From 4a342354f9bf09dc99c30d3e5af9e828a4d46a4b Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Fri, 20 Jan 2023 13:58:11 +0100
Subject: [PATCH 1/2] chg: [sigma] updated
---
clusters/sigma-rules.json | 3479 +++++++++++++++++++++----------------
1 file changed, 2001 insertions(+), 1478 deletions(-)
diff --git a/clusters/sigma-rules.json b/clusters/sigma-rules.json
index f7a6bd3..5783bf7 100644
--- a/clusters/sigma-rules.json
+++ b/clusters/sigma-rules.json
@@ -174,9 +174,9 @@
"logsource.category": "firewall",
"logsource.product": "No established product",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/firewall/net_firewall_cleartext_protocols.yml"
],
"tags": "No established tags"
@@ -232,10 +232,10 @@
"logsource.category": "dns",
"logsource.product": "No established product",
"refs": [
+ "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://core.telegram.org/bots/faq",
"https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/",
"https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/",
- "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/dns/net_dns_susp_telegram_api.yml"
],
"tags": [
@@ -460,8 +460,8 @@
"logsource.category": "dns",
"logsource.product": "No established product",
"refs": [
- "https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Backdoors/DNS_TXT_Pwnage.ps1",
"https://twitter.com/stvemillertime/status/1024707932447854592",
+ "https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Backdoors/DNS_TXT_Pwnage.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/dns/net_dns_susp_txt_exec_strings.yml"
],
"tags": [
@@ -1286,6 +1286,7 @@
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_rdp_public_listener.yml"
],
"tags": [
+ "attack.lateral_movement",
"attack.t1021.001"
]
},
@@ -1330,9 +1331,9 @@
"logsource.product": "zeek",
"refs": [
"https://threatpost.com/microsoft-petitpotam-poc/168163/",
+ "https://vx-underground.org/archive/Symantec/windows-vista-network-attack-07-en.pdf",
"https://msrc.microsoft.com/update-guide/vulnerability/ADV210003",
"https://github.com/topotam/PetitPotam/blob/d83ac8f2dd34654628c17490f99106eb128e7d1e/PetitPotam/PetitPotam.cpp",
- "https://vx-underground.org/archive/Symantec/windows-vista-network-attack-07-en.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_potential_petit_potam_efs_rpc_call.yml"
],
"tags": [
@@ -1479,6 +1480,7 @@
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dns_torproxy.yml"
],
"tags": [
+ "attack.exfiltration",
"attack.t1048"
]
},
@@ -1508,8 +1510,8 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://twitter.com/neu5ron/status/1438987292971053057?s=20",
"https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
+ "https://twitter.com/neu5ron/status/1438987292971053057?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_http_omigod_no_auth_rce.yml"
],
"tags": [
@@ -1750,9 +1752,9 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
- "https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
"https://twitter.com/_dirkjan/status/1309214379003588608",
+ "https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
+ "https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_smb_spoolss_named_pipe.yml"
],
"tags": [
@@ -1807,7 +1809,9 @@
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dns_mining_pools.yml"
],
"tags": [
+ "attack.execution",
"attack.t1569.002",
+ "attack.impact",
"attack.t1496"
]
},
@@ -1843,12 +1847,12 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://www.crowdstrike.com/blog/cve-2021-1678-printer-spooler-relay-security-advisory/",
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://github.com/zeek/zeek/blob/691b099de13649d6576c7b9d637f8213ff818832/scripts/base/protocols/dce-rpc/consts.zeek",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-par/93d1915d-4d9f-4ceb-90a7-e8f2a59adc29",
"https://github.com/corelight/CVE-2021-1675",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://old.zeek.org/zeekweek2019/slides/bzar.pdf",
+ "https://www.crowdstrike.com/blog/cve-2021-1678-printer-spooler-relay-security-advisory/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_printnightmare_print_driver_install.yml"
],
"tags": [
@@ -1971,10 +1975,10 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://www.netresec.com/?page=Blog&month=2021-01&post=Finding-Targeted-SUNBURST-Victims-with-pDNS",
- "https://tools.ietf.org/html/rfc2929#section-2.1",
- "https://twitter.com/neu5ron/status/1346245602502443009",
"https://tdm.socprime.com/tdm/info/eLbyj4JjI15v#sigma",
+ "https://twitter.com/neu5ron/status/1346245602502443009",
+ "https://tools.ietf.org/html/rfc2929#section-2.1",
+ "https://www.netresec.com/?page=Blog&month=2021-01&post=Finding-Targeted-SUNBURST-Victims-with-pDNS",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dns_susp_zbit_flag.yml"
],
"tags": [
@@ -2015,8 +2019,8 @@
"logsource.category": "application",
"logsource.product": "django",
"refs": [
- "https://docs.djangoproject.com/en/1.11/ref/exceptions/",
"https://docs.djangoproject.com/en/1.11/topics/logging/#django-security",
+ "https://docs.djangoproject.com/en/1.11/ref/exceptions/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/django/appframework_django_exceptions.yml"
],
"tags": [
@@ -2148,9 +2152,9 @@
"logsource.category": "application",
"logsource.product": "ruby_on_rails",
"refs": [
- "https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception",
- "https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb",
"http://guides.rubyonrails.org/action_controller_overview.html",
+ "https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb",
+ "https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception",
"http://edgeguides.rubyonrails.org/security.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/ruby/appframework_ruby_on_rails_exceptions.yml"
],
@@ -2184,10 +2188,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
- "https://github.com/zeronetworks/rpcfirewall",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-WKST.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sharphound_recon_account.yml"
],
"tags": [
@@ -2212,9 +2216,9 @@
"logsource.product": "rpc_firewall",
"refs": [
"https://github.com/zeronetworks/rpcfirewall",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_registry_recon.yml"
],
"tags": [
@@ -2237,9 +2241,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_recon.yml"
],
@@ -2263,9 +2267,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SCMR.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_service_lateral_movement.yml"
],
@@ -2299,9 +2303,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_atsvc_lateral_movement.yml"
],
@@ -2336,9 +2340,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-DRSR.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-DRSR.md",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_dcsync_attack.yml"
],
@@ -2387,9 +2391,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_lateral_movement.yml"
],
@@ -2424,8 +2428,8 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_dcom_or_wmi.yml"
],
@@ -2467,9 +2471,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sasec_lateral_movement.yml"
],
@@ -2504,11 +2508,11 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RPRN-PAR.md",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-pan/e44d984c-07d3-414c-8ffc-f8c8ad8512a8",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RPRN-PAR.md",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_printing_lateral_movement.yml"
],
@@ -2532,10 +2536,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
- "https://github.com/zeronetworks/rpcfirewall",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/02b1f559-fda2-4ba3-94c2-806eb2777183",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sharphound_recon_sessions.yml"
],
"tags": [
@@ -2559,9 +2563,9 @@
"logsource.product": "rpc_firewall",
"refs": [
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-EFSR.md",
- "https://github.com/zeronetworks/rpcfirewall",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942",
+ "https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-EFSR.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_efs_abuse.yml"
],
"tags": [
@@ -2584,9 +2588,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sasec_recon.yml"
],
@@ -2611,9 +2615,9 @@
"logsource.product": "rpc_firewall",
"refs": [
"https://github.com/zeronetworks/rpcfirewall",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement.yml"
],
"tags": [
@@ -2637,10 +2641,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
- "https://github.com/zeronetworks/rpcfirewall",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_server_service_abuse.yml"
],
"tags": [
@@ -2663,9 +2667,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_atsvc_recon.yml"
],
@@ -2722,11 +2726,11 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
- "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
+ "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_proc_access_lsass_susp_source.yml"
],
"tags": [
@@ -2760,8 +2764,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/shantanukhande/status/1229348874298388484",
"https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/",
+ "https://twitter.com/shantanukhande/status/1229348874298388484",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_dump_comsvcs_dll.yml"
],
"tags": [
@@ -2942,8 +2946,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/mrd0x/status/1460597833917251595",
- "https://twitter.com/_xpn_/status/1491557187168178176",
"https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
+ "https://twitter.com/_xpn_/status/1491557187168178176",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump_evasion.yml"
],
"tags": [
@@ -3188,10 +3192,10 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html",
- "https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
- "https://research.splunk.com/endpoint/windows_possible_credential_dumping/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003.001/T1003.001.md",
+ "https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
+ "https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html",
+ "https://research.splunk.com/endpoint/windows_possible_credential_dumping/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump.yml"
],
"tags": [
@@ -3225,10 +3229,10 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
+ "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_cred_dump_lsass_access.yml"
],
"tags": [
@@ -3263,11 +3267,11 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
- "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
+ "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_rare_proc_access_lsass.yml"
],
"tags": [
@@ -3301,11 +3305,11 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
- "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
+ "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_proc_access_lsass.yml"
],
"tags": [
@@ -3513,8 +3517,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_xpn_/status/1491557187168178176",
"https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
+ "https://twitter.com/_xpn_/status/1491557187168178176",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump_indicators.yml"
],
"tags": [
@@ -3548,8 +3552,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://github.com/codewhitesec/SysmonEnte/blob/main/screens/1.png",
"https://codewhitesec.blogspot.com/2022/09/attacks-on-sysmon-revisited-sysmonente.html",
+ "https://github.com/codewhitesec/SysmonEnte/blob/main/screens/1.png",
"https://github.com/codewhitesec/SysmonEnte/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_hack_sysmonente.yml"
],
@@ -3619,9 +3623,9 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/SBousseaden/status/1541920424635912196",
"https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-3.html",
"https://github.com/elastic/detection-rules/blob/2bc1795f3d7bcc3946452eb4f07ae799a756d94e/rules/windows/credential_access_lsass_handle_via_malseclogon.toml",
- "https://twitter.com/SBousseaden/status/1541920424635912196",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_seclogon.yml"
],
"tags": [
@@ -3700,8 +3704,8 @@
"logsource.category": "process_tampering",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SecurePeacock/status/1486054048390332423?s=20",
"https://www.bleepingcomputer.com/news/microsoft/microsoft-sysmon-now-detects-malware-process-tampering-attempts/",
+ "https://twitter.com/SecurePeacock/status/1486054048390332423?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/sysmon/sysmon_process_hollowing.yml"
],
"tags": [
@@ -3912,11 +3916,11 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://github.com/SigmaHQ/sigma/issues/253",
+ "https://twitter.com/d4rksystem/status/1357010969264873472",
"https://blog.cobaltstrike.com/2021/02/09/learn-pipe-fitting-for-all-of-your-offense-projects/",
"https://redcanary.com/threat-detection-report/threats/cobalt-strike/",
- "https://twitter.com/d4rksystem/status/1357010969264873472",
"https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis/",
+ "https://github.com/SigmaHQ/sigma/issues/253",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_mal_cobaltstrike.yml"
],
"tags": [
@@ -3941,8 +3945,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://attack.mitre.org/groups/G0010/",
"Internal Research",
+ "https://attack.mitre.org/groups/G0010/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_apt_turla_namedpipes.yml"
],
"tags": [
@@ -4131,8 +4135,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_psexec_default_pipe_from_susp_location.yml"
],
"tags": [
@@ -4227,18 +4231,18 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://github.com/RiccardoAncarani/LiquidSnake",
- "https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity",
- "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf",
- "https://securelist.com/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/71275/",
"https://www.us-cert.gov/ncas/alerts/TA17-117A",
- "https://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
- "https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/",
- "https://us-cert.cisa.gov/ncas/analysis-reports/ar19-304a",
"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html",
"https://thedfirreport.com/2020/06/21/snatch-ransomware/",
- "https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/",
+ "https://github.com/RiccardoAncarani/LiquidSnake",
+ "https://securelist.com/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/71275/",
+ "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf",
+ "https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/",
+ "https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity",
+ "https://us-cert.cisa.gov/ncas/analysis-reports/ar19-304a",
"https://securelist.com/faq-the-projectsauron-apt/75533/",
+ "https://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
+ "https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_mal_namedpipes.yml"
],
"tags": [
@@ -4263,8 +4267,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_psexec_default_pipe.yml"
],
"tags": [
@@ -4298,8 +4302,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/ADFSDBNamedPipeConnection.yaml",
"https://o365blog.com/post/adfs/",
+ "https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/ADFSDBNamedPipeConnection.yaml",
"https://github.com/Azure/SimuLand",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_susp_adfs_namedpipe_connection.yml"
],
@@ -4426,7 +4430,7 @@
"value": "Mimikatz Use"
},
{
- "description": "A rule has been modified in the Windows Firewall exception list",
+ "description": "Detects when a rule has been modified in the windows firewall exception list",
"meta": {
"author": "frack113",
"creation_date": "2022/02/19",
@@ -4442,10 +4446,29 @@
"tags": "No established tags"
},
"uuid": "5570c4d9-8fdd-4622-965b-403a5a101aa0",
- "value": "Modified Rule in Windows Firewall with Advanced Security"
+ "value": "Firewall Rule Modified In The Windows Firewall Exception List"
},
{
- "description": "A rule has been deleted in the Windows Firewall exception list.",
+ "description": "Detects activity when The Windows Defender Firewall service failed to load Group Policy",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2022/02/19",
+ "falsepositive": "No established falsepositives",
+ "filename": "win_firewall_as_failed_load_gpo.yml",
+ "level": "low",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/firewall_as/win_firewall_as_failed_load_gpo.yml"
+ ],
+ "tags": "No established tags"
+ },
+ "uuid": "7ec15688-fd24-4177-ba43-1a950537ee39",
+ "value": "The Windows Defender Firewall Service Failed To Load Group Policy"
+ },
+ {
+ "description": "Detects when a singe rules or all of the rules have been deleted from the Windows Defender Firewall",
"meta": {
"author": "frack113",
"creation_date": "2022/02/19",
@@ -4461,48 +4484,48 @@
"tags": "No established tags"
},
"uuid": "c187c075-bb3e-4c62-b4fa-beae0ffc211f",
- "value": "Delete Rule in Windows Firewall with Advanced Security"
+ "value": "A Rule Has Been Deleted From The Windows Firewall Exception List"
},
{
- "description": "The Windows Firewall service failed to load Group Policy.",
+ "description": "Detects activity when Windows Defender Firewall has been reset to its default configuration",
"meta": {
"author": "frack113",
"creation_date": "2022/02/19",
"falsepositive": "No established falsepositives",
- "filename": "win_firewall_as_failed.yml",
+ "filename": "win_firewall_as_reset_config.yml",
"level": "low",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/firewall_as/win_firewall_as_failed.yml"
- ],
- "tags": "No established tags"
- },
- "uuid": "7ec15688-fd24-4177-ba43-1a950537ee39",
- "value": "Failed to Load Policy in Windows Firewall with Advanced Security"
- },
- {
- "description": "Windows Firewall has been reset to its default configuration.",
- "meta": {
- "author": "frack113",
- "creation_date": "2022/02/19",
- "falsepositive": "No established falsepositives",
- "filename": "win_firewall_as_reset.yml",
- "level": "low",
- "logsource.category": "No established category",
- "logsource.product": "windows",
- "refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/firewall_as/win_firewall_as_reset.yml"
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/firewall_as/win_firewall_as_reset_config.yml"
],
"tags": "No established tags"
},
"uuid": "04b60639-39c0-412a-9fbe-e82499c881a3",
- "value": "Reset to Default Configuration Windows Firewall with Advanced Security"
+ "value": "Windows Defender Firewall Has Been Reset To Its Default Configuration"
},
{
- "description": "Setting have been change in Windows Firewall",
+ "description": "Detects when a all the rules have been deleted from the Windows Defender Firewall configuration",
+ "meta": {
+ "author": "frack113, Nasreddine Bencherchali",
+ "creation_date": "2023/01/17",
+ "falsepositive": "No established falsepositives",
+ "filename": "win_firewall_as_delete_all_rules.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/firewall_as/win_firewall_as_delete_all_rules.yml"
+ ],
+ "tags": "No established tags"
+ },
+ "uuid": "79609c82-a488-426e-abcf-9f341a39365d",
+ "value": "All Rules Have Been Deleted From The Windows Firewall Configuration"
+ },
+ {
+ "description": "Detects activity when the settings of the Windows firewall have been changed",
