (x86)\\Amazon\\Amazon Assistant\\amazonAssistantService.exe",
|
||||
"C:\\Users\\*\\AppData\\Local\\Temp\\TeamViewer\\TeamViewer.exe"))
|
||||
]
|
||||
[network where
|
||||
(process.name : "bginfo.exe" or
|
||||
process.name : "cdb.exe" or
|
||||
@@ -177,7 +184,11 @@ sequence by process.entity_id with maxspan=5m
|
||||
not dns.question.name : ("localhost", "setup.officetimeline.com", "us.deployment.endpoint.ingress.rapid7.com",
|
||||
"ctldl.windowsupdate.com", "crl?.digicert.com", "ocsp.digicert.com", "addon-cms-asl.eu.goskope.com", "crls.ssl.com",
|
||||
"evcs-ocsp.ws.symantec.com", "s.symcd.com", "s?.symcb.com", "crl.verisign.com", "oneocsp.microsoft.com", "crl.verisign.com",
|
||||
"aka.ms", "crl.comodoca.com", "acroipm2.adobe.com", "sv.symcd.com") and
|
||||
"aka.ms", "crl.comodoca.com", "acroipm2.adobe.com", "sv.symcd.com", "_ldap._tcp.*", "..localmachine", "secure.globalsign.com",
|
||||
"acroipm2.adobe.com", "www.ssl.com") and
|
||||
|
||||
not (process.name : "mshta.exe" and
|
||||
dns.question.name : ("client.teamviewer.com", "www.teamviewer.com", "images-na.ssl-images-amazon.com", "searcherbar.tilda.ws")) and
|
||||
|
||||
/* host query itself */
|
||||
not startswith~(dns.question.name, host.name)
|
||||
|
||||
@@ -1,8 +1,9 @@
|
||||
[metadata]
|
||||
creation_date = "2020/09/09"
|
||||
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
|
||||
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/26"
|
||||
updated_date = "2025/09/01"
|
||||
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -18,7 +19,9 @@ index = [
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
"endgame-*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"endgame-*"
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
@@ -68,6 +71,8 @@ tags = [
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
]
|
||||
@@ -95,7 +100,7 @@ process where host.os.type == "windows" and event.type == "start" and
|
||||
"*window.close(*",
|
||||
"* Chr(*"
|
||||
)
|
||||
and not process.parent.executable :
|
||||
and not ?process.parent.executable :
|
||||
("?:\\Program Files (x86)\\Citrix\\System32\\wfshell.exe",
|
||||
"?:\\Program Files (x86)\\Microsoft Office\\Office*\\MSACCESS.EXE",
|
||||
"?:\\Program Files\\Quokka.Works GTInstaller\\GTInstaller.exe")
|
||||
|
||||
@@ -0,0 +1,161 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies DNS queries to known public IP address lookup web services. Malwares tend to perform this action to assess potential targets.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-endpoint.events.network-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*"
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "System Public IP Discovery via DNS Query"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating System Public IP Discovery via DNS Query
|
||||
|
||||
#### Possible investigation steps
|
||||
|
||||
- Investigate the process execution chain (parent process tree) for unknown processes or malicious scripts.
|
||||
- Verify if the executed process is persistent on the host like common mechanisms Startup folder, task or Run key.
|
||||
- Review any unusual network, files or registry events by the same process.
|
||||
- Investigate other alerts associated with the user/host during the past 48 hours.
|
||||
- Extract this communication's indicators of compromise (IoCs) and use traffic logs to search for other potentially compromised hosts.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Trusted domain from an expected process running in the environment.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Initiate the incident response process based on the outcome of the triage.
|
||||
- Isolate the involved host to prevent further post-compromise behavior.
|
||||
- Immediately block the identified indicators of compromise (IoCs).
|
||||
- Implement any temporary network rules, procedures, and segmentation required to contain the attack.
|
||||
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
|
||||
- Update firewall rules to be more restrictive.
|
||||
- Reimage the host operating system or restore the compromised files to clean versions.
|
||||
- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and malware components.
