f584fb6e31
* [Security Content] Adjust Mitre Att&ck Mappings - Windows Rules * Fix dates * Fix unit test errors * updated tags and fixed branch conflicts updated tags and fixed branch conflicts * description nit * Reverting unintended changes * Update initial_access_suspicious_ms_office_child_process.toml --------- Co-authored-by: imays11 <59296946+imays11@users.noreply.github.com>
107 lines
3.7 KiB
TOML
107 lines
3.7 KiB
TOML
[metadata]
|
|
creation_date = "2021/07/14"
|
|
integration = ["endpoint"]
|
|
maturity = "production"
|
|
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
|
|
min_stack_version = "8.3.0"
|
|
updated_date = "2023/10/13"
|
|
|
|
[rule]
|
|
author = ["Elastic"]
|
|
description = """
|
|
Identifies parent process spoofing used to thwart detection. Adversaries may spoof the parent process identifier (PPID)
|
|
of a new process to evade process-monitoring defenses or to elevate privileges.
|
|
"""
|
|
from = "now-9m"
|
|
index = ["logs-endpoint.events.*"]
|
|
language = "eql"
|
|
license = "Elastic License v2"
|
|
name = "Parent Process PID Spoofing"
|
|
references = ["https://blog.didierstevens.com/2017/03/20/"]
|
|
risk_score = 73
|
|
rule_id = "c88d4bd0-5649-4c52-87ea-9be59dbfbcf2"
|
|
severity = "high"
|
|
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Tactic: Privilege Escalation", "Data Source: Elastic Defend"]
|
|
type = "eql"
|
|
|
|
query = '''
|
|
/* This rule is compatible with Elastic Endpoint only */
|
|
|
|
sequence by host.id, user.id with maxspan=3m
|
|
|
|
[process where host.os.type == "windows" and event.type == "start" and
|
|
process.Ext.token.integrity_level_name != "system" and
|
|
(
|
|
process.pe.original_file_name : ("winword.exe", "excel.exe", "outlook.exe", "powerpnt.exe", "eqnedt32.exe",
|
|
"fltldr.exe", "mspub.exe", "msaccess.exe", "powershell.exe", "pwsh.exe",
|
|
"cscript.exe", "wscript.exe", "rundll32.exe", "regsvr32.exe", "msbuild.exe",
|
|
"mshta.exe", "wmic.exe", "cmstp.exe", "msxsl.exe") or
|
|
|
|
(process.executable : ("?:\\Users\\*.exe",
|
|
"?:\\ProgramData\\*.exe",
|
|
"?:\\Windows\\Temp\\*.exe",
|
|
"?:\\Windows\\Tasks\\*") and
|
|
(process.code_signature.exists == false or process.code_signature.status : "errorBadDigest")) or
|
|
|
|
process.executable : "?:\\Windows\\Microsoft.NET\\*.exe"
|
|
) and
|
|
|
|
not process.executable :
|
|
("?:\\Windows\\System32\\WerFaultSecure.exe",
|
|
"?:\\WINDOWS\\SysWOW64\\WerFaultSecure.exe",
|
|
"?:\\Windows\\System32\\WerFault.exe",
|
|
"?:\\Windows\\SysWOW64\\WerFault.exe")
|
|
] by process.pid
|
|
[process where host.os.type == "windows" and event.type == "start" and
|
|
process.parent.Ext.real.pid > 0 and
|
|
|
|
/* process.parent.Ext.real.pid is only populated if the parent process pid doesn't match */
|
|
not (process.name : "msedge.exe" and process.parent.name : "sihost.exe") and
|
|
|
|
not process.executable :
|
|
("?:\\Windows\\System32\\WerFaultSecure.exe",
|
|
"?:\\WINDOWS\\SysWOW64\\WerFaultSecure.exe",
|
|
"?:\\Windows\\System32\\WerFault.exe",
|
|
"?:\\Windows\\SysWOW64\\WerFault.exe")
|
|
] by process.parent.Ext.real.pid
|
|
'''
|
|
|
|
|
|
[[rule.threat]]
|
|
framework = "MITRE ATT&CK"
|
|
[[rule.threat.technique]]
|
|
id = "T1134"
|
|
name = "Access Token Manipulation"
|
|
reference = "https://attack.mitre.org/techniques/T1134/"
|
|
[[rule.threat.technique.subtechnique]]
|
|
id = "T1134.004"
|
|
name = "Parent PID Spoofing"
|
|
reference = "https://attack.mitre.org/techniques/T1134/004/"
|
|
|
|
|
|
|
|
[rule.threat.tactic]
|
|
id = "TA0005"
|
|
name = "Defense Evasion"
|
|
reference = "https://attack.mitre.org/tactics/TA0005/"
|
|
|
|
|
|
[[rule.threat]]
|
|
framework = "MITRE ATT&CK"
|
|
[[rule.threat.technique]]
|
|
id = "T1134"
|
|
name = "Access Token Manipulation"
|
|
reference = "https://attack.mitre.org/techniques/T1134/"
|
|
[[rule.threat.technique.subtechnique]]
|
|
id = "T1134.004"
|
|
name = "Parent PID Spoofing"
|
|
reference = "https://attack.mitre.org/techniques/T1134/004/"
|
|
|
|
|
|
|
|
[rule.threat.tactic]
|
|
id = "TA0004"
|
|
name = "Privilege Escalation"
|
|
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
|