"meta": {
"author": "frack113",
"creation_date": "2022/02/19",
@@ -4518,10 +4541,10 @@
"tags": "No established tags"
},
"uuid": "00bb5bd5-1379-4fcf-a965-a5b6f7478064",
- "value": "Setting Change in Windows Firewall with Advanced Security"
+ "value": "Windows Firewall Settings Have Been Changed"
},
{
- "description": "A rule has been modified in the Windows Firewall exception list",
+ "description": "Detects when a rule has been added to the Windows Firewall exception list",
"meta": {
"author": "frack113",
"creation_date": "2022/02/19",
@@ -4537,7 +4560,7 @@
"tags": "No established tags"
},
"uuid": "cde0a575-7d3d-4a49-9817-b8004a7bf105",
- "value": "Added Rule in Windows Firewall with Advanced Security"
+ "value": "New Firewall Rule Added In Windows Firewall Exception List"
},
{
"description": "Detects local user creation on windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your windows server logs and not on your DC logs.",
@@ -4683,8 +4706,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.trimarcsecurity.com/single-post/2018/05/06/trimarc-research-detecting-password-spraying-with-security-event-auditing",
"https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying",
+ "https://www.trimarcsecurity.com/single-post/2018/05/06/trimarc-research-detecting-password-spraying-with-security-event-auditing",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_failed_logons_single_process.yml"
],
"tags": [
@@ -4745,9 +4768,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages",
"https://twitter.com/MsftSecIntel/status/1257324139515269121",
"https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore",
+ "https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_iso_mount.yml"
],
"tags": [
@@ -4921,9 +4944,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4964",
- "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4672",
+ "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
+ "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4964",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_admin_logon.yml"
],
"tags": "No established tags"
@@ -4973,8 +4996,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://attack.mitre.org/software/S0359/",
"https://jpcertcc.github.io/ToolAnalysisResultSheet/details/nltest.htm",
+ "https://attack.mitre.org/software/S0359/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_lolbas_execution_of_nltest.yml"
],
"tags": [
@@ -5009,8 +5032,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://o365blog.com/post/hybridhealthagent/",
"https://github.com/OTRF/Set-AuditRule/blob/c3dec5443414231714d850565d364ca73475ade5/rules/registry/aad_connect_health_monitoring_agent.yml",
+ "https://o365blog.com/post/hybridhealthagent/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_aadhealth_mon_agent_regkey_access.yml"
],
"tags": [
@@ -5034,8 +5057,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/",
"https://twitter.com/mattifestation/status/899646620148539397",
+ "https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_wmi_persistence.yml"
],
"tags": [
@@ -5090,8 +5113,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/menasec1/status/1106899890377052160",
"https://www.secureworks.com/blog/ransomware-as-a-distraction",
+ "https://twitter.com/menasec1/status/1106899890377052160",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_gpo_scheduledtasks.yml"
],
"tags": [
@@ -5228,11 +5251,11 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/staaldraad/go-ntlm/blob/cd032d41aa8ce5751c07cb7945400c0f5c81e2eb/ntlm/ntlmv1.go#L427",
- "https://github.com/sensepost/ruler/issues/47",
- "https://github.com/sensepost/ruler",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4624",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4776",
+ "https://github.com/sensepost/ruler",
+ "https://github.com/staaldraad/go-ntlm/blob/cd032d41aa8ce5751c07cb7945400c0f5c81e2eb/ntlm/ntlmv1.go#L427",
+ "https://github.com/sensepost/ruler/issues/47",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_ruler.yml"
],
"tags": [
@@ -5308,9 +5331,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://awakesecurity.com/blog/threat-hunting-for-paexec/",
- "https://blog.f-secure.com/wp-content/uploads/2019/10/CosmicDuke.pdf",
"https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html",
+ "https://blog.f-secure.com/wp-content/uploads/2019/10/CosmicDuke.pdf",
+ "https://awakesecurity.com/blog/threat-hunting-for-paexec/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_mal_service_installs.yml"
],
"tags": [
@@ -5463,9 +5486,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4647",
"https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4634",
+ "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4647",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_user_logoff.yml"
],
"tags": "No established tags"
@@ -5533,9 +5556,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events",
"https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis",
"https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/",
+ "https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_pass_the_hash_2.yml"
],
"tags": [
@@ -5560,8 +5583,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-gb/sysinternals/downloads/sdelete",
- "https://jpcertcc.github.io/ToolAnalysisResultSheet/details/sdelete.htm",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet/details/sdelete.htm",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_sdelete.yml"
],
"tags": [
@@ -5692,8 +5715,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
"https://twitter.com/SBousseaden/status/1207671369963646976",
+ "https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_apt_wocao.yml"
],
"tags": [
@@ -5746,9 +5769,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
- "https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
"https://twitter.com/_dirkjan/status/1309214379003588608",
+ "https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
+ "https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dce_rpc_smb_spoolss_named_pipe.yml"
],
"tags": [
@@ -5963,15 +5986,15 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730",
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://www.cisecurity.org/controls/cis-controls-list/",
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=633",
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=632",
- "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4729",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=632",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4728",
+ "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=633",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_group_modification_logging.yml"
],
"tags": "No established tags"
@@ -6041,8 +6064,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/sbousseaden/status/1518976397364056071?s=12&t=qKO5eKHvWhAP19a50FTZ7g",
"https://github.com/elastic/detection-rules/blob/fb6ee2c69864ffdfe347bf3b050cb931f53067a6/rules/windows/privilege_escalation_krbrelayup_suspicious_logon.toml",
+ "https://twitter.com/sbousseaden/status/1518976397364056071?s=12&t=qKO5eKHvWhAP19a50FTZ7g",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_krbrelayup.yml"
],
"tags": [
@@ -6100,8 +6123,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/fox-it/LDAPFragger",
- "https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961",
"https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/",
+ "https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_ldap_dataexchange.yml"
],
"tags": [
@@ -6270,9 +6293,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
"https://blog.alsid.eu/dcshadow-explained-4510f52fc19d",
"https://twitter.com/gentilkiwi/status/1003236624925413376",
+ "https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_possible_dc_shadow.yml"
],
"tags": [
@@ -7106,10 +7129,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Flangvik/status/1283054508084473861",
- "https://securityjosh.github.io/2020/04/23/Mute-Sysmon.html",
- "https://gist.github.com/Cyb3rWard0g/cf08c38c61f7e46e8404b38201ca01c8",
"https://twitter.com/SecurityJosh/status/1283027365770276866",
+ "https://twitter.com/Flangvik/status/1283054508084473861",
+ "https://gist.github.com/Cyb3rWard0g/cf08c38c61f7e46e8404b38201ca01c8",
+ "https://securityjosh.github.io/2020/04/23/Mute-Sysmon.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_sysmon_channel_reference_deletion.yml"
],
"tags": [
@@ -7388,9 +7411,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://isc.sans.edu/forums/diary/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability/27668/",
- "https://github.com/topotam/PetitPotam",
"https://github.com/splunk/security_content/blob/develop/detections/endpoint/petitpotam_suspicious_kerberos_tgt_request.yml",
+ "https://github.com/topotam/PetitPotam",
+ "https://isc.sans.edu/forums/diary/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability/27668/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_petitpotam_susp_tgt_request.yml"
],
"tags": [
@@ -7423,8 +7446,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4673",
+ "https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_user_driver_loaded.yml"
],
"tags": [
@@ -7483,8 +7506,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_meterpreter_or_cobaltstrike_getsystem_service_install.yml"
],
"tags": [
@@ -7560,8 +7583,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.trimarcsecurity.com/single-post/TrimarcResearch/Detecting-Kerberoasting-Activity",
"https://adsecurity.org/?p=3458",
+ "https://www.trimarcsecurity.com/single-post/TrimarcResearch/Detecting-Kerberoasting-Activity",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_rc4_kerberos.yml"
],
"tags": [
@@ -7702,9 +7725,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4743",
"https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4741",
- "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4743",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_add_remove_computer.yml"
],
"tags": "No established tags"
@@ -7787,7 +7810,7 @@
"value": "Suspicious Windows ANONYMOUS LOGON Local Account Created"
},
{
- "description": "Detects when adversaries stop services or processes by deleting or disabling their respective schdueled tasks in order to conduct data destructive activities",
+ "description": "Detects when adversaries stop services or processes by deleting or disabling their respective scheduled tasks in order to conduct data destructive activities",
"meta": {
"author": "Nasreddine Bencherchali",
"creation_date": "2022/12/05",
@@ -8160,10 +8183,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4800",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_workstation_was_locked.yml"
],
"tags": "No established tags"
@@ -8213,16 +8236,16 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
"https://twitter.com/_xpn_/status/1268712093928378368",
+ "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"http://managed670.rssing.com/chan-5590147/all_p1.html",
"https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
- "https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
- "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
- "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
"https://bunnyinside.com/?term=f71e8cb9c76a",
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dot_net_etw_tamper.yml"
],
"tags": [
@@ -8396,8 +8419,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/Set-AuditRule/blob/c3dec5443414231714d850565d364ca73475ade5/rules/registry/aad_connect_health_service_agent.yml",
"https://o365blog.com/post/hybridhealthagent/",
+ "https://github.com/OTRF/Set-AuditRule/blob/c3dec5443414231714d850565d364ca73475ade5/rules/registry/aad_connect_health_service_agent.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_aadhealth_svc_agent_regkey_access.yml"
],
"tags": [
@@ -8488,8 +8511,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/",
"https://adsecurity.org/?p=2053",
+ "https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_enable_weak_encryption.yml"
],
"tags": [
@@ -8601,8 +8624,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/ThreatHunter-Playbook/blob/f7a58156dbfc9b019f17f638b8c62d22e557d350/playbooks/WIN-201012004336.yaml",
"https://securitydatasets.com/notebooks/small/windows/08_lateral_movement/SDWIN-200806015757.html?highlight=create%20file",
+ "https://github.com/OTRF/ThreatHunter-Playbook/blob/f7a58156dbfc9b019f17f638b8c62d22e557d350/playbooks/WIN-201012004336.yaml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_smb_file_creation_admin_shares.yml"
],
"tags": [
@@ -8744,8 +8767,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://msdn.microsoft.com/en-us/library/cc220234.aspx",
"https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/",
+ "https://msdn.microsoft.com/en-us/library/cc220234.aspx",
"https://adsecurity.org/?p=3466",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_ad_user_backdoors.yml"
],
@@ -8804,9 +8827,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/SBousseaden/status/1581300963650187264?",
"https://cyberstoph.org/posts/2022/03/detecting-shadow-credentials/",
"https://www.elastic.co/guide/en/security/8.4/potential-shadow-credentials-added-to-ad-object.html",
- "https://twitter.com/SBousseaden/status/1581300963650187264?",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_possible_shadow_credentials_added.yml"
],
"tags": [
@@ -8839,8 +8862,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_mal_wceaux_dll.yml"
],
"tags": [
@@ -8875,8 +8898,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
- "https://www.sans.org/webcasts/119395",
"https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/",
+ "https://www.sans.org/webcasts/119395",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_cobaltstrike_service_installs.yml"
],
"tags": [
@@ -8967,10 +8990,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662",
- "https://twitter.com/gentilkiwi/status/1003236624925413376",
"https://blog.blacklanternsecurity.com/p/detecting-dcsync?s=r",
+ "https://twitter.com/gentilkiwi/status/1003236624925413376",
+ "https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dcsync.yml"
],
"tags": [
@@ -9156,9 +9179,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/malmoeb/status/1511760068743766026",
- "https://github.com/helloexp/0day/blob/614227a7b9beb0e91e7e2c6a5e532e6f7a8e883c/00-CVE_EXP/CVE-2021-42287/sam-the-admin/sam_the_admin.py",
"https://github.com/WazeHell/sam-theadmin/blob/main/sam_the_admin.py",
+ "https://github.com/helloexp/0day/blob/614227a7b9beb0e91e7e2c6a5e532e6f7a8e883c/00-CVE_EXP/CVE-2021-42287/sam-the-admin/sam_the_admin.py",
+ "https://twitter.com/malmoeb/status/1511760068743766026",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_computer_name.yml"
],
"tags": [
@@ -9349,8 +9372,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/JohnLaTwC/status/1004895028995477505",
"https://goo.gl/PsqrhT",
+ "https://twitter.com/JohnLaTwC/status/1004895028995477505",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/ntlm/win_susp_ntlm_auth.yml"
],
"tags": [
@@ -9529,6 +9552,31 @@
"uuid": "7dbb86de-a0cc-494c-8aa8-b2996c9ef3c8",
"value": "LPE InstallerFileTakeOver PoC CVE-2021-41379"
},
+ {
+ "description": "Detects restricted access to applications by the Software Restriction Policies (SRP) policy",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/12",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_software_restriction_policies_block.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWEventsList/CSV/Windows11/22H2/W11_22H2_Pro_20220920_22621.382/Providers/Microsoft-Windows-AppXDeployment-Server.csv",
+ "https://learn.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policies",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_software_restriction_policies_block.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.t1072"
+ ]
+ },
+ "uuid": "b4c8da4a-1c12-46b0-8a2b-0a8521d03442",
+ "value": "Restricted Software Access By SRP"
+ },
{
"description": "Detects MSI package installation from suspicious locations",
"meta": {
@@ -9606,8 +9654,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj574207(v=ws.11)",
"https://twitter.com/mgreen27/status/1558223256704122882",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj574207(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_esent_ntdsutil_abuse_susp_location.yml"
],
"tags": [
@@ -9630,9 +9678,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/13828b390d5f58b002e808c2c4f02fdd920e236cc8015480fa33b6c1a9300e31",
"https://www.virustotal.com/gui/file/5092b2672b4cb87a8dd1c2e6047b487b95995ad8ed5e9fc217f46b8bfb1b8c01",
"https://www.virustotal.com/gui/file/15b57c1b68cd6ce3c161042e0f3be9f32d78151fe95461eedc59a79fc222c7ed",
+ "https://www.virustotal.com/gui/file/13828b390d5f58b002e808c2c4f02fdd920e236cc8015480fa33b6c1a9300e31",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_av_relevant_match.yml"
],
"tags": [
@@ -9665,8 +9713,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-procoption-transact-sql?view=sql-server-ver16",
+ "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_mssql_sp_procoption_set.yml"
],
"tags": [
@@ -9689,8 +9737,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj574207(v=ws.11)",
"https://twitter.com/mgreen27/status/1558223256704122882",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj574207(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_esent_ntdsutil_abuse.yml"
],
"tags": [
@@ -9745,8 +9793,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://technet.microsoft.com/en-us/library/security/4022344",
"https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5",
+ "https://technet.microsoft.com/en-us/library/security/4022344",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_susp_msmpeng_crash.yml"
],
"tags": [
@@ -9781,8 +9829,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/",
+ "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_mssql_xp_cmdshell_change.yml"
],
"tags": [
@@ -9806,8 +9854,8 @@
"logsource.product": "windows",
"refs": [
"https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-erref/596a1078-e883-4972-9bbc-49e60bebca55",
- "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
+ "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_werfault_susp_lsass_credential_dump.yml"
],
"tags": [
@@ -9841,10 +9889,10 @@
"logsource.product": "windows",
"refs": [
"https://www.youtube.com/watch?v=ebmW42YYveI",
- "https://twitter.com/DidierStevens/status/1217533958096924676",
"https://twitter.com/VM_vivisector/status/1217190929330655232",
- "https://nullsec.us/windows-event-log-audit-cve/",
+ "https://twitter.com/DidierStevens/status/1217533958096924676",
"https://twitter.com/FlemmingRiis/status/1217147415482060800",
+ "https://nullsec.us/windows-event-log-audit-cve/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_audit_cve.yml"
],
"tags": [
@@ -9955,8 +10003,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/",
+ "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_mssql_xp_cmdshell_audit_log.yml"
],
"tags": [
@@ -10002,9 +10050,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://docs.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16",