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
references = ["https://attack.mitre.org/techniques/T1016/"]
|
||||
risk_score = 73
|
||||
rule_id = "642ce354-4252-4d43-80c9-6603f16571c1"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Discovery",
|
||||
"Tactic: Command and Control",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Data Source: Sysmon",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
network where host.os.type == "windows" and dns.question.name != null and
|
||||
(
|
||||
process.name : ("MSBuild.exe", "mshta.exe", "wscript.exe", "powershell.exe", "pwsh.exe", "msiexec.exe", "rundll32.exe",
|
||||
"bitsadmin.exe", "InstallUtil.exe", "RegAsm.exe", "vbc.exe", "RegSvcs.exe", "python.exe", "regsvr32.exe", "dllhost.exe",
|
||||
"node.exe", "javaw.exe", "java.exe", "*.pif", "*.com") or
|
||||
|
||||
?process.code_signature.trusted != true or
|
||||
|
||||
?process.code_signature.subject_name : ("AutoIt Consulting Ltd", "OpenJS Foundation", "Python Software Foundation") or
|
||||
|
||||
?process.executable : ("?:\\Users\\*.exe", "", "?:\\ProgramData\\*.exe", "?\\Device\\HarddiskVolume?\\Users\\*.exe", "?\\Device\\HarddiskVolume?\\ProgramData\\*.exe")
|
||||
) and
|
||||
dns.question.name :
|
||||
(
|
||||
"ip-api.com",
|
||||
"checkip.dyndns.org",
|
||||
"api.ipify.org",
|
||||
"api.ipify.com",
|
||||
"whatismyip.akamai.com",
|
||||
"bot.whatismyipaddress.com",
|
||||
"ifcfg.me",
|
||||
"ident.me",
|
||||
"ipof.in",
|
||||
"ip.tyk.nu",
|
||||
"icanhazip.com",
|
||||
"curlmyip.com",
|
||||
"wgetip.com",
|
||||
"eth0.me",
|
||||
"ipecho.net",
|
||||
"ip.appspot.com",
|
||||
"api.myip.com",
|
||||
"geoiptool.com",
|
||||
"api.2ip.ua",
|
||||
"api.ip.sb",
|
||||
"ipinfo.io",
|
||||
"checkip.amazonaws.com",
|
||||
"wtfismyip.com",
|
||||
"iplogger.*",
|
||||
"freegeoip.net",
|
||||
"freegeoip.app",
|
||||
"ipinfo.io",
|
||||
"geoplugin.net",
|
||||
"myip.dnsomatic.com",
|
||||
"www.geoplugin.net",
|
||||
"api64.ipify.org",
|
||||
"ip4.seeip.org",
|
||||
"*.geojs.io",
|
||||
"*portmap.io",
|
||||
"api.2ip.ua",
|
||||
"api.db-ip.com",
|
||||
"geolocation-db.com",
|
||||
"httpbin.org",
|
||||
"myip.opendns.com"
|
||||
)
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1016"
|
||||
name = "System Network Configuration Discovery"
|
||||
reference = "https://attack.mitre.org/techniques/T1016/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0007"
|
||||
name = "Discovery"
|
||||
reference = "https://attack.mitre.org/tactics/TA0007/"
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1071"
|
||||
name = "Application Layer Protocol"
|
||||
reference = "https://attack.mitre.org/techniques/T1071/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1071.004"
|
||||
name = "DNS"
|
||||
reference = "https://attack.mitre.org/techniques/T1071/004/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0011"
|
||||
name = "Command and Control"
|
||||
reference = "https://attack.mitre.org/tactics/TA0011/"
|
||||
@@ -0,0 +1,119 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/21"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/21"
|
||||
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies suspicious execution patterns using NodeJS interpeter like process path and arguments.