"https://docs.microsoft.com/en-us/sql/t-sql/statements/drop-server-audit-transact-sql?view=sql-server-ver16",
+ "https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_mssql_disable_audit_settings.yml"
],
"tags": [
@@ -10047,6 +10095,38 @@
"uuid": "b20f6158-9438-41be-83da-a5a16ac90c2b",
"value": "Rare Scheduled Task Creations"
},
+ {
+ "description": "Detects when adversaries stop services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/13",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_taskscheduler_susp_schtasks_delete.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/taskscheduler/win_taskscheduler_susp_schtasks_delete.yml"
+ ],
+ "tags": [
+ "attack.impact",
+ "attack.t1489"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "20fb2507-d71c-455d-9b6d-6104461cf26b",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "9e3cb244-bdb8-4632-8c90-6079c8f4f16d",
+ "value": "Suspicious Security Scheduled Tasks Deleted"
+ },
{
"description": "Detects the execution of Scheduled Tasks where the Program being run is located in a suspicious location or it's an unusale program to be run from a Scheduled Task",
"meta": {
@@ -10259,8 +10339,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/hhlxf/PrintNightmare",
- "https://twitter.com/KevTheHermit/status/1410203844064301056",
"https://github.com/afwu/PrintNightmare",
+ "https://twitter.com/KevTheHermit/status/1410203844064301056",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/smbclient/win_susp_failed_guest_logon.yml"
],
"tags": [
@@ -10307,11 +10387,11 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse",
+ "https://winaero.com/enable-openssh-server-windows-10/",
"https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack/tree/master/TA0008-Lateral%20Movement/T1021.004-Remote%20Service%20SSH",
"https://virtualizationreview.com/articles/2020/05/21/ssh-server-on-windows-10.aspx",
- "https://winaero.com/enable-openssh-server-windows-10/",
"https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16",
- "https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/openssh/win_sshd_openssh_server_listening_on_socket.yml"
],
"tags": [
@@ -10335,9 +10415,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/fuzzyf10w/status/1410202370835898371",
"https://github.com/hhlxf/PrintNightmare",
"https://github.com/afwu/PrintNightmare",
+ "https://twitter.com/fuzzyf10w/status/1410202370835898371",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/printservice/win_exploit_cve_2021_1675_printspooler.yml"
],
"tags": [
@@ -10392,6 +10472,56 @@
"uuid": "f34d942d-c8c4-4f1f-b196-22471aecf10a",
"value": "CVE-2021-1675 Print Spooler Exploitation"
},
+ {
+ "description": "Detect standard users login that are part of high privileged groups such as the Administrator group",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/13",
+ "falsepositive": [
+ "Standard domain users who are part of the administrator group. These users shouldn't have these right. But in the case where it's necessary. They should be filtered out using the \"TargetUserName\" field"
+ ],
+ "filename": "win_lsa_server_normal_user_admin.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection",
+ "https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers",
+ "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWProvidersManifests/Windows11/22H2/W11_22H2_Pro_20221220_22621.963/WEPExplorer/LsaSrv.xml",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/lsa_server/win_lsa_server_normal_user_admin.yml"
+ ],
+ "tags": [
+ "attack.credential_access",
+ "attack.privilege_escalation"
+ ]
+ },
+ "uuid": "7ac407cc-0f48-4328-aede-de1d2e6fef41",
+ "value": "Standard User In High Privileged Group"
+ },
+ {
+ "description": "Detects execution of Sysinternals tools via an AppX package. Attackers could instal the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Legitimate usage of the applications from the Windows Store"
+ ],
+ "filename": "win_appmodel_runtime_sysinternals_tools_appx_execution.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "Internal Research",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appmodel_runtime/win_appmodel_runtime_sysinternals_tools_appx_execution.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.execution"
+ ]
+ },
+ "uuid": "d29a20b2-be4b-4827-81f2-3d8a59eab5fc",
+ "value": "Sysinternals Tools AppX Versions Execution"
+ },
{
"description": "Detects blocked attempts to change any of Defender's settings such as \"Real Time Monitoring\" and \"Behavior Monitoring\"",
"meta": {
@@ -10405,8 +10535,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://bhabeshraj.com/post/tampering-with-microsoft-defenders-tamper-protection",
"https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide",
+ "https://bhabeshraj.com/post/tampering-with-microsoft-defenders-tamper-protection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_tamper_protection_trigger.yml"
],
"tags": [
@@ -10556,8 +10686,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus",
+ "https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_history_delete.yml"
],
"tags": [
@@ -10670,8 +10800,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://bidouillesecurity.com/disable-windows-defender-in-powershell/#DisableAntiSpyware",
"https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide",
+ "https://bidouillesecurity.com/disable-windows-defender-in-powershell/#DisableAntiSpyware",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_suspicious_features_tampering.yml"
],
"tags": [
@@ -10719,10 +10849,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_direct_ip_access.yml"
],
"tags": [
@@ -10892,9 +11022,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/malmoeb/status/1535142803075960832",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
- "https://twitter.com/malmoeb/status/1535142803075960832",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_susp_domain.yml"
],
"tags": [
@@ -10928,8 +11058,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md",
"https://twitter.com/malmoeb/status/1535142803075960832",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_uncommon_domain.yml"
],
"tags": [
@@ -10963,8 +11093,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://ngrok.com/",
"https://twitter.com/tekdefense/status/1519711183162556416?s=12&t=OTsHCBkQOTNs1k3USz65Zg",
+ "https://ngrok.com/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/terminalservices/win_terminalservices_rdp_ngrok.yml"
],
"tags": [
@@ -10997,9 +11127,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83",
"https://technet.microsoft.com/en-us/library/cc735829(v=ws.10).aspx",
"https://twitter.com/gentilkiwi/status/861641945944391680",
- "https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_server/win_dns_server_susp_dns_config.yml"
],
"tags": [
@@ -11093,8 +11223,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_meterpreter_or_cobaltstrike_getsystem_service_installation.yml"
],
"tags": [
@@ -11517,8 +11647,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
- "https://www.sans.org/webcasts/119395",
"https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/",
+ "https://www.sans.org/webcasts/119395",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_cobaltstrike_service_installs.yml"
],
"tags": [
@@ -11587,9 +11717,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_susp_dhcp_config.yml"
],
"tags": [
@@ -11682,8 +11812,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/Ekultek/BlueKeep",
"https://github.com/zerosum0x0/CVE-2019-0708",
+ "https://github.com/Ekultek/BlueKeep",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_rdp_potential_cve_2019_0708.yml"
],
"tags": [
@@ -11715,8 +11845,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://bi-zone.medium.com/hunting-for-zerologon-f65c61586382",
"https://www.secura.com/blog/zero-logon",
+ "https://bi-zone.medium.com/hunting-for-zerologon-f65c61586382",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_possible_zerologon_exploitation_using_wellknown_tools.yml"
],
"tags": [
@@ -11842,8 +11972,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/BishopFox/sliver/blob/79f2d48fcdfc2bee4713b78d431ea4b27f733f30/client/command/commands.go#L1231",
"https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/",
+ "https://github.com/BishopFox/sliver/blob/79f2d48fcdfc2bee4713b78d431ea4b27f733f30/client/command/commands.go#L1231",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_service_install_sliver.yml"
],
"tags": [
@@ -12098,7 +12228,7 @@
"System provisioning (system reset before the golden image creation)"
],
"filename": "win_system_eventlog_cleared.yml",
- "level": "low",
+ "level": "medium",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
@@ -12278,9 +12408,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.bleepingcomputer.com/news/security/windows-10-bug-corrupts-your-hard-drive-on-seeing-this-files-icon/",
- "https://twitter.com/wdormann/status/1347958161609809921",
"https://twitter.com/jonasLyk/status/1347900440000811010",
+ "https://twitter.com/wdormann/status/1347958161609809921",
+ "https://www.bleepingcomputer.com/news/security/windows-10-bug-corrupts-your-hard-drive-on-seeing-this-files-icon/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_ntfs_vuln_exploit.yml"
],
"tags": [
@@ -12317,7 +12447,7 @@
"value": "Turla Service Install"
},
{
- "description": "One of the Windows Core Eventlogs has been cleared. e.g. caused by \"wevtutil cl\" command execution",
+ "description": "Detects the clearing of one of the Windows Core Eventlogs. e.g. caused by \"wevtutil cl\" command execution",
"meta": {
"author": "Florian Roth, Tim Shelton",
"creation_date": "2022/05/17",
@@ -12350,7 +12480,7 @@
}
],
"uuid": "100ef69e-3327-481c-8e5c-6d80d9507556",
- "value": "System Eventlog Cleared"
+ "value": "Important Windows Eventlog Cleared"
},
{
"description": "This rule detects a DHCP server error in which a specified Callout DLL (in registry) could not be loaded",
@@ -12365,9 +12495,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_susp_dhcp_config_failed.yml"
],
"tags": [
@@ -12913,8 +13043,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_service_install_psexec.yml"
],
"tags": [
@@ -13007,6 +13137,31 @@
"uuid": "44bbff3e-4ca3-452d-a49a-6efa4cafa06f",
"value": "Exploit SamAccountName Spoofing with Kerberos"
},
+ {
+ "description": "Detects execution of AppX packages with known suspicious or malicious signature",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_appxpackaging_om_sups_appx_signature.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
+ "Internal Research",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxpackaging_om/win_appxpackaging_om_sups_appx_signature.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.execution"
+ ]
+ },
+ "uuid": "b5aa7d60-c17e-4538-97de-09029d6cd76b",
+ "value": "Suspicious Digital Signature Of AppX Package"
+ },
{
"description": "Rule to detect the Hybrid Connection Manager service running on an endpoint.",
"meta": {
@@ -13136,8 +13291,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/",
"https://twitter.com/mattifestation/status/899646620148539397",
+ "https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/wmi/win_wmi_persistence.yml"
],
"tags": [
@@ -13158,6 +13313,172 @@
"uuid": "0b7889b4-5577-4521-a60a-3376ee7f9f7b",
"value": "WMI Persistence"
},
+ {
+ "description": "Detects DNS queries for anonfiles.com, which is an anonymous file upload platform often used for malicious purposes",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Rare legitimate access to anonfiles.com"
+ ],
+ "filename": "win_dns_client_anonymfiles_com.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackbyte",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_client/win_dns_client_anonymfiles_com.yml"
+ ],
+ "tags": [
+ "attack.exfiltration",
+ "attack.t1567.002"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "bf1b6176-597c-4600-bfcd-ac989670f96b",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "29f171d7-aa47-42c7-9c7b-3c87938164d9",
+ "value": "DNS Query for Anonfiles.com Domain - DNS Client"
+ },
+ {
+ "description": "Detects DNS queries for subdomains used for upload to MEGA.io",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Legitimate DNS queries and usage of Mega"
+ ],
+ "filename": "win_dns_client_mega_nz.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_client/win_dns_client_mega_nz.yml"
+ ],
+ "tags": [
+ "attack.exfiltration",
+ "attack.t1567.002"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "bf1b6176-597c-4600-bfcd-ac989670f96b",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "66474410-b883-415f-9f8d-75345a0a66a6",
+ "value": "DNS Query for MEGA.io Upload Domain - DNS Client"
+ },
+ {
+ "description": "Detects DNS resolution of an .onion address related to Tor routing networks",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2022/02/20",
+ "falsepositive": [
+ "Unlikely"
+ ],
+ "filename": "win_dns_client_tor_onion.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.logpoint.com/en/blog/detecting-tor-use-with-logpoint/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_client/win_dns_client_tor_onion.yml"
+ ],
+ "tags": [
+ "attack.command_and_control",
+ "attack.t1090.003"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "a782ebe2-daba-42c7-bc82-e8e9d923162d",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "8384bd26-bde6-4da9-8e5d-4174a7a47ca2",
+ "value": "Query Tor Onion Address - DNS Client"
+ },
+ {
+ "description": "Detects DNS queries to \"ufile.io\". Which is often abused by malware for upload and exfiltration",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Legitimate DNS queries and usage of Ufile"
+ ],
+ "filename": "win_dns_client_ufile_io.yml",
+ "level": "high",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://thedfirreport.com/2021/12/13/diavol-ransomware/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_client/win_dns_client_ufile_io.yml"
+ ],
+ "tags": [
+ "attack.exfiltration",
+ "attack.t1567.002"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "bf1b6176-597c-4600-bfcd-ac989670f96b",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "090ffaad-c01a-4879-850c-6d57da98452d",
+ "value": "DNS Query for Ufile.io Upload Domain - DNS Client"
+ },
+ {
+ "description": "Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_dns_client__mal_cobaltstrike.yml",
+ "level": "critical",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.icebrg.io/blog/footprints-of-fin7-tracking-actor-patterns",
+ "https://www.sekoia.io/en/hunting-and-detecting-cobalt-strike/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_client/win_dns_client__mal_cobaltstrike.yml"
+ ],
+ "tags": [
+ "attack.command_and_control",
+ "attack.t1071.004"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "1996eef1-ced3-4d7f-bf94-33298cabbf72",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "0d18728b-f5bf-4381-9dcf-915539fff6c2",
+ "value": "Suspicious Cobalt Strike DNS Beaconing - DNS Client"
+ },
{
"description": "Detect run not allowed files. Applocker is a very useful tool, especially on servers where unprivileged users have access. For example terminal servers. You need configure applocker and log collect to receive these events.",
"meta": {
@@ -13172,8 +13493,8 @@
"logsource.product": "windows",
"refs": [
"https://nxlog.co/documentation/nxlog-user-guide/applocker.html",
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/applocker/win_applocker_file_was_not_allowed_to_run.yml"
],
"tags": [
@@ -13244,11 +13565,11 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/hunting-for-reconnaissance-activities-using-ldap-search-filters/ba-p/824726",
- "https://github.com/fox-it/BloodHound.py/blob/d65eb614831cd30f26028ccb072f5e77ca287e0b/bloodhound/ad/domain.py#L427",
"https://medium.com/falconforce/falconfriday-detecting-active-directory-data-collection-0xff21-c22d1a57494c",
- "https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/Recon/PowerView.ps1",
+ "https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/hunting-for-reconnaissance-activities-using-ldap-search-filters/ba-p/824726",
"https://github.com/BloodHoundAD/SharpHound3/blob/7d96b991b1887ff50349ce59c80980bc0d95c86a/SharpHound3/LdapBuilder.cs",
+ "https://github.com/fox-it/BloodHound.py/blob/d65eb614831cd30f26028ccb072f5e77ca287e0b/bloodhound/ad/domain.py#L427",
+ "https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/Recon/PowerView.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/ldap/win_ldap_recon.yml"
],
"tags": [
@@ -13278,30 +13599,30 @@
"value": "Potential Active Directory Reconnaissance/Enumeration Via LDAP"
},
{
- "description": "Detects an appx package installation with the error code \"0x80073cff\". Whihc indicates that the package didn't meet the sgining requirements and could be suspicious",
+ "description": "Detects an appx package added the pipeline of the \"to be processed\" packages which is located in uncommon locations",
"meta": {
"author": "Nasreddine Bencherchali",
"creation_date": "2023/01/11",
"falsepositive": [
- "Legitimate AppX packages not signed by MS used part of an enterprise"
+ "Unknown"
],
- "filename": "appxdeployment_server_susp_appx_package_installation.yml",
+ "filename": "win_appxdeployment_server_uncommon_package_locations.yml",
"level": "medium",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
"Internal Research",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/appxdeployment_server_susp_appx_package_installation.yml"
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_uncommon_package_locations.yml"
],
"tags": [
"attack.defense_evasion"
]
},
- "uuid": "898d5fc9-fbc3-43de-93ad-38e97237c344",
- "value": "Suspicious AppX Package Installation Attempt"
+ "uuid": "c977cb50-3dff-4a9f-b873-9290f56132f1",
+ "value": "Uncommon AppX Package Locations"
},
{
"description": "Detects an appx package added the pipeline of the \"to be processed\" packages which is located in suspicious locations",
@@ -13311,16 +13632,16 @@
"falsepositive": [
"Unknown"
],
- "filename": "appxdeployment_server_susp_package_locations.yml",
+ "filename": "win_appxdeployment_server_susp_package_locations.yml",
"level": "high",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
"Internal Research",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/appxdeployment_server_susp_package_locations.yml"
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_package_locations.yml"
],
"tags": [
"attack.defense_evasion"
@@ -13329,31 +13650,6 @@
"uuid": "5cdeaf3d-1489-477c-95ab-c318559fc051",
"value": "Suspicious AppX Package Locations"
},
- {
- "description": "Detects potential installation or installation attempts of known malicious appx packages",
- "meta": {
- "author": "Nasreddine Bencherchali",
- "creation_date": "2023/01/11",
- "falsepositive": [
- "Rare occasions where a malicious package uses the exact same name and version as a legtimate application"
- ],
- "filename": "appxdeployment_server_mal_appx_names.yml",
- "level": "medium",
- "logsource.category": "No established category",
- "logsource.product": "windows",
- "refs": [
- "https://forensicitguy.github.io/analyzing-magnitude-magniber-appx/",
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/appxdeployment_server_mal_appx_names.yml"
- ],
- "tags": [
- "attack.defense_evasion"
- ]
- },
- "uuid": "09d3b48b-be17-47f5-bf4e-94e7e75d09ce",
- "value": "Potential Malicious AppX Package Installation Attempts"
- },
{
"description": "Detects an appx package added the pipeline of the \"to be processed\" packages which is downloaded from a suspicious domain",
"meta": {
@@ -13362,16 +13658,16 @@
"falsepositive": [
"Unknown"
],
- "filename": "appxdeployment_server_susp_domains.yml",
+ "filename": "win_appxdeployment_server_susp_domains.yml",
"level": "high",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
"Internal Research",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/appxdeployment_server_susp_domains.yml"
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_domains.yml"
],
"tags": [
"attack.defense_evasion"
@@ -13381,30 +13677,103 @@
"value": "Suspicious Remote AppX Package Locations"
},
{
- "description": "Detects an appx package added the pipeline of the \"to be processed\" packages which is located in uncommon locations",
+ "description": "Detects an appx package installation with the error code \"0x80073cff\". Whihc indicates that the package didn't meet the sgining requirements and could be suspicious",
"meta": {
"author": "Nasreddine Bencherchali",
"creation_date": "2023/01/11",
"falsepositive": [
- "Unknown"
+ "Legitimate AppX packages not signed by MS used part of an enterprise"
],
- "filename": "appxdeployment_server_uncommon_package_locations.yml",
+ "filename": "win_appxdeployment_server_susp_appx_package_installation.yml",
"level": "medium",
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
"Internal Research",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/appxdeployment_server_uncommon_package_locations.yml"
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_appx_package_installation.yml"
],
"tags": [
"attack.defense_evasion"
]
},
- "uuid": "c977cb50-3dff-4a9f-b873-9290f56132f1",
- "value": "Uncommon AppX Package Locations"
+ "uuid": "898d5fc9-fbc3-43de-93ad-38e97237c344",
+ "value": "Suspicious AppX Package Installation Attempt"
+ },
+ {
+ "description": "Detects an appx package deployment that was blocked by the local computer policy",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/11",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_appxdeployment_server_policy_block.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWEventsList/CSV/Windows11/22H2/W11_22H2_Pro_20220920_22621.382/Providers/Microsoft-Windows-AppXDeployment-Server.csv",
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_policy_block.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion"
+ ]
+ },
+ "uuid": "e021bbb5-407f-41f5-9dc9-1864c45a7a51",
+ "value": "Deployment Of The AppX Package Was Blocked By The Policy"
+ },
+ {
+ "description": "Detects potential installation or installation attempts of known malicious appx packages",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/11",
+ "falsepositive": [
+ "Rare occasions where a malicious package uses the exact same name and version as a legtimate application"
+ ],
+ "filename": "win_appxdeployment_server_mal_appx_names.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
+ "https://forensicitguy.github.io/analyzing-magnitude-magniber-appx/",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_mal_appx_names.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion"
+ ]
+ },
+ "uuid": "09d3b48b-be17-47f5-bf4e-94e7e75d09ce",
+ "value": "Potential Malicious AppX Package Installation Attempts"
+ },
+ {
+ "description": "Detects an appx package deployment that was blocked by AppLocker policy",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/11",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "win_appxdeployment_server_applocker_block.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWEventsList/CSV/Windows11/22H2/W11_22H2_Pro_20220920_22621.382/Providers/Microsoft-Windows-AppXDeployment-Server.csv",
+ "https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_applocker_block.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion"
+ ]
+ },
+ "uuid": "6ae53108-c3a0-4bee-8f45-c7591a2c337f",
+ "value": "Deployment AppX Package Was Blocked By AppLocker"
},
{
"description": "Detects removal of an exported Exchange mailbox which could be to cover tracks from ProxyShell exploit",
@@ -13647,8 +14016,8 @@
"logsource.category": "create_stream_hash",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://lolbas-project.github.io/lolbas/Binaries/Regedit/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_stream_hash/create_stream_hash_regedit_export_to_ads.yml"
],
"tags": [
@@ -13681,8 +14050,8 @@
"logsource.category": "create_stream_hash",
"logsource.product": "windows",
"refs": [
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
"https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_stream_hash/create_stream_hash_susp_domain_ext_combo.yml"
],
"tags": [
@@ -13716,8 +14085,8 @@
"logsource.category": "create_stream_hash",
"logsource.product": "windows",
"refs": [
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
"https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_stream_hash/create_stream_hash_susp_domain_ext_combo_med.yml"
],
"tags": [
@@ -13996,9 +14365,9 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
+ "https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/",
"https://github.com/vxunderground/VXUG-Papers/blob/751edb8d50f95bd7baa730adf2c6c3bb1b034276/The%20Persistence%20Series/Persistence%20via%20Recycle%20Bin/Persistence_via_Recycle_Bin.pdf",
"https://persistence-info.github.io/Data/recyclebin.html",
- "https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_persistence_recycle_bin.yml"
],
"tags": [
@@ -14092,9 +14461,9 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://www.lexjansen.com/sesug/1993/SESUG93035.pdf",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/4464eaf0-f34f-40d5-b970-736437a21913",
"https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760",
+ "https://www.lexjansen.com/sesug/1993/SESUG93035.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_mimikatz_printernightmare.yml"
],
"tags": [
@@ -14153,8 +14522,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/990717080805789697",
"https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
+ "https://twitter.com/pabraeken/status/990717080805789697",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_runonce_persistence.yml"
],
"tags": [
@@ -14384,8 +14753,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly",
"https://lolbas-project.github.io/lolbas/Binaries/Wsreset",
+ "https://www.bleepingcomputer.com/news/security/trickbot-uses-a-new-windows-10-uac-bypass-to-launch-quietly",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_bypass_via_wsreset.yml"
],
"tags": [
@@ -14444,8 +14813,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_stickykey_like_backdoor.yml"
],
"tags": [
@@ -14589,8 +14958,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "http://az4n6.blogspot.com/2016/02/more-on-trust-records-macros-and.html",
"https://outflank.nl/blog/2018/01/16/hunting-for-evil-detect-macros-being-executed/",
+ "http://az4n6.blogspot.com/2016/02/more-on-trust-records-macros-and.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_trust_record_modification.yml"
],
"tags": [
@@ -14614,8 +14983,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
"http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_susp_atbroker_change.yml"
],
"tags": [
@@ -14764,10 +15133,10 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://tria.ge/211119-gs7rtshcfr/behavioral2 [Lokibot sample from Nov 2021]",
- "https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass",
"https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/",
+ "https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass",
"https://github.com/hfiref0x/UACME",
+ "https://tria.ge/211119-gs7rtshcfr/behavioral2 [Lokibot sample from Nov 2021]",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml"
],
"tags": [
@@ -15066,8 +15435,8 @@
"logsource.category": "registry_delete",
"logsource.product": "windows",
"refs": [
- "https://seclists.org/fulldisclosure/2020/Mar/45",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://seclists.org/fulldisclosure/2020/Mar/45",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key.yml"
],
"tags": [
@@ -15115,11 +15484,11 @@
"logsource.category": "registry_delete",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
"https://github.com/OTRF/detection-hackathon-apt29/issues/7",
+ "https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
+ "https://docs.microsoft.com/en-us/windows/win32/shell/launch",
"https://docs.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code",
"https://threathunterplaybook.com/evals/apt29/detections/3.C.1_22A46621-7A92-48C1-81BF-B3937EB4FDC3.html",
- "https://docs.microsoft.com/en-us/windows/win32/shell/launch",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_delete/registry_delete_removal_com_hijacking_registry_key.yml"
],
"tags": [
@@ -15201,8 +15570,8 @@
"logsource.category": "registry_add",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/9",
"https://threathunterplaybook.com/evals/apt29/detections/4.B.2_59A9AC92-124D-4C4B-A6BF-3121C98677C3.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/9",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_add/registry_add_sysinternals_sdelete_registry_keys.yml"
],
"tags": [
@@ -15326,10 +15695,10 @@
"logsource.product": "windows",
"refs": [
"https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/",
- "https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line",
- "https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/",
"https://www.fortinet.com/blog/threat-research/new-netwire-rat-variant-spread-by-phishing",
+ "https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line",
"https://unit42.paloaltonetworks.com/guloader-installing-netwire-rat/",
+ "https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_add/registry_add_mal_netwire.yml"
],
"tags": [
@@ -15353,8 +15722,8 @@
"logsource.category": "registry_add",
"logsource.product": "windows",
"refs": [
- "https://persistence-info.github.io/Data/amsi.html",
"https://github.com/gtworek/PSBits/blob/8d767892f3b17eefa4d0668f5d2df78e844f01d8/FakeAMSI/FakeAMSI.c",
+ "https://persistence-info.github.io/Data/amsi.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_add/registry_add_amsi_providers_persistence.yml"
],
"tags": [
@@ -15445,9 +15814,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/",
"https://twitter.com/Hexacorn/status/991447379864932352",
"https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OSBinaries/Wab.yml",
- "http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_wab_dllpath_reg_change.yml"
],
"tags": [
@@ -15480,8 +15849,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/",
"https://docs.microsoft.com/en-us/windows/win32/shell/app-registration?redirectedfrom=MSDN",
+ "https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_app_paths.yml"
],
"tags": [
@@ -15749,8 +16118,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://support.microsoft.com/en-us/topic/information-about-the-attachment-manager-in-microsoft-windows-c48a4dcd-8de5-2af5-ee9b-cd795ae42738",
"https://www.virustotal.com/gui/file/2bcd5702a7565952c44075ac6fb946c7780526640d1264f692c7664c02c68465",
+ "https://support.microsoft.com/en-us/topic/information-about-the-attachment-manager-in-microsoft-windows-c48a4dcd-8de5-2af5-ee9b-cd795ae42738",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_policies_associations_tamper.yml"
],
"tags": [
@@ -15800,8 +16169,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentversion_nt.yml"
],
"tags": [
@@ -15825,13 +16194,13 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
- "https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
- "http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
- "https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
- "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
"http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
+ "https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
+ "http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
+ "https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
+ "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
+ "https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_terminal_server_suspicious.yml"
],
"tags": [
@@ -15880,8 +16249,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/malmoeb/status/1560536653709598721",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
+ "https://twitter.com/malmoeb/status/1560536653709598721",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_turn_on_dev_features.yml"
],
"tags": [
@@ -15906,8 +16275,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_session_manager.yml"
],
"tags": [
@@ -15941,8 +16310,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/",
"https://persistence-info.github.io/Data/wer_debugger.html",
+ "https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_hangs_debugger_persistence.yml"
],
"tags": [
@@ -15988,8 +16357,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.exploit-db.com/exploits/47696",
"http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass",
+ "https://www.exploit-db.com/exploits/47696",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_comhijack_sdclt.yml"
],
"tags": [
@@ -16054,8 +16423,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/",
"https://redcanary.com/blog/blackbyte-ransomware/?utm_source=twitter&utm_medium=social",
+ "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_blackbyte_ransomware.yml"
],
"tags": [
@@ -16202,9 +16571,9 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node.yml"
],
"tags": [
@@ -16286,8 +16655,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://support.microsoft.com/en-us/topic/microsoft-security-advisory-update-to-improve-credentials-protection-and-management-may-13-2014-93434251-04ac-b7f3-52aa-9f951c14b649",
"https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html",
+ "https://support.microsoft.com/en-us/topic/microsoft-security-advisory-update-to-improve-credentials-protection-and-management-may-13-2014-93434251-04ac-b7f3-52aa-9f951c14b649",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_wdigest_enable_uselogoncredential.yml"
],
"tags": [
@@ -16394,9 +16763,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/gtworek/PSBits/tree/master/SIP",
- "https://persistence-info.github.io/Data/codesigning.html",
"https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf",
+ "https://persistence-info.github.io/Data/codesigning.html",
+ "https://github.com/gtworek/PSBits/tree/master/SIP",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_sip_persistence.yml"
],
"tags": [
@@ -16432,8 +16801,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_classes.yml"
],
"tags": [
@@ -16605,8 +16974,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1546.015/T1546.015.md",
"https://www.youtube.com/watch?v=3gz1QmiMhss&t=1251s",
+ "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1546.015/T1546.015.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_treatas_persistence.yml"
],
"tags": [
@@ -16681,7 +17050,7 @@
}
],
"uuid": "2f78da12-f7c7-430b-8b19-a28f269b77a3",
- "value": "Disable Winevt Event Logging Via Registry"
+ "value": "Disable Windows Event Logging Via Registry"
},
{
"description": "Detects the modification of the registry to allow a driver or service to persist in Safe Mode.",
@@ -16696,8 +17065,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-34---windows-add-registry-value-to-load-service-in-safe-mode-with-network",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-33---windows-add-registry-value-to-load-service-in-safe-mode-without-network",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-34---windows-add-registry-value-to-load-service-in-safe-mode-with-network",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode.yml"
],
"tags": [
@@ -16730,8 +17099,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://labs.f-secure.com/blog/scheduled-task-tampering/",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_taskcache_entry.yml"
],
"tags": [
@@ -16814,8 +17183,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.deepinstinct.com/2021/02/16/lsass-memory-dumps-are-stealthier-than-ever-before-part-2/",
"https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/",
+ "https://www.deepinstinct.com/2021/02/16/lsass-memory-dumps-are-stealthier-than-ever-before-part-2/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_globalflags.yml"
],
"tags": [
@@ -17037,8 +17406,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/outlook/troubleshoot/security/information-about-email-security-settings",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1137/T1137.md",
+ "https://docs.microsoft.com/en-us/outlook/troubleshoot/security/information-about-email-security-settings",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_outlook_security.yml"
],
"tags": [
@@ -17073,9 +17442,9 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://persistence-info.github.io/Data/userinitmprlogonscript.html",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_common.yml"
],
"tags": [
@@ -17190,13 +17559,13 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
- "https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
- "http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
- "https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
- "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
"http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
+ "https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
+ "http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
+ "https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
+ "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
+ "https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_terminal_server_tampering.yml"
],
"tags": [
@@ -17256,8 +17625,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_office.yml"
],
"tags": [
@@ -17283,8 +17652,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node_classes.yml"
],
"tags": [
@@ -17332,8 +17701,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190",
+ "https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_cve_2022_30190_msdt_follina.yml"
],
"tags": [
@@ -17467,8 +17836,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://support.microsoft.com/en-us/topic/information-about-the-attachment-manager-in-microsoft-windows-c48a4dcd-8de5-2af5-ee9b-cd795ae42738",
"https://www.virustotal.com/gui/file/2bcd5702a7565952c44075ac6fb946c7780526640d1264f692c7664c02c68465",
+ "https://support.microsoft.com/en-us/topic/information-about-the-attachment-manager-in-microsoft-windows-c48a4dcd-8de5-2af5-ee9b-cd795ae42738",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_policies_attachments_tamper.yml"
],
"tags": [
@@ -17552,8 +17921,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_winsock2.yml"
],
"tags": [
@@ -17784,8 +18153,8 @@
"refs": [
"https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
- "https://admx.help/?Category=Windows_7_2008R2&Policy=Microsoft.Policies.WindowsDefender::SpyNetReporting",