|
||||
"""
|
||||
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Suspicious Execution with NodeJS"
|
||||
references = ["https://nodejs.org"]
|
||||
risk_score = 73
|
||||
rule_id = "55f711c1-6b4d-4787-930d-c9317a885adf"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Execution",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
|
||||
(process.name : "node.exe" or ?process.pe.original_file_name == "node.exe" or ?process.code_signature.subject_name : "OpenJS Foundation") and
|
||||
|
||||
(
|
||||
(process.executable : ("?:\\Users\\*\\AppData\\*\\node.exe", "\\Device\\HarddiskVolume?\\\\Users\\*\\AppData\\*\\node.exe") and process.args : "*.js") or
|
||||
|
||||
(process.args : "-r" and process.parent.name : "powershell.exe") or
|
||||
|
||||
process.command_line : ("*eval(*", "*atob(*", "*require*child_process*")
|
||||
)
|
||||
'''
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Suspicious Execution with NodeJS
|
||||
|
||||
Windows scripts, often used for legitimate automation tasks, can be exploited by adversaries to execute malicious code. Attackers may download scripts via browsers or file utilities, then execute them using scripting tools like wscript or mshta. The detection rule identifies such threats by monitoring script creation from internet sources and subsequent execution, focusing on unusual parent-child process relationships and script attributes.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Analyze the execution event of the scripting utility (node.exe) to identify the command-line arguments used, which may provide insight into the script's intended actions.
|
||||
- Review node.exe network, files and child process events for any suspicious activity.
|
||||
- Verify parent and grand parent processes to assess persence of persistence and the potential initial vector.
|
||||
- Check the user account associated with the script execution to determine if the activity is expected for that user or if it indicates a compromised account.
|
||||
- Look for any additional related alerts or logs on the host that might indicate further malicious activity or lateral movement following the script execution.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate script automation tools may trigger this rule if they download and execute scripts from the internet. Users can create exceptions for known safe tools by excluding specific file paths or process names.
|
||||
- Software updates or installations that download scripts as part of their process might be flagged. To handle this, users can whitelist specific origin URLs or referrer URLs associated with trusted software vendors.
|
||||
- Internal scripts distributed via corporate intranet sites could be misidentified as threats. Users should consider excluding scripts with known internal origin URLs or specific user IDs associated with IT operations.
|
||||
- Browser extensions or plugins that automate tasks using scripts may cause false positives. Users can exclude these by identifying and excluding the specific browser process names or file extensions involved.
|
||||
- Frequent use of file utilities like winrar or 7zFM for legitimate script handling can be excluded by specifying trusted file paths or user IDs that regularly perform these actions.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Isolate the affected system from the network to prevent further execution of potentially malicious scripts and lateral movement.
|
||||
- Terminate any suspicious processes identified in the alert, such as wscript.exe or mshta.exe, to stop the execution of the downloaded script.
|
||||
- Quarantine the downloaded script file and any associated files to prevent further execution and facilitate forensic analysis.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus or endpoint detection and response (EDR) tools to identify and remove any additional malicious files or remnants.
|
||||
- Review and analyze the origin URL and referrer URL of the downloaded script to identify potential malicious websites or compromised sources, and block these URLs at the network level.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
||||
- Implement application whitelisting to restrict the execution of unauthorized scripts and scripting utilities, reducing the risk of similar threats in the future."""
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
|
||||
[[rule.threat.technique]]
|
||||
id = "T1059"
|
||||
name = "Command and Scripting Interpreter"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.007"
|
||||
name = "JavaScript"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/007/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0002"
|
||||
name = "Execution"
|
||||
reference = "https://attack.mitre.org/tactics/TA0002/"
|
||||
|
||||
|
||||
@@ -0,0 +1,120 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/19"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/19"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies attempt to execute Windows scripts from a remote WebDav Share. Adversaries may abuse this method to evade
|
||||
dropping malicious files to victim file system.
|
||||
"""
|
||||
false_positives = ["Trusted webdav shares used to host trusted content."]