"https://gist.github.com/anadr/7465a9fde63d41341136949f14c21105",
+ "https://admx.help/?Category=Windows_7_2008R2&Policy=Microsoft.Policies.WindowsDefender::SpyNetReporting",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_windows_defender_tamper.yml"
],
"tags": [
@@ -17879,8 +18248,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/",
"https://persistence-info.github.io/Data/hhctrl.html",
+ "https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_hhctrl_persistence.yml"
],
"tags": [
@@ -18099,8 +18468,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-4---add-domain-to-trusted-sites-zone",
"https://docs.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-4---add-domain-to-trusted-sites-zone",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_change_security_zones.yml"
],
"tags": [
@@ -18228,8 +18597,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node_currentversion.yml"
],
"tags": [
@@ -18279,8 +18648,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentcontrolset.yml"
],
"tags": [
@@ -18337,8 +18706,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging",
"https://persistence-info.github.io/Data/aedebug.html",
+ "https://docs.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_aedebug_persistence.yml"
],
"tags": [
@@ -18387,8 +18756,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_system_scripts.yml"
],
"tags": [
@@ -18399,6 +18768,31 @@
"uuid": "e7a2fd40-3ae1-4a85-bf80-15cf624fb1b1",
"value": "System Scripts Autorun Keys Modification"
},
+ {
+ "description": "Detect activation of DisableRestrictedAdmin to desable RestrictedAdmin mode.\nRestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop.\nThis prevents your credentials from being harvested during the initial connection process if the remote server has been compromise\n",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/13",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "registry_set_lsa_disablerestrictedadmin.yml",
+ "level": "high",
+ "logsource.category": "registry_set",
+ "logsource.product": "windows",
+ "refs": [
+ "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
+ "https://github.com/redcanaryco/atomic-red-team/blob/a8e3cf63e97b973a25903d3df9fd55da6252e564/atomics/T1112/T1112.md",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_lsa_disablerestrictedadmin.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.t1112"
+ ]
+ },
+ "uuid": "d6ce7ebd-260b-4323-9768-a9631c8d4db2",
+ "value": "Disabled RestrictedAdminMode For RDS"
+ },
{
"description": "Detects the setting of the \"DumpType\" registry value to \"2\" which stands for a \"Full Dump\". Technique such as LSASS Shtinkering requires this value to be \"2\" in order to dump LSASS.",
"meta": {
@@ -18412,8 +18806,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
+ "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://learn.microsoft.com/en-us/windows/win32/wer/collecting-user-mode-dumps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_lsass_usermode_dumping.yml"
],
@@ -18447,9 +18841,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_dhcp_calloutdll.yml"
],
"tags": [
@@ -18507,9 +18901,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
- "https://devblogs.microsoft.com/oldnewthing/20100312-01/?p=14623",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-7---bypass-uac-using-sdclt-delegateexecute",
+ "https://devblogs.microsoft.com/oldnewthing/20100312-01/?p=14623",
+ "https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_bypass_uac_using_delegateexecute.yml"
],
"tags": [
@@ -18543,8 +18937,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-5---javascript-in-registry",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-4---add-domain-to-trusted-sites-zone",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-5---javascript-in-registry",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_ie.yml"
],
"tags": [
@@ -18599,9 +18993,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://www.slideshare.net/JamieWilliams130/started-from-the-bottom-exploiting-data-sources-to-uncover-attck-behaviors",
"https://twitter.com/jamieantisocial/status/1304520651248668673",
"https://www.sans.org/cyber-security-summit/archives",
- "https://www.slideshare.net/JamieWilliams130/started-from-the-bottom-exploiting-data-sources-to-uncover-attck-behaviors",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_enabling_cor_profiler_env_variables.yml"
],
"tags": [
@@ -18953,8 +19347,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/1",
"https://threathunterplaybook.com/evals/apt29/detections/1.A.1_DFD6A782-9BDB-4550-AB6B-525E825B095E.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_new_application_appcompat.yml"
],
"tags": [
@@ -19012,8 +19406,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://jstnk9.github.io/jstnk9/research/InstallScreenSaver-SCR-files",
"https://twitter.com/pabraeken/status/998627081360695297",
+ "https://jstnk9.github.io/jstnk9/research/InstallScreenSaver-SCR-files",
"https://twitter.com/VakninHai/status/1517027824984547329",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml"
],
@@ -19123,9 +19517,9 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentversion.yml"
],
"tags": [
@@ -19183,8 +19577,8 @@
"logsource.product": "windows",
"refs": [
"https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=TrojanSpy%3aMSIL%2fHakey.A",
- "https://unit42.paloaltonetworks.com/ransomware-families/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-1---modify-registry-of-current-user-profile---cmd",
+ "https://unit42.paloaltonetworks.com/ransomware-families/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_hidden_extention.yml"
],
"tags": [
@@ -19257,8 +19651,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-9---bypass-uac-using-silentcleanup-task",
"https://www.reddit.com/r/hacking/comments/ajtrws/bypassing_highest_uac_level_windows_810/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-9---bypass-uac-using-silentcleanup-task",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_bypass_uac_using_silentcleanup_task.yml"
],
"tags": [
@@ -19292,8 +19686,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
"https://yoroi.company/research/cyber-criminal-espionage-operation-insists-on-italian-manufacturing/",
+ "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_microsoft_office_security_features.yml"
],
@@ -19342,8 +19736,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/S3cur3Th1sSh1t/OffensiveVBA/blob/28cc6a2802d8176195ac19b3c8e9a749009a82a3/src/AMSIbypasses.vba",
"https://admx.help/?Category=Office2016&Policy=office16.Office.Microsoft.Policies.Windows::L_MacroRuntimeScanScope",
+ "https://github.com/S3cur3Th1sSh1t/OffensiveVBA/blob/28cc6a2802d8176195ac19b3c8e9a749009a82a3/src/AMSIbypasses.vba",
"https://www.microsoft.com/en-us/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_macroruntimescanscope.yml"
],
@@ -19415,6 +19809,40 @@
"uuid": "3ae1a046-f7db-439d-b7ce-b8b366b81fa6",
"value": "Disable Windows Security Center Notifications"
},
+ {
+ "description": "Detect potential persistence via the creation of an excel add-in (XLL) file to make it run automatically when Excel is started.",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/15",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "registry_set_persistance_xll.yml",
+ "level": "high",
+ "logsource.category": "registry_set",
+ "logsource.product": "windows",
+ "refs": [
+ "https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence",
+ "https://github.com/redcanaryco/atomic-red-team/blob/4ae9580a1a8772db87a1b6cdb0d03e5af231e966/atomics/T1137.006/T1137.006.md",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistance_xll.yml"
+ ],
+ "tags": [
+ "attack.persistence",
+ "attack.t1137.006"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "34f1d81d-fe88-4f97-bd3b-a3164536255d",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "961e33d1-4f86-4fcf-80ab-930a708b2f82",
+ "value": "Potential Persistence Via Excel Add-in - Registry"
+ },
{
"description": "Detects when the \"index\" value of a scheduled task is modified from the registry\nWhich effectively hides it from any tooling such as \"schtasks /query\" (Read the referenced link for more information about the effects of this technique)\n",
"meta": {
@@ -19449,7 +19877,7 @@
"value": "Hide Schedule Task Via Index Value Tamper"
},
{
- "description": "Detects tampering of autologger trace sessions which is a technique used by attackers to disable logging",
+ "description": "Detects tampering with autologger trace sessions which is a technique used by attackers to disable logging",
"meta": {
"author": "Nasreddine Bencherchali",
"creation_date": "2022/08/01",
@@ -19461,8 +19889,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/MichalKoczwara/status/1553634816016498688",
"https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
+ "https://twitter.com/MichalKoczwara/status/1553634816016498688",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_autologger_sessions.yml"
],
@@ -19471,7 +19899,7 @@
]
},
"uuid": "f37b4bce-49d0-4087-9f5b-58bffda77316",
- "value": "AutoLogger Sessions Tamper"
+ "value": "Potential AutoLogger Sessions Tampering"
},
{
"description": "Potential adversaries stopping ETW providers recording loaded .NET assemblies.",
@@ -19486,17 +19914,17 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
- "https://blog.xpnsec.com/hiding-your-dotnet-complus-etwenabled/",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
"https://twitter.com/_xpn_/status/1268712093928378368",
- "http://managed670.rssing.com/chan-5590147/all_p1.html",
- "https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
"https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
- "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
+ "http://managed670.rssing.com/chan-5590147/all_p1.html",
+ "https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
"https://bunnyinside.com/?term=f71e8cb9c76a",
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://blog.xpnsec.com/hiding-your-dotnet-complus-etwenabled/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_dot_net_etw_tamper.yml"
],
"tags": [
@@ -19565,8 +19993,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_internet_explorer.yml"
],
"tags": [
@@ -19590,8 +20018,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
"https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
+ "https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_new_network_provider.yml"
],
"tags": [
@@ -19624,9 +20052,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md",
"https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions",
- "https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_function_user.yml"
],
"tags": [
@@ -19676,8 +20104,8 @@
"logsource.product": "windows",
"refs": [
"https://persistence-info.github.io/Data/ifilters.html",
- "https://github.com/gtworek/PSBits/tree/master/IFilter",
"https://twitter.com/0gtweet/status/1468548924600459267",
+ "https://github.com/gtworek/PSBits/tree/master/IFilter",
"https://github.com/gtworek/PSBits/blob/8d767892f3b17eefa4d0668f5d2df78e844f01d8/IFilter/Dll.cpp#L281-L308",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_ifilter.yml"
],
@@ -19750,8 +20178,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md#atomic-test-4---tinyturla-backdoor-service-w64time",
"https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md#atomic-test-4---tinyturla-backdoor-service-w64time",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_servicedll_hijack.yml"
],
"tags": [
@@ -19966,10 +20394,10 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/bohops/WSMan-WinRM",
- "https://twitter.com/chadtilbury/status/1275851297770610688",
- "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
"https://docs.microsoft.com/en-us/windows/win32/winrm/windows-remote-management-architecture",
+ "https://github.com/bohops/WSMan-WinRM",
+ "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
+ "https://twitter.com/chadtilbury/status/1275851297770610688",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_wsman_provider_image_load.yml"
],
"tags": [
@@ -20115,8 +20543,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/rbmaslen/status/1321859647091970051",
"https://twitter.com/tifkin_/status/1321916444557365248",
+ "https://twitter.com/rbmaslen/status/1321859647091970051",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_pcre_net_load.yml"
],
"tags": [
@@ -20250,8 +20678,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406",
+ "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_pingback_backdoor.yml"
],
"tags": [
@@ -20372,11 +20800,11 @@
"logsource.product": "windows",
"refs": [
"http://remoteawesomethoughts.blogspot.com/2019/05/windows-10-task-schedulerservice.html",
- "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
"https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
"https://decoded.avast.io/martinchlumecky/png-steganography/",
"https://github.com/Wh04m1001/SysmonEoP",
+ "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_non_existent_dlls.yml"
],
"tags": [
@@ -20491,8 +20919,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/",
"http://www.windowexe.com/bbs/board.php?q=jsschhlp-exe-c-program-files-common-files-justsystem-jsschhlp-jsschhlp",
+ "https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_jsschhlp.yml"
],
"tags": [
@@ -20577,10 +21005,10 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://blog.cyble.com/2022/07/21/qakbot-resurfaces-with-new-playbook/",
- "https://hijacklibs.net/",
"https://github.com/XForceIR/SideLoadHunter/blob/cc7ef2e5d8908279b0c4cee4e8b6f85f7b8eed52/SideLoads/README.md",
"https://blog.cyble.com/2022/07/27/targeted-attacks-being-carried-out-via-dll-sideloading/",
+ "https://hijacklibs.net/",
+ "https://blog.cyble.com/2022/07/21/qakbot-resurfaces-with-new-playbook/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_from_non_system_location.yml"
],
"tags": [
@@ -20673,8 +21101,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6",
"https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpapiset-minidumpwritedump",
+ "https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6",
"https://www.pinvoke.net/default.aspx/dbghelp/MiniDumpWriteDump.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_susp_dbghelp_dbgcore_load.yml"
],
@@ -20824,10 +21252,10 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
- "https://thewover.github.io/Introducing-Donut/",
- "https://github.com/tyranid/DotNetToJScript",
"https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
+ "https://thewover.github.io/Introducing-Donut/",
+ "https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
+ "https://github.com/tyranid/DotNetToJScript",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_susp_script_dotnet_clr_dll_load.yml"
],
"tags": [
@@ -20999,8 +21427,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://decoded.avast.io/martinchlumecky/png-steganography/",
+ "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_scm.yml"
],
"tags": [
@@ -21292,9 +21720,9 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html",
- "https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/",
"https://twitter.com/HunterPlaybook/status/1301207718355759107",
+ "https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/",
+ "https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_scrcons_imageload_wmi_scripteventconsumer.yml"
],
"tags": [
@@ -21449,8 +21877,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/hhlxf/PrintNightmare",
"https://github.com/ly4k/SpoolFool",
+ "https://github.com/hhlxf/PrintNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_spoolsv_dll_load.yml"
],
"tags": [
@@ -21514,9 +21942,9 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password",
"https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-creduipromptforcredentialsa",
"https://securitydatasets.com/notebooks/small/windows/06_credential_access/SDWIN-201020013208.html",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_uipromptforcreds_dlls.yml"
],
"tags": [
@@ -21541,8 +21969,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mattifestation/status/1196390321783025666",
"https://twitter.com/oulusoyum/status/1191329746069655553",
+ "https://twitter.com/mattifestation/status/1196390321783025666",
"https://lolbas-project.github.io/lolbas/Binaries/Tttracer/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_tttracer_mod_load.yml"
],
@@ -21684,8 +22112,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/RiccardoAncarani/LiquidSnake",
- "https://github.com/Neo23x0/signature-base/blob/615bf1f6bac3c1bdc417025c40c073e6c2771a76/yara/gen_susp_lnk_files.yar#L19",
"https://in.security/an-intro-into-abusing-and-identifying-wmi-event-subscriptions-for-persistence/",
+ "https://github.com/Neo23x0/signature-base/blob/615bf1f6bac3c1bdc417025c40c073e6c2771a76/yara/gen_susp_lnk_files.yar#L19",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml"
],
"tags": [
@@ -21718,8 +22146,8 @@
"logsource.category": "ps_classic_start",
"logsource.product": "windows",
"refs": [
- "https://nmap.org/ncat/",
"https://github.com/besimorhino/powercat",
+ "https://nmap.org/ncat/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_powercat.yml"
],
@@ -21754,8 +22182,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/bohops/WSMan-WinRM",
- "https://twitter.com/chadtilbury/status/1275851297770610688",
"https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
+ "https://twitter.com/chadtilbury/status/1275851297770610688",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_wsman_com_provider_no_powershell.yml"
],
"tags": [
@@ -21906,8 +22334,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -22362,8 +22790,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/4.A.3_09F29912-8E93-461E-9E89-3F06F6763383.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/8",
+ "https://threathunterplaybook.com/evals/apt29/detections/4.A.3_09F29912-8E93-461E-9E89-3F06F6763383.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_decompress_commands.yml"
],
"tags": [
@@ -22532,8 +22960,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
"https://github.com/MichaelGrafnetter/DSInternals/blob/7ba59c12ee9a1cb430d7dc186a3366842dd612c8/Documentation/PowerShell/Get-ADDBAccount.md",
+ "https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_get_addbaccount.yml"
],
"tags": [
@@ -22566,8 +22994,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://nmap.org/ncat/",
"https://github.com/besimorhino/powercat",
+ "https://nmap.org/ncat/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_powercat.yml"
],
@@ -23108,8 +23536,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -23343,8 +23771,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/",
"https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell",
+ "https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_web_request_cmd_and_cmdlets.yml"
],
"tags": [
@@ -23478,8 +23906,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-10---powershell-invoke-downloadcradle",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-pssession?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-10---powershell-invoke-downloadcradle",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_remote_session_creation.yml"
],
"tags": [
@@ -23602,9 +24030,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt",
"https://www.trendmicro.com/en_id/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_msxml_com.yml"
],
"tags": [
@@ -23742,9 +24170,9 @@
"logsource.product": "windows",
"refs": [
"https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon",
+ "https://adsecurity.org/?p=2277",
"https://thedfirreport.com/2020/10/08/ryuks-return",
"https://powersploit.readthedocs.io/en/stable/Recon/README",
- "https://adsecurity.org/?p=2277",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_powerview_malicious_commandlets.yml"
],
"tags": [
@@ -23819,8 +24247,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/948061991012327424",
"https://lolbas-project.github.io/lolbas/Scripts/Cl_invocation/",
+ "https://twitter.com/bohops/status/948061991012327424",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_invocation_lolscript.yml"
],
"tags": [
@@ -23886,9 +24314,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048.003/T1048.003.md#atomic-test-5---exfiltration-over-alternative-protocol---smtp",
- "https://www.ietf.org/rfc/rfc2821.txt",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/send-mailmessage?view=powershell-7.2",
+ "https://www.ietf.org/rfc/rfc2821.txt",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048.003/T1048.003.md#atomic-test-5---exfiltration-over-alternative-protocol---smtp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_send_mailmessage.yml"
],
"tags": [
@@ -23921,9 +24349,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://www.cisa.gov/uscert/sites/default/files/publications/aa22-320a_joint_csa_iranian_government-sponsored_apt_actors_compromise_federal%20network_deploy_crypto%20miner_credential_harvester.pdf",
"https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/",
"http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
- "https://www.cisa.gov/uscert/sites/default/files/publications/aa22-320a_joint_csa_iranian_government-sponsored_apt_actors_compromise_federal%20network_deploy_crypto%20miner_credential_harvester.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_computer_discovery_get_adcomputer.yml"
],
"tags": [
@@ -23948,8 +24376,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://twitter.com/Alh4zr3d/status/1580925761996828672",
+ "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_using_set_service_to_hide_services.yml"
],
"tags": [
@@ -24099,8 +24527,8 @@
"refs": [
"https://www.tutorialspoint.com/how-to-get-windows-firewall-profile-settings-using-powershell",
"http://powershellhelp.space/commands/set-netfirewallrule-psv5.php",
- "https://www.elastic.co/guide/en/security/current/windows-firewall-disabled-via-powershell.html",
"https://docs.microsoft.com/en-us/powershell/module/netsecurity/set-netfirewallprofile?view=windowsserver2019-ps",
+ "https://www.elastic.co/guide/en/security/current/windows-firewall-disabled-via-powershell.html",
"http://woshub.com/manage-windows-firewall-powershell/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled.yml"
],
@@ -24134,8 +24562,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.accountmanagement?view=dotnet-plat-ext-6.0",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1136.002/T1136.002.md#atomic-test-3---create-a-new-domain-account-using-powershell",
+ "https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.accountmanagement?view=dotnet-plat-ext-6.0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_directoryservices_accountmanagement.yml"
],
"tags": [
@@ -24155,6 +24583,29 @@
"uuid": "b29a93fb-087c-4b5b-a84d-ee3309e69d08",
"value": "Manipulation of User Computer or Group Security Principals Across AD"
},
+ {
+ "description": "Detects potential exfiltration attempt via audio file using PowerShell",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/16",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "posh_ps_audio_exfiltration.yml",
+ "level": "medium",
+ "logsource.category": "ps_script",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/gtworek/PSBits/blob/e97cbbb173b31cbc4d37244d3412de0a114dacfb/NoDLP/bin2wav.ps1",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_audio_exfiltration.yml"
+ ],
+ "tags": [
+ "attack.exfiltration"
+ ]
+ },
+ "uuid": "e4f93c99-396f-47c8-bb0f-201b1fa69034",
+ "value": "Potential Data Exfiltration Via Audio File"
+ },
{
"description": "Detects scripts or commands that disabled the Powershell command history by removing psreadline module",
"meta": {
@@ -24259,9 +24710,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://youtu.be/5mqid-7zp8k?t=2481",
"https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
- "https://youtu.be/5mqid-7zp8k?t=2481",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_mailboxexport_share.yml"
],
@@ -24375,8 +24826,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1573/T1573.md#atomic-test-1---openssl-c2",
"https://medium.com/walmartglobaltech/openssl-server-reverse-shell-from-windows-client-aee2dbfa0926",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1573/T1573.md#atomic-test-1---openssl-c2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_ssl_keyword.yml"
],
"tags": [
@@ -24531,9 +24982,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=2604",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-7.1",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.1",
+ "https://adsecurity.org/?p=2604",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_set_policies_to_unsecure_level.yml"
],
"tags": [
@@ -24590,8 +25041,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/unblock-file?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-3---remove-the-zoneidentifier-alternate-data-stream",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/unblock-file?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_unblock_file.yml"
],
"tags": [
@@ -24989,8 +25440,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Remove-Item?view=powershell-5.1&viewFallbackFrom=powershell-7",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.004/T1070.004.md",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Remove-Item?view=powershell-5.1&viewFallbackFrom=powershell-7",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_remove_item_path.yml"
],
"tags": [
@@ -25023,8 +25474,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/JohnLaTwC/status/850381440629981184",
"https://t.co/ezOTGy1a1G",
+ "https://twitter.com/JohnLaTwC/status/850381440629981184",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_prompt_credentials.yml"
],
"tags": [
@@ -25058,8 +25509,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/invoke-command?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.006/T1021.006.md#atomic-test-2---invoke-command",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/invoke-command?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_invoke_command_remote.yml"
],
"tags": [
@@ -25250,8 +25701,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://bi-zone.medium.com/from-pentest-to-apt-attack-cybercriminal-group-fin7-disguises-its-malware-as-an-ethical-hackers-c23c9a75e319",
"https://github.com/sense-of-security/ADRecon/blob/11881a24e9c8b207f31b56846809ce1fb189bcc9/ADRecon.ps1",
+ "https://bi-zone.medium.com/from-pentest-to-apt-attack-cybercriminal-group-fin7-disguises-its-malware-as-an-ethical-hackers-c23c9a75e319",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_adrecon_execution.yml"
],
"tags": [
@@ -25285,8 +25736,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/grouppolicy/get-gpo?view=windowsserver2022-ps",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
+ "https://docs.microsoft.com/en-us/powershell/module/grouppolicy/get-gpo?view=windowsserver2022-ps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_get_gpo.yml"
],
"tags": [
@@ -25494,7 +25945,7 @@
{
"description": "Detects powershell scripts attempting to disable scheduled scanning and other parts of windows defender atp or set default actions to allow.",
"meta": {
- "author": "frack113, elhoim",
+ "author": "frack113, elhoim, Tim Shelton (fps, alias support)",
"creation_date": "2022/01/16",
"falsepositive": [
"Legitimate PowerShell scripts"
@@ -25766,8 +26217,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "http://www.powertheshell.com/ntfsstreams/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.004/T1564.004.md",
+ "http://www.powertheshell.com/ntfsstreams/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_ntfs_ads_access.yml"
],
"tags": [
@@ -25809,8 +26260,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://shellgeek.com/useraccountcontrol-flags-to-manipulate-properties/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.002/T1069.002.md#atomic-test-11---get-aduser-enumeration-using-useraccountcontrol-flags-as-rep-roasting",
+ "https://shellgeek.com/useraccountcontrol-flags-to-manipulate-properties/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_as_rep_roasting.yml"
],
"tags": [
@@ -25834,8 +26285,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-4---powershell-cmdlet-scheduled-task",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-6---wmi-invoke-cimmethod-scheduled-task",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-4---powershell-cmdlet-scheduled-task",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cmdlet_scheduled_task.yml"
],
"tags": [
@@ -25868,8 +26319,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://www.offensive-security.com/metasploit-unleashed/timestomp/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.006/T1070.006.md",
+ "https://www.offensive-security.com/metasploit-unleashed/timestomp/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_timestomp.yml"
],
"tags": [
@@ -25935,8 +26386,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.006/T1564.006.md#atomic-test-3---create-and-start-hyper-v-virtual-machine",
"https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/enable-hyper-v",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.006/T1564.006.md#atomic-test-3---create-and-start-hyper-v-virtual-machine",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_hyper_v_condlet.yml"
],
"tags": [
@@ -25969,8 +26420,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.011/T1574.011.md#atomic-test-1---service-registry-permissions-weakness",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_get_acl_service.yml"
],
"tags": [
@@ -26028,8 +26479,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.006/T1021.006.md#atomic-test-1---enable-windows-remote-management",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_enable_psremoting.yml"
],
"tags": [
@@ -26268,8 +26719,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-2---mount-an-iso-image-and-run-executable-from-the-iso",
"https://docs.microsoft.com/en-us/powershell/module/storage/mount-diskimage?view=windowsserver2022-ps",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-2---mount-an-iso-image-and-run-executable-from-the-iso",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_run_from_mount_diskimage.yml"
],
"tags": [
@@ -26385,8 +26836,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/948061991012327424",
"https://lolbas-project.github.io/lolbas/Scripts/Cl_invocation/",
+ "https://twitter.com/bohops/status/948061991012327424",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_invocation_lolscript_count.yml"
],
"tags": [
@@ -26477,8 +26928,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://twitter.com/Alh4zr3d/status/1580925761996828672",
+ "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_service_dacl_modification_set_service.yml"
],
"tags": [
@@ -26571,8 +27022,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
"https://twitter.com/pabraeken/status/995111125447577600",
+ "https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_mutexverifiers_lolscript.yml"
],
"tags": [
@@ -26629,8 +27080,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/harleyQu1nn/AggressorScripts",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1518/T1518.md",
+ "https://github.com/harleyQu1nn/AggressorScripts",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_software_discovery.yml"
],
"tags": [
@@ -26713,8 +27164,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-1---mount-iso-image",
"https://docs.microsoft.com/en-us/powershell/module/storage/mount-diskimage?view=windowsserver2022-ps",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-1---mount-iso-image",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_mount_diskimage.yml"
],
"tags": [
@@ -26747,10 +27198,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://github.com/hlldz/Phant0m/blob/30c2935d8cf4aafda17ee2fab7cd0c4aa9a607c2/old/Invoke-Phant0m.ps1",
"https://gist.github.com/MHaggis/0dbe00ad401daa7137c81c99c268cfb7",
"https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/CodeExecution/Invoke-ReflectivePEInjection.ps1",
"https://posts.specterops.io/entering-a-covenant-net-command-and-control-e11038bcf462",
- "https://github.com/hlldz/Phant0m/blob/30c2935d8cf4aafda17ee2fab7cd0c4aa9a607c2/old/Invoke-Phant0m.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_keywords.yml"
],
"tags": [
@@ -26874,8 +27325,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1036.003/T1036.003.md",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_start_process.yml"
],
"tags": [
@@ -27143,9 +27594,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://docs.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps",
"https://learn.microsoft.com/en-us/windows/win32/projfs/enabling-windows-projected-file-system",
- "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_enable_windowsoptionalfeature.yml"
],
"tags": [
@@ -27168,10 +27619,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/d4486b63512755316625230e0c9c81655093be93876e0d80732e7eeaf7d83476/content",
- "https://www.virustotal.com/gui/file/720a7ee9f2178c70501d7e3f4bcc28a4f456e200486dbd401b25af6da3b4da62/content",
"https://learn.microsoft.com/en-us/dotnet/api/system.windows.input.keyboard.iskeydown?view=windowsdesktop-7.0",
"https://twitter.com/ScumBots/status/1610626724257046529",
+ "https://www.virustotal.com/gui/file/720a7ee9f2178c70501d7e3f4bcc28a4f456e200486dbd401b25af6da3b4da62/content",
+ "https://www.virustotal.com/gui/file/d4486b63512755316625230e0c9c81655093be93876e0d80732e7eeaf7d83476/content",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_keylogger_activity.yml"
],
"tags": [
@@ -27196,8 +27647,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1057/T1057.md#atomic-test-3---process-discovery---get-process",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-7",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1057/T1057.md#atomic-test-3---process-discovery---get-process",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_get_process.yml"
],
"tags": [
@@ -27350,19 +27801,20 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/samratashok/nishang",
- "https://github.com/calebstewart/CVE-2021-1675",
- "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
- "https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
- "https://adsecurity.org/?p=2921",
- "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://adsecurity.org/?p=2921",
"https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
"https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/calebstewart/CVE-2021-1675",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://github.com/samratashok/nishang",
+ "https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
"https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_malicious_commandlets.yml"
],
"tags": [
@@ -27466,9 +27918,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://stefanos.cloud/blog/kb/how-to-clear-the-powershell-command-history/",
"https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics",
"https://www.shellhacks.com/clear-history-powershell/",
- "https://stefanos.cloud/blog/kb/how-to-clear-the-powershell-command-history/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_clearing_windows_console_history.yml"
],
"tags": [
@@ -27609,8 +28061,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=41",
+ "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
"https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_x509enrollment.yml"
],
@@ -27773,8 +28225,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048/T1048.md#atomic-test-3---dnsexfiltration-doh",
"https://github.com/Arno0x/DNSExfiltrator",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048/T1048.md#atomic-test-3---dnsexfiltration-doh",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_invoke_dnsexfiltration.yml"
],
"tags": [
@@ -27901,9 +28353,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1020/T1020.md",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1020/T1020.md",
+ "https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_upload.yml"
],
"tags": [
@@ -28027,8 +28479,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
"https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_win32_shadowcopy_deletion.yml"
],
"tags": [
@@ -28221,8 +28673,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
"https://twitter.com/pabraeken/status/995111125447577600",
+ "https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_mutexverifiers_lolscript_count.yml"
],
"tags": [
@@ -28243,7 +28695,7 @@
"value": "Execution via CL_Mutexverifiers.ps1 (2 Lines)"
},
{
- "description": "Raw disk access using illegitimate tools, possible defence evasion",
+ "description": "Detects raw disk access using uncommon tools, which could indicate possible defense evasion attempts",
"meta": {
"author": "Teymur Kheirkhabarov, oscd.community",
"creation_date": "2019/10/22",
@@ -28273,7 +28725,7 @@
}
],
"uuid": "db809f10-56ce-4420-8c86-d6a7d793c79c",
- "value": "Raw Disk Access Using Illegitimate Tools"
+ "value": "Potential Defense Evasion Via Raw Disk Access By Uncommon Tools"
},
{
"description": "Detects a possible remote threat creation with certain characteristics which are typical for Cobalt Strike beacons",
@@ -28288,8 +28740,8 @@
"logsource.category": "create_remote_thread",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f",
"https://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/",
+ "https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_remote_thread/create_remote_thread_win_cobaltstrike_process_injection.yml"
],
"tags": [
@@ -28498,9 +28950,9 @@
"logsource.category": "create_remote_thread",
"logsource.product": "windows",
"refs": [
- "https://github.com/GhostPack/KeeThief",
- "https://github.com/denandz/KeeFarce",
"https://www.cisa.gov/uscert/ncas/alerts/aa20-259a",
+ "https://github.com/denandz/KeeFarce",
+ "https://github.com/GhostPack/KeeThief",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_remote_thread/create_remote_thread_win_password_dumper_keepass.yml"
],
"tags": [
@@ -28533,8 +28985,8 @@
"logsource.category": "create_remote_thread",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1090588499517079552",
"https://github.com/mdsecactivebreach/CACTUSTORCH",
+ "https://twitter.com/SBousseaden/status/1090588499517079552",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_remote_thread/create_remote_thread_win_cactustorch.yml"
],
"tags": [
@@ -28836,11 +29288,11 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427/details",