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Suspicious Execution from a WebDav Share"
|
||||
note = """## Triage and analysis
|
||||
|
||||
### Investigating Suspicious Execution from a WebDav Share
|
||||
|
||||
#### Possible investigation steps
|
||||
|
||||
- Check if the remote webdav server is autorized by the organization.
|
||||
- Check all the downloaded files from the remote server and their content.
|
||||
- Investigate the process execution chain (parent process tree) to identify the initial vector.
|
||||
- Investigate other alerts associated with the user/host during the past 5 minutes.
|
||||
- Identify the user account that performed the action and whether it should perform this kind of action.
|
||||
- Identify the target computer and its role in the IT environment.
|
||||
- Investigate what commands were run, and assess whether this behavior is prevalent in the environment by looking for similar occurrences across hosts.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Initiate the incident response process based on the outcome of the triage.
|
||||
- Isolate the involved hosts to prevent further post-compromise behavior.
|
||||
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
|
||||
- Run a full antimalware scan. This may reveal additional artifacts left in the system, persistence mechanisms, and malware components.
|
||||
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
|
||||
- Review the privileges assigned to the user to ensure that the least privilege principle is being followed.
|
||||
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
|
||||
"""
|
||||
risk_score = 73
|
||||
rule_id = "ee7726cc-babc-4885-988c-f915173ac0c0"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Execution",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.name : ("cmd.exe", "powershell.exe", "conhost.exe", "wscript.exe", "mshta.exe", "curl.exe", "msiexec.exe", "bitsadmin.exe", "net.exe") and
|
||||
process.command_line : ("*trycloudflare.com*", "*@SSL\\*", "*\\webdav\\*", "*\\DavWWWRoot\\*", "*\\\\*.*@8080\\*", "*\\\\*.*@80\\*", "*\\\\*.*@8443\\*", "*\\\\*.*@443\\*") and
|
||||
not (process.name : "cmd.exe" and process.args : "\\\\?\\UNC\\*.sharepoint.com@SSL\\DavWWWRoot\\*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1204"
|
||||
name = "User Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1204/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1204.002"
|
||||
name = "Malicious File"
|
||||
reference = "https://attack.mitre.org/techniques/T1204/002/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0002"
|
||||
name = "Execution"
|
||||
reference = "https://attack.mitre.org/tactics/TA0002/"
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1021"
|
||||
name = "Remote Services"
|
||||
reference = "https://attack.mitre.org/techniques/T1021/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1021.002"
|
||||
name = "SMB/Windows Admin Shares"
|
||||
reference = "https://attack.mitre.org/techniques/T1021/002/"
|
||||
|
||||
|
||||
[[rule.threat.technique]]
|
||||
id = "T1570"
|
||||
name = "Lateral Tool Transfer"
|
||||
reference = "https://attack.mitre.org/techniques/T1570/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0008"
|
||||
name = "Lateral Movement"
|
||||
reference = "https://attack.mitre.org/tactics/TA0008/"
|
||||
|
||||
@@ -0,0 +1,123 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies attempts to execute Jscript/Vbscript files from an archive file. The use of archives is a common delivery method
|
||||
of malicious scripts.
|
||||
"""
|
||||
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"endgame-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Windows Script Execution from Archive"
|
||||
references = ["https://medium.com/walmartglobaltech/smartapesg-4605157a5b80"]
|
||||
risk_score = 47
|
||||
rule_id = "30f9d940-7d55-4fff-a8b9-4715d20eb204"
|
||||
severity = "medium"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Execution",
|
||||
"Resources: Investigation Guide",
|
||||
"Data Source: Elastic Endgame",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Crowdstrike",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and process.name : "wscript.exe" and
|
||||
process.parent.name : ("explorer.exe", "winrar.exe", "7zFM.exe") and
|
||||
process.args :
|
||||
("?:\\Users\\*\\AppData\\Local\\Temp\\7z*\\*",
|
||||
"?:\\Users\\*\\AppData\\Local\\Temp\\*.zip.*\\*",
|
||||
"?:\\Users\\*\\AppData\\Local\\Temp\\Rar$*\\*",
|
||||
"?:\\Users\\*\\AppData\\Local\\Temp\\Temp?_*\\*",
|
||||
"?:\\Users\\*\\AppData\\Local\\Temp\\BNZ.*")
|
||||
'''
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Windows Script Execution from Archive
|
||||
|
||||
Windows scripts, often used for legitimate automation tasks, can be exploited by adversaries to execute malicious code. Attackers may download scripts via browsers or file utilities, then execute them using scripting tools like wscript or mshta. The detection rule identifies such threats by monitoring script creation from internet sources and subsequent execution, focusing on unusual parent-child process relationships and script attributes.