- "https://github.com/fengjixuchui/gdrv-loader",
"https://www.virustotal.com/gui/file/cfc5c585dd4e592dd1a08887ded28b92d9a5820587b6f4f8fa4f56d60289259b/details",
"https://medium.com/@fsx30/weaponizing-vulnerable-driver-for-privilege-escalation-gigabyte-edition-e73ee523598b",
+ "https://github.com/fengjixuchui/gdrv-loader",
"https://twitter.com/malmoeb/status/1551449425842786306",
+ "https://www.virustotal.com/gui/file/31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427/details",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_gigabyte_driver.yml"
],
"tags": [
@@ -28889,18 +29341,18 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/jbaines-r7/dellicious",
- "https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/",
- "https://github.com/Chigusa0w0/AsusDriversPrivEscala",
- "https://github.com/CaledoniaProject/drivers-binaries",
"https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37969",
- "https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
+ "https://github.com/CaledoniaProject/drivers-binaries",
"https://eclypsium.com/2019/11/12/mother-of-all-drivers/",
- "https://github.com/namazso/physmem_drivers",
+ "https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/",
"https://github.com/stong/CVE-2020-15368",
+ "https://github.com/Chigusa0w0/AsusDriversPrivEscala",
+ "https://github.com/namazso/physmem_drivers",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
+ "https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
+ "https://github.com/jbaines-r7/dellicious",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_drivers_names.yml"
],
"tags": [
@@ -29035,22 +29487,22 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/jbaines-r7/dellicious",
- "https://github.com/tandasat/ExploitCapcom",
- "https://www.rapid7.com/db/modules/exploit/windows/local/razer_zwopenprocess/",
- "https://github.com/CaledoniaProject/drivers-binaries",
- "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
- "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/DRIVER7.md",
- "https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
"https://www.unknowncheats.me/forum/downloads.php?do=file&id=25444",
- "https://www.unknowncheats.me/forum/downloads.php?do=file&id=21780",
- "https://www.unknowncheats.me/forum/anti-cheat-bypass/334557-vulnerable-driver-megathread.html",
- "https://github.com/namazso/physmem_drivers",
+ "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
"https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/ATSZIO.md",
- "https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part",
+ "https://github.com/CaledoniaProject/drivers-binaries",
+ "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/DRIVER7.md",
+ "https://www.unknowncheats.me/forum/anti-cheat-bypass/334557-vulnerable-driver-megathread.html",
+ "https://www.unknowncheats.me/forum/downloads.php?do=file&id=21780",
"https://github.com/stong/CVE-2020-15368",
+ "https://www.rapid7.com/db/modules/exploit/windows/local/razer_zwopenprocess/",
+ "https://github.com/tandasat/ExploitCapcom",
+ "https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part",
+ "https://github.com/namazso/physmem_drivers",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
+ "https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
+ "https://github.com/jbaines-r7/dellicious",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_drivers.yml"
],
"tags": [
@@ -29202,8 +29654,8 @@
"logsource.product": "windows",
"refs": [
"https://systeminformer.sourceforge.io/",
- "https://processhacker.sourceforge.io/",
"https://github.com/winsiderss/systeminformer",
+ "https://processhacker.sourceforge.io/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_process_hacker.yml"
],
"tags": [
@@ -29237,8 +29689,8 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/6a4875ae86131a594019dec4abd46ac6ba47e57a88287b814d07d929858fe3e5/details",
"https://decoded.avast.io/janvojtesek/the-return-of-candiru-zero-days-in-the-middle-east/",
+ "https://www.virustotal.com/gui/file/6a4875ae86131a594019dec4abd46ac6ba47e57a88287b814d07d929858fe3e5/details",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_hw_driver.yml"
],
"tags": [
@@ -29262,8 +29714,8 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/alfarom256/CVE-2022-3699/",
"https://support.lenovo.com/de/en/product_security/ps500533-lenovo-diagnostics-vulnerabilities",
+ "https://github.com/alfarom256/CVE-2022-3699/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_lenovo_driver.yml"
],
"tags": [
@@ -29332,9 +29784,9 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/M_haggis/status/900741347035889665",
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1",
"https://twitter.com/M_haggis/status/1032799638213066752",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1",
+ "https://twitter.com/M_haggis/status/900741347035889665",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_binary_github_com.yml"
],
"tags": [
@@ -29376,8 +29828,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://pypi.org/project/scapy/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-4---port-scan-using-python",
+ "https://pypi.org/project/scapy/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_python.yml"
],
"tags": [
@@ -29428,9 +29880,9 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://blog.bushidotoken.net/2021/04/dead-drop-resolvers-espionage-inspired.html",
"https://content.fireeye.com/apt-41/rpt-apt41",
"https://securelist.com/the-tetrade-brazilian-banking-malware/97779/",
+ "https://blog.bushidotoken.net/2021/04/dead-drop-resolvers-espionage-inspired.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_dead_drop_resolvers.yml"
],
"tags": [
@@ -29775,8 +30227,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://www.mandiant.com/resources/bypassing-network-restrictions-through-rdp-tunneling",
"https://twitter.com/tekdefense/status/1519711183162556416?s=12&t=OTsHCBkQOTNs1k3USz65Zg",
+ "https://www.mandiant.com/resources/bypassing-network-restrictions-through-rdp-tunneling",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_rdp_to_http.yml"
],
"tags": [
@@ -29880,8 +30332,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048.003/T1048.003.md#atomic-test-5---exfiltration-over-alternative-protocol---smtp",
"https://www.ietf.org/rfc/rfc2821.txt",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048.003/T1048.003.md#atomic-test-5---exfiltration-over-alternative-protocol---smtp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_susp_outbound_smtp_connections.yml"
],
"tags": [
@@ -29914,10 +30366,10 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/M_haggis/status/900741347035889665",
"https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://twitter.com/M_haggis/status/1032799638213066752",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
+ "https://twitter.com/M_haggis/status/900741347035889665",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_binary_susp_com.yml"
],
"tags": [
@@ -30303,8 +30755,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/child-processes/",
"https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
+ "https://redcanary.com/blog/child-processes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_dllhost_net_connections.yml"
],
"tags": [
@@ -30379,8 +30831,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2019/07/18/a-new-equation-editor-exploit-goes-commercial-as-maldoc-attacks-using-it-spike/",
"https://twitter.com/forensicitguy/status/1513538712986079238",
+ "https://news.sophos.com/en-us/2019/07/18/a-new-equation-editor-exploit-goes-commercial-as-maldoc-attacks-using-it-spike/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_eqnedt.yml"
],
"tags": [
@@ -30413,8 +30865,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/7e906adc-9d11-447f-8641-5f40375ecebb",
"https://www.zscaler.com/blogs/security-research/new-espionage-attack-molerats-apt-targeting-users-middle-east",
+ "https://app.any.run/tasks/7e906adc-9d11-447f-8641-5f40375ecebb",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_susp_dropbox_api.yml"
],
"tags": "No established tags"
@@ -30435,8 +30887,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://www.mandiant.com/resources/russian-targeting-gov-business",
"https://megatools.megous.com/",
+ "https://www.mandiant.com/resources/russian-targeting-gov-business",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_mega_nz.yml"
],
"tags": [
@@ -30536,8 +30988,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://stealthbits.com/blog/extracting-password-hashes-from-the-ntds-dit-file/",
"https://adsecurity.org/?p=2398",
+ "https://stealthbits.com/blog/extracting-password-hashes-from-the-ntds-dit-file/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_ntds_dit.yml"
],
"tags": [
@@ -30604,11 +31056,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
+ "https://twitter.com/luc4m/status/1073181154126254080",
"https://twitter.com/malwrhunterteam/status/1235135745611960321",
+ "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
"https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/",
- "https://twitter.com/luc4m/status/1073181154126254080",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_lnk_double_extension.yml"
],
"tags": [
@@ -30810,11 +31262,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml",
- "https://github.com/helpsystems/nanodump",
- "https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf",
- "https://www.google.com/search?q=procdump+lsass",
"https://www.whiteoaksecurity.com/blog/attacks-defenses-dumping-lsass-no-mimikatz/",
+ "https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf",
+ "https://github.com/helpsystems/nanodump",
+ "https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml",
+ "https://www.google.com/search?q=procdump+lsass",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_lsass_dump.yml"
],
"tags": [
@@ -30915,8 +31367,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_tool_psexec.yml"
],
"tags": [
@@ -30974,11 +31426,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
+ "https://twitter.com/luc4m/status/1073181154126254080",
"https://twitter.com/malwrhunterteam/status/1235135745611960321",
+ "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
"https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/",
- "https://twitter.com/luc4m/status/1073181154126254080",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_double_extension.yml"
],
"tags": [
@@ -31181,7 +31633,7 @@
"value": "WScript or CScript Dropper - File"
},
{
- "description": "Detects add-ins that load when Microsoft Word or Excel starts (.wll/.xll are simply .dll fit for Word or Excel).",
+ "description": "Detects add-ins that load when Microsoft Office starts (.wll/.xll are simply .dll fit for Word or Excel).",
"meta": {
"author": "NVISO",
"creation_date": "2020/05/11",
@@ -31193,7 +31645,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence",
"Internal Research",
+ "https://github.com/redcanaryco/atomic-red-team/blob/4ae9580a1a8772db87a1b6cdb0d03e5af231e966/atomics/T1137.006/T1137.006.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_office_persistence.yml"
],
"tags": [
@@ -31310,8 +31764,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/cube0x0/CVE-2021-1675",
"https://github.com/hhlxf/PrintNightmare",
+ "https://github.com/cube0x0/CVE-2021-1675",
"https://github.com/afwu/PrintNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_1675_printspooler.yml"
],
@@ -31444,8 +31898,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://persistence-info.github.io/Data/wpbbin.html",
"https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
+ "https://persistence-info.github.io/Data/wpbbin.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_wpbbin_persistence.yml"
],
"tags": [
@@ -31663,8 +32117,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/",
- "https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Output.cs",
"https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Control.cs",
+ "https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Output.cs",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_inveigh_artefacts.yml"
],
"tags": [
@@ -31789,11 +32243,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
+ "https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer",
"https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
"https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf",
- "https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
"https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
- "https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_advanced_ip_scanner.yml"
],
"tags": [
@@ -31875,20 +32329,21 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/samratashok/nishang",
- "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
- "https://github.com/PowerShellMafia/PowerSploit",
+ "https://github.com/AlsidOfficial/WSUSpendu/",
"https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
"https://github.com/nettitude/Invoke-PowerThIEf",
- "https://github.com/S3cur3Th1sSh1t/WinPwn",
+ "https://github.com/PowerShellMafia/PowerSploit",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
"https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
"https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
- "https://github.com/AlsidOfficial/WSUSpendu/",
- "https://github.com/CsEnox/EventViewer-UACBypass",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://github.com/S3cur3Th1sSh1t/WinPwn",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://github.com/samratashok/nishang",
+ "https://github.com/CsEnox/EventViewer-UACBypass",
"https://github.com/NetSPI/PowerUpSQL",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_powershell_exploit_scripts.yml"
],
@@ -31922,9 +32377,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
- "https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
"https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
+ "https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
+ "https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_exchange_webshell_drop_suspicious.yml"
],
"tags": [
@@ -31994,8 +32449,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/rbmaslen/status/1321859647091970051",
"https://twitter.com/tifkin_/status/1321916444557365248",
+ "https://twitter.com/rbmaslen/status/1321859647091970051",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_pcre_net_temp_file.yml"
],
"tags": [
@@ -32117,8 +32572,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://persistence-info.github.io/Data/powershellprofile.html",
"https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/",
+ "https://persistence-info.github.io/Data/powershellprofile.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_powershell_profile.yml"
],
"tags": [
@@ -32383,8 +32838,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/14",
+ "https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_pfx_file_creation.yml"
],
"tags": [
@@ -32418,8 +32873,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/klinix5/InstallerFileTakeOver",
"https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
+ "https://github.com/klinix5/InstallerFileTakeOver",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_41379_msi_lpe.yml"
],
"tags": [
@@ -32476,9 +32931,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/olafhartong/sysmon-modular/blob/fa1ae53132403d262be2bbd7f17ceea7e15e8c78/11_file_create/include_dotnet.xml",
"https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
"https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/",
+ "https://github.com/olafhartong/sysmon-modular/blob/fa1ae53132403d262be2bbd7f17ceea7e15e8c78/11_file_create/include_dotnet.xml",
"https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_net_cli_artefact.yml"
],
@@ -32513,8 +32968,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/splinter_code/status/1519075134296006662?s=12&t=DLUXH86WtcmG_AZ5gY3C6g",
- "https://twitter.com/orange_8361/status/1518970259868626944?s=20&t=RFXqZjtA7tWM3HxqEH78Aw",
"https://lolbas-project.github.io/lolbas/Binaries/Eventvwr/#execute",
+ "https://twitter.com/orange_8361/status/1518970259868626944?s=20&t=RFXqZjtA7tWM3HxqEH78Aw",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_uac_bypass_eventvwr.yml"
],
"tags": [
@@ -32538,9 +32993,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
- "https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
"https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
+ "https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
+ "https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_exchange_webshell_drop.yml"
],
"tags": [
@@ -32637,8 +33092,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
+ "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_lsass_shtinkering.yml"
],
"tags": [
@@ -32830,8 +33285,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/intelligence-insights-october-2021/",
"https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1547.001/T1547.001.md#atomic-test-7---add-executable-shortcut-link-to-user-startup-folder",
+ "https://redcanary.com/blog/intelligence-insights-october-2021/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_powershell_startup_shortcuts.yml"
],
"tags": [
@@ -32855,8 +33310,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_script_creation_by_office_using_file_ext.yml"
],
"tags": [
@@ -32981,10 +33436,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://pentestlab.blog/tag/ntds-dit/",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1",
"https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
+ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_ntds_dit.yml"
],
"tags": [
@@ -33017,9 +33472,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/data/post/powershell/NTDSgrab.ps1",
"https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/modules/post/windows/gather/ntds_grabber.rb",
"https://github.com/SecureAuthCorp/impacket/blob/7d2991d78836b376452ca58b3d14daa61b67cb40/impacket/examples/secretsdump.py#L2405",
- "https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/data/post/powershell/NTDSgrab.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_ntds_exfil_tools.yml"
],
"tags": [
@@ -33086,8 +33541,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/vanitasnk/status/1437329511142420483?s=21",
"https://twitter.com/RonnyTNL/status/1436334640617373699?s=20",
+ "https://twitter.com/vanitasnk/status/1437329511142420483?s=21",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_winword_cve_2021_40444.yml"
],
"tags": [
@@ -33177,8 +33632,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/",
"https://twitter.com/SBousseaden/status/1278977301745741825",
+ "https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_desktopimgdownldr_file.yml"
],
"tags": [
@@ -33245,10 +33700,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://github.com/cube0x0/CVE-2021-36934",
+ "https://www.google.com/search?q=%22reg.exe+save%22+sam",
"https://github.com/FireFart/hivenightmare",
"https://github.com/search?q=CVE-2021-36934",
- "https://www.google.com/search?q=%22reg.exe+save%22+sam",
- "https://github.com/cube0x0/CVE-2021-36934",
"https://github.com/HuskyHacks/ShadowSteal",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_sam_dump.yml"