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the file creation event to identify the specific script file that was downloaded, noting its name, path, and extension to understand the potential threat.
|
||||
- Examine the origin URL or referrer URL of the downloaded script to determine the source and assess its legitimacy or potential malicious intent.
|
||||
- Investigate the parent process, such as chrome.exe or explorer.exe, to understand how the script was downloaded and whether it aligns with typical user behavior.
|
||||
- Analyze the execution event of the scripting utility (wscript.exe or mshta.exe) to identify the command-line arguments used, which may provide insight into the script's intended actions.
|
||||
- Check the user account associated with the script execution to determine if the activity is expected for that user or if it indicates a compromised account.
|
||||
- Correlate the timing of the script creation and execution events to see if they fall within a suspicious timeframe, such as outside of normal working hours.
|
||||
- Look for any additional related alerts or logs on the host that might indicate further malicious activity or lateral movement following the script execution.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate script automation tools may trigger this rule if they download and execute scripts from the internet. Users can create exceptions for known safe tools by excluding specific file paths or process names.
|
||||
- Software updates or installations that download scripts as part of their process might be flagged. To handle this, users can whitelist specific origin URLs or referrer URLs associated with trusted software vendors.
|
||||
- Internal scripts distributed via corporate intranet sites could be misidentified as threats. Users should consider excluding scripts with known internal origin URLs or specific user IDs associated with IT operations.
|
||||
- Browser extensions or plugins that automate tasks using scripts may cause false positives. Users can exclude these by identifying and excluding the specific browser process names or file extensions involved.
|
||||
- Frequent use of file utilities like winrar or 7zFM for legitimate script handling can be excluded by specifying trusted file paths or user IDs that regularly perform these actions.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Isolate the affected system from the network to prevent further execution of potentially malicious scripts and lateral movement.
|
||||
- Terminate any suspicious processes identified in the alert, such as wscript.exe or mshta.exe, to stop the execution of the downloaded script.
|
||||
- Quarantine the downloaded script file and any associated files to prevent further execution and facilitate forensic analysis.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus or endpoint detection and response (EDR) tools to identify and remove any additional malicious files or remnants.
|
||||
- Review and analyze the origin URL and referrer URL of the downloaded script to identify potential malicious websites or compromised sources, and block these URLs at the network level.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected.
|
||||
- Implement application whitelisting to restrict the execution of unauthorized scripts and scripting utilities, reducing the risk of similar threats in the future."""
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
|
||||
[[rule.threat.technique]]
|
||||
id = "T1059"
|
||||
name = "Command and Scripting Interpreter"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.007"
|
||||
name = "JavaScript"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/007/"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.005"
|
||||
name = "Visual Basic"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/005/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0002"
|
||||
name = "Execution"
|
||||
reference = "https://attack.mitre.org/tactics/TA0002/"
|
||||
|
||||
|
||||
@@ -0,0 +1,144 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/19"
|
||||
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/19"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies potential fake CAPTCHA phishing attack based on PowerShell or Cmd argument values. Adversaries employ this
|
||||
technique via compromised websites with browser injects, posing either as fake CAPTCHAs to access the site or as a page
|
||||
loading error requiring a fix to display the page. The victim is instructed to copy and past a malicious command to
|
||||
the Windows Run dialog box.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-crowdstrike.fdr*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-system.security*",
|
||||
"logs-windows.forwarded*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*",
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Potential Fake CAPTCHA Phishing Attack"
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Potential Fake CAPTCHA Phishing Attack
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the process command line and arguments to identify any malicious intent.
|
||||
- Review web activity preceeding the alert to identify the initial vector.
|
||||
- Investigate any network activity or child processes from the suspected process.
|
||||
- Correlate the event with other security alerts or logs from the same host or user to identify patterns or additional indicators of compromise.
|
||||
- Assess the risk and impact of the detected activity by considering the context of the environment, such as the presence of sensitive data or critical systems that might be affected.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate administrative scripts containing the suspicious keywords such as CAPTCHA.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Immediately isolate the affected system from the network to prevent further spread or communication with potential command and control servers.
|
||||
- Terminate any suspicious processes identified by the detection rule to halt ongoing malicious activities.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus or endpoint detection and response (EDR) tools to identify and remove any malicious payloads or scripts.
|
||||
- Review and clean up any unauthorized changes to system configurations or scheduled tasks that may have been altered by the malicious PowerShell activity.
|
||||
- Restore any affected files or system components from known good backups to ensure system integrity and functionality.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional systems are compromised.
|
||||
- Implement additional monitoring and logging for PowerShell activities across the network to enhance detection of similar threats in the future."""
|
||||
risk_score = 73
|
||||
rule_id = "fbad57ec-4442-48db-a34f-5ee907b44a22"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Execution",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Data Source: Crowdstrike",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.name : ("powershell.exe", "cmd.exe", "mshta.exe") and process.parent.name : "explorer.exe" and
|
||||
process.command_line : ("*recaptcha *", "*CAPTCHA Verif*", "*complete verification*", "*Verification ID*", "*Verification Code*", "*Verification UID*",
|
||||
"*hυmаn vаlіdаtiοn*", "*human ID*", "*Action Identificator*", "*not a robot*", "*Click OK to*", "*anti-robot test*",
|
||||
"*Cloudflare ID*")
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1059"
|
||||
name = "Command and Scripting Interpreter"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.001"
|
||||
name = "PowerShell"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.003"
|
||||
name = "Windows Command Shell"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/003/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0002"
|
||||
name = "Execution"
|
||||
reference = "https://attack.mitre.org/tactics/TA0002/"
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1218"
|
||||
name = "System Binary Proxy Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1218.005"
|
||||
name = "Mshta"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/005/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1566"
|
||||
name = "Phishing"
|
||||
reference = "https://attack.mitre.org/techniques/T1566/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1566.001"
|
||||
name = "Spearphishing Attachment"
|
||||
reference = "https://attack.mitre.org/techniques/T1566/001/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0001"
|
||||
name = "Initial Access"
|
||||
reference = "https://attack.mitre.org/tactics/TA0001/"
|
||||
@@ -0,0 +1,143 @@
|
||||
[metadata]
|
||||
creation_date = "2025/08/20"
|
||||
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
|
||||
maturity = "production"
|
||||
updated_date = "2025/08/20"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
Identifies the execution of Windows commands or downloaded files via the browser's dialog box. Adversaries may use phishing
|
||||
to instruct the victim to copy and paste malicious commands for execution via crafted phsihing web pages.
|
||||
"""
|
||||
from = "now-9m"
|
||||
index = [
|
||||
"logs-endpoint.events.process-*",
|
||||
"logs-m365_defender.event-*",
|
||||
"logs-sentinel_one_cloud_funnel.*",
|
||||
"logs-windows.sysmon_operational-*",
|
||||
"winlogbeat-*"
|
||||
]
|
||||
language = "eql"
|
||||
license = "Elastic License v2"
|
||||
name = "Potential Execution via FileFix Phishing Attack"
|
||||
note = """## Triage and analysis
|
||||
|
||||
> **Disclaimer**:
|
||||
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
|
||||
|
||||
### Investigating Potential Execution via FileFix Phishing Attack
|
||||
|
||||
### Possible investigation steps
|
||||
|
||||
- Review the process command line and arguments to identify any malicious intent.
|
||||
- Review web activity preceeding the alert to identify the initial vector.
|
||||
- Investigate any files, network or child process events from the suspected process.
|
||||
- Correlate the event with other security alerts or logs from the same host or user to identify patterns or additional indicators of compromise.
|
||||
- Assess the risk and impact of the detected activity by considering the context of the environment, such as the presence of sensitive data or critical systems that might be affected.
|
||||
|
||||
### False positive analysis
|
||||
|
||||
- Legitimate administrative scripts containing the suspicious keywords such as CAPTCHA.
|
||||
|
||||
### Response and remediation
|
||||
|
||||
- Immediately isolate the affected system from the network to prevent further spread or communication with potential command and control servers.
|
||||
- Terminate any suspicious processes identified by the detection rule to halt ongoing malicious activities.
|
||||
- Conduct a thorough scan of the affected system using updated antivirus or endpoint detection and response (EDR) tools to identify and remove any malicious payloads or scripts.
|
||||
- Review and clean up any unauthorized changes to system configurations or scheduled tasks that may have been altered by the malicious PowerShell activity.
|
||||
- Restore any affected files or system components from known good backups to ensure system integrity and functionality.
|
||||
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional systems are compromised.
|
||||
- Implement additional monitoring and logging for PowerShell activities across the network to enhance detection of similar threats in the future."""
|
||||
references = ["https://mrd0x.com/filefix-clickfix-alternative/"]
|
||||
risk_score = 73
|
||||
rule_id = "7dc45430-7407-4790-b89e-c857c3f6bf23"
|
||||
severity = "high"
|
||||
tags = [
|
||||
"Domain: Endpoint",
|
||||
"OS: Windows",
|
||||
"Use Case: Threat Detection",
|
||||
"Tactic: Execution",
|
||||
"Tactic: Initial Access",
|
||||
"Tactic: Defense Evasion",
|
||||
"Data Source: Windows Security Event Logs",
|
||||
"Data Source: Elastic Defend",
|
||||
"Data Source: Sysmon",
|
||||
"Data Source: SentinelOne",
|
||||
"Data Source: Microsoft Defender for Endpoint",
|
||||
"Resources: Investigation Guide",
|
||||
]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "eql"
|
||||
|
||||
query = '''
|
||||
process where host.os.type == "windows" and event.type == "start" and
|
||||
process.parent.args == "--message-loop-type-ui" and process.parent.args == "--service-sandbox-type=none" and
|
||||
(
|
||||
process.name : ("pwsh.exe", "powershell.exe", "curl.exe", "msiexec.exe", "mshta.exe", "wscript.exe", "cscript.exe", "rundll32.exe", "certutil.exe", "certreq.exe") or
|
||||
process.executable : "?:\\Users\\*\\Downloads\\*"
|
||||
) and
|
||||
not (process.name : "rundll32.exe" and process.args : ("ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile", "shwebsvc.dll,AddNetPlaceRunDll"))
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1059"
|
||||
name = "Command and Scripting Interpreter"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.001"
|
||||
name = "PowerShell"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/001/"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1059.003"
|
||||
name = "Windows Command Shell"
|
||||
reference = "https://attack.mitre.org/techniques/T1059/003/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0002"
|
||||
name = "Execution"
|
||||
reference = "https://attack.mitre.org/tactics/TA0002/"
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1218"
|
||||
name = "System Binary Proxy Execution"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1218.005"
|
||||
name = "Mshta"
|
||||
reference = "https://attack.mitre.org/techniques/T1218/005/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0005"
|
||||
name = "Defense Evasion"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
[[rule.threat.technique]]
|
||||
id = "T1566"
|
||||
name = "Phishing"
|
||||
reference = "https://attack.mitre.org/techniques/T1566/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1566.001"
|
||||
name = "Spearphishing Attachment"
|
||||
reference = "https://attack.mitre.org/techniques/T1566/001/"
|
||||
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0001"
|
||||
name = "Initial Access"
|
||||
reference = "https://attack.mitre.org/tactics/TA0001/"
|
||||
Reference in New Issue
Block a user