],
@@ -33399,10 +33854,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/cube0x0/status/1418920190759378944",
- "https://github.com/FireFart/hivenightmare/",
- "https://github.com/WiredPulse/Invoke-HiveNightmare",
"https://github.com/GossiTheDog/HiveNightmare",
+ "https://github.com/FireFart/hivenightmare/",
+ "https://twitter.com/cube0x0/status/1418920190759378944",
+ "https://github.com/WiredPulse/Invoke-HiveNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_hivenightmare_file_exports.yml"
],
"tags": [
@@ -33495,8 +33950,8 @@
"logsource.product": "windows",
"refs": [
"https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/",
- "https://redcanary.com/blog/intelligence-insights-october-2021/",
"https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/",
+ "https://redcanary.com/blog/intelligence-insights-october-2021/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_mal_vhd_download.yml"
],
"tags": [
@@ -33778,10 +34233,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore",
+ "https://insights.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/",
"https://blog.emsisoft.com/en/32373/beware-new-wave-of-malware-spreads-via-iso-file-email-attachments/",
"https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
- "https://insights.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/",
- "https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_iso_file_recent.yml"
],
"tags": "No established tags"
@@ -33922,8 +34377,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/fox-it/LDAPFragger",
- "https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961",
"https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/",
+ "https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_adsi_cache_usage.yml"
],
"tags": [
@@ -33956,8 +34411,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Sam0x90/status/1552011547974696960",
"https://securityaffairs.co/wordpress/133680/malware/dll-sideloading-spread-qakbot.html",
+ "https://twitter.com/Sam0x90/status/1552011547974696960",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_iso_file_mount.yml"
],
"tags": [
@@ -34297,11 +34752,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
"https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
"https://decoded.avast.io/martinchlumecky/png-steganography/",
"https://github.com/Wh04m1001/SysmonEoP",
+ "https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_create_non_existent_dlls.yml"
],
"tags": [
@@ -34431,8 +34886,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406",
+ "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_pingback_backdoor.yml"
],
"tags": [
@@ -34754,8 +35209,8 @@
"logsource.category": "file_delete",
"logsource.product": "windows",
"refs": [
- "https://github.com/cube0x0/CVE-2021-1675",
"https://github.com/hhlxf/PrintNightmare",
+ "https://github.com/cube0x0/CVE-2021-1675",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_delete/file_delete_win_cve_2021_1675_printspooler_del.yml"
],
"tags": [
@@ -34839,8 +35294,8 @@
"logsource.category": "file_access",
"logsource.product": "windows",
"refs": [
- "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
"https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz",
+ "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_access/file_access_win_credential_manager_stealing.yml"
],
"tags": [
@@ -34910,8 +35365,8 @@
"logsource.category": "file_access",
"logsource.product": "windows",
"refs": [
- "https://www.zscaler.com/blogs/security-research/ffdroider-stealer-targeting-social-media-platform-users",
"https://github.com/lclevy/firepwd",
+ "https://www.zscaler.com/blogs/security-research/ffdroider-stealer-targeting-social-media-platform-users",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_access/file_access_win_browser_credential_stealing.yml"
],
"tags": [
@@ -35035,8 +35490,8 @@
"logsource.category": "dns_query",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/AppInstaller/",
"https://twitter.com/notwhickey/status/1333900137232523264",
+ "https://lolbas-project.github.io/lolbas/Binaries/AppInstaller/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_lolbin_appinstaller.yml"
],
"tags": [
@@ -35090,12 +35545,12 @@
"value": "DNS HybridConnectionManager Service Bus"
},
{
- "description": "Detects DNS queries for anonfiles.com, which is an anonymous file upload platform often used for malicious purposes",
+ "description": "Detects DNS queries for \"anonfiles.com\", which is an anonymous file upload platform often used for malicious purposes",
"meta": {
"author": "pH-T",
"creation_date": "2022/07/15",
"falsepositive": [
- "Legitimate access to anonfiles.com"
+ "Rare legitimate access to anonfiles.com"
],
"filename": "dns_query_win_anonymfiles_com.yml",
"level": "high",
@@ -35120,7 +35575,7 @@
}
],
"uuid": "065cceea-77ec-4030-9052-fc0affea7110",
- "value": "DNS Query for Anonfiles.com Domain"
+ "value": "DNS Query for Anonfiles.com Domain - Sysmon"
},
{
"description": "An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.\nThese services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.\nRemote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)\n",
@@ -35136,9 +35591,9 @@
"logsource.product": "windows",
"refs": [
"https://redcanary.com/blog/misbehaving-rats/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-3---logmein-files-detected-test-on-windows",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-6---ammyy-admin-software-execution",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-4---gotoassist-files-detected-test-on-windows",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-3---logmein-files-detected-test-on-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_remote_access_software_domains.yml"
],
"tags": [
@@ -35202,12 +35657,12 @@
"value": "Regsvr32 Network Activity - DNS"
},
{
- "description": "Detects DNS queries for subdomains used for upload to ufile.io",
+ "description": "Detects DNS queries to \"ufile.io\". Which is often abused by malware for upload and exfiltration",
"meta": {
"author": "yatinwad and TheDFIRReport",
"creation_date": "2022/06/23",
"falsepositive": [
- "Legitimate Ufile upload"
+ "Legitimate DNS queries and usage of Ufile"
],
"filename": "dns_query_win_ufile_io.yml",
"level": "high",
@@ -35232,7 +35687,7 @@
}
],
"uuid": "1cbbeaaf-3c8c-4e4c-9d72-49485b6a176b",
- "value": "DNS Query for Ufile.io Upload Domain"
+ "value": "DNS Query for Ufile.io Upload Domain - Sysmon"
},
{
"description": "Detects DNS queries for subdomains used for upload to MEGA.io",
@@ -35240,7 +35695,7 @@
"author": "Aaron Greetham (@beardofbinary) - NCC Group",
"creation_date": "2021/05/26",
"falsepositive": [
- "Legitimate Mega upload"
+ "Legitimate DNS queries and usage of Mega"
],
"filename": "dns_query_win_mega_nz.yml",
"level": "high",
@@ -35265,7 +35720,7 @@
}
],
"uuid": "613c03ba-0779-4a53-8a1f-47f914a4ded3",
- "value": "DNS Query for MEGA.io Upload Domain"
+ "value": "DNS Query for MEGA.io Upload Domain - Sysmon"
},
{
"description": "Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons",
@@ -35299,7 +35754,7 @@
}
],
"uuid": "f356a9c4-effd-4608-bbf8-408afd5cd006",
- "value": "Suspicious Cobalt Strike DNS Beaconing"
+ "value": "Suspicious Cobalt Strike DNS Beaconing - Sysmon"
},
{
"description": "Detects DNS queries to a TeamViewer domain only resolved by a TeamViewer client by an image that isn't named TeamViewer (sometimes used by threat actors for obfuscation)",
@@ -35336,7 +35791,7 @@
"value": "Suspicious TeamViewer Domain Access"
},
{
- "description": "Detects DNS resolution of an .onion address related to Tor routing networks",
+ "description": "Detects DNS queries to an \".onion\" address related to Tor routing networks",
"meta": {
"author": "frack113",
"creation_date": "2022/02/20",
@@ -35366,7 +35821,7 @@
}
],
"uuid": "b55ca2a3-7cff-4dda-8bdd-c7bfa63bf544",
- "value": "Query Tor Onion Address"
+ "value": "DNS Query Tor Onion Address - Sysmon"
},
{
"description": "Detect suspicious LDAP request from non-Windows application",
@@ -35445,8 +35900,8 @@
"logsource.category": "dns_query",
"logsource.product": "windows",
"refs": [
- "https://www.binarydefense.com/analysis-of-hancitor-when-boring-begets-beacon",
"https://twitter.com/neonprimetime/status/1436376497980428318",
+ "https://www.binarydefense.com/analysis-of-hancitor-when-boring-begets-beacon",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_susp_ipify.yml"
],
"tags": [
@@ -35637,8 +36092,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://nsudo.m2team.org/en-us/",
"https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
+ "https://nsudo.m2team.org/en-us/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_whoami_as_priv_user.yml"
],
"tags": [
@@ -35771,8 +36226,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -35867,12 +36322,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/eral4m/status/1479106975967240209",
- "https://twitter.com/nas_bench/status/1433344116071583746",
- "http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/",
- "https://twitter.com/eral4m/status/1479080793003671557",
"https://twitter.com/Hexacorn/status/885258886428725250",
"https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52",
+ "https://twitter.com/eral4m/status/1479106975967240209",
+ "http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/",
+ "https://twitter.com/nas_bench/status/1433344116071583746",
+ "https://twitter.com/eral4m/status/1479080793003671557",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_activity.yml"
],
"tags": [
@@ -36005,8 +36460,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/ce4deab5-3263-494f-93e3-afb2b9d79f14/",
"https://securelist.com/my-name-is-dtrack/93338/",
+ "https://app.any.run/tasks/ce4deab5-3263-494f-93e3-afb2b9d79f14/",
"https://app.any.run/tasks/4bc9860d-ab51-4077-9e09-59ad346b92fd/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_dtrack.yml"
],
@@ -36052,39 +36507,6 @@
"uuid": "e9142d84-fbe0-401d-ac50-3e519fb00c89",
"value": "WhoAmI as Parameter"
},
- {
- "description": "Detect use of sqlite binary to query the Chrome Cookies database and steal the cookie data contained within it",
- "meta": {
- "author": "TropChaud",
- "creation_date": "2022/12/19",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_sqlite_chrome_cookies.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/84d9edaaaa2c5511144521b0e4af726d1c7276ce/atomics/T1539/T1539.md#atomic-test-2---steal-chrome-cookies-windows",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sqlite_chrome_cookies.yml"
- ],
- "tags": [
- "attack.credential_access",
- "attack.t1539"
- ]
- },
- "related": [
- {
- "dest-uuid": "10ffac09-e42d-4f56-ab20-db94c67d76ff",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "24c77512-782b-448a-8950-eddb0785fc71",
- "value": "SQLite Chrome Cookie DB Access"
- },
{
"description": "Detects suspicious sub processes started by the ScreenConnect client service, which indicates the use of the so-called Backstage mode",
"meta": {
@@ -36181,8 +36603,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Scripts/CL_LoadAssembly/",
"https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/",
+ "https://lolbas-project.github.io/lolbas/Scripts/CL_LoadAssembly/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_cl_loadassembly.yml"
],
"tags": [
@@ -36327,9 +36749,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/frack113/status/1555830623633375232",
"https://www.acunetix.com/blog/articles/windows-short-8-3-filenames-web-security-problem/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc959352(v=technet.10)?redirectedfrom=MSDN",
- "https://twitter.com/frack113/status/1555830623633375232",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ntfs_short_name_path_use_image.yml"
],
"tags": [
@@ -36598,8 +37020,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.13cubed.com/downloads/windows_process_genealogy_v2.pdf",
"https://securitybytes.io/blue-team-fundamentals-part-two-windows-processes-759fe15965e2",
+ "https://www.13cubed.com/downloads/windows_process_genealogy_v2.pdf",
"https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_wrong_parent.yml"
],
@@ -36715,9 +37137,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "Reegun J (OCBC Bank)",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/",
"https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/",
+ "Reegun J (OCBC Bank)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_msoffice.yml"
],
"tags": [
@@ -36783,8 +37205,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e",
"https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows",
+ "https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e",
"https://github.com/netero1010/TrustedPath-UACBypass-BOF",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_uac_bypass_trustedpath.yml"
],
@@ -36852,10 +37274,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_ip.yml"
],
"tags": [
@@ -36898,9 +37320,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/1420053502554951689",
- "https://www.matteomalvica.com/blog/2019/12/02/win-defender-atp-cred-bypass/",
"https://twitter.com/SBousseaden/status/1464566846594691073?s=20",
+ "https://www.matteomalvica.com/blog/2019/12/02/win-defender-atp-cred-bypass/",
+ "https://twitter.com/Hexacorn/status/1420053502554951689",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_lsass_clone.yml"
],
"tags": [
@@ -37021,9 +37443,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/SigmaHQ/sigma/issues/1009",
"https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/",
"https://redcanary.com/blog/raspberry-robin/",
+ "https://github.com/SigmaHQ/sigma/issues/1009",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_shellexec_rundll_usage.yml"
],
"tags": [
@@ -37104,9 +37526,9 @@
"logsource.product": "windows",
"refs": [
"https://book.hacktricks.xyz/windows/basic-cmd-for-pentesters",
- "https://thedfirreport.com/2021/08/16/trickbot-leads-up-to-fake-1password-installation/",
"https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)",
+ "https://thedfirreport.com/2021/08/16/trickbot-leads-up-to-fake-1password-installation/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_nltest_recon.yml"
],
"tags": [
@@ -37411,8 +37833,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/mandiant/SharPersist",
"https://www.mandiant.com/resources/blog/sharpersist-windows-persistence-toolkit",
+ "https://github.com/mandiant/SharPersist",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_sharpersist.yml"
],
"tags": [
@@ -37599,8 +38021,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/BishopFox/sliver/blob/79f2d48fcdfc2bee4713b78d431ea4b27f733f30/implant/sliver/shell/shell_windows.go#L36",
"https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/",
+ "https://github.com/BishopFox/sliver/blob/79f2d48fcdfc2bee4713b78d431ea4b27f733f30/implant/sliver/shell/shell_windows.go#L36",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_c2_sliver.yml"
],
"tags": [
@@ -37826,8 +38248,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/0gtweet/status/1457676633809330184",
"https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/",
+ "https://twitter.com/0gtweet/status/1457676633809330184",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_sigverif.yml"
],
"tags": [
@@ -37895,8 +38317,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.youtube.com/watch?v=ro2QuZTIMBM",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
+ "https://www.youtube.com/watch?v=ro2QuZTIMBM",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexesvc.yml"
],
"tags": [
@@ -37952,10 +38374,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://isc.sans.edu/diary/22264",
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://isc.sans.edu/diary/22264",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_domain.yml"
],
@@ -37999,9 +38421,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/nas_bench/status/1534915321856917506",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Adplus/",
"https://twitter.com/nas_bench/status/1534916659676422152",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Adplus/",
+ "https://twitter.com/nas_bench/status/1534915321856917506",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_adplus.yml"
],
"tags": [
@@ -38265,8 +38687,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Libraries/Pcwutl/",
"https://twitter.com/harr0ey/status/989617817849876488",
+ "https://lolbas-project.github.io/lolbas/Libraries/Pcwutl/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_pcwutl.yml"
],
"tags": [
@@ -38610,8 +39032,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trendmicro.com/en_us/research/22/j/black-basta-infiltrates-networks-via-qakbot-brute-ratel-and-coba.html",
"https://www.echotrail.io/insights/search/wermgr.exe",
+ "https://www.trendmicro.com/en_us/research/22/j/black-basta-infiltrates-networks-via-qakbot-brute-ratel-and-coba.html",
"https://github.com/binderlabs/DirCreate2System",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wermgr.yml"
],
@@ -38667,8 +39089,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/cyb3rops/status/1562072617552678912",
"https://ss64.com/nt/cmd.html",
+ "https://twitter.com/cyb3rops/status/1562072617552678912",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_missing_spaces.yml"
],
"tags": [
@@ -38701,9 +39123,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-94a1964b682707e4e3f77dd61a3bfface5401d08d8cf81145f388e09614aceca",
- "https://twitter.com/Hexacorn/status/1187143326673330176",
"https://redcanary.com/blog/raspberry-robin/",
+ "https://twitter.com/Hexacorn/status/1187143326673330176",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-94a1964b682707e4e3f77dd61a3bfface5401d08d8cf81145f388e09614aceca",
"https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_odbcconf.yml"
],
@@ -38839,10 +39261,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult",
"https://unit42.paloaltonetworks.com/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
"https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf",
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_gpresult.yml"
],
"tags": [
@@ -38926,7 +39348,7 @@
{
"description": "Detects wmiexec/dcomexec/atexec/smbexec from Impacket framework",
"meta": {
- "author": "Ecco, oscd.community, Jonhnathan Ribeiro",
+ "author": "Ecco, oscd.community, Jonhnathan Ribeiro, Tim Rauch",
"creation_date": "2019/09/03",
"falsepositive": [
"Unknown"
@@ -38936,9 +39358,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/atexec.py",
- "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/dcomexec.py",
"https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/smbexec.py",
+ "https://www.elastic.co/guide/en/security/current/suspicious-cmd-execution-via-wmi.html",
+ "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/dcomexec.py",
+ "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/atexec.py",
"https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/wmiexec.py",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_impacket_lateralization.yml"
],
@@ -38966,7 +39389,7 @@
}
],
"uuid": "10c14723-61c7-4c75-92ca-9af245723ad2",
- "value": "Impacket Lateralization Detection"
+ "value": "Potential Impacket Lateral Movement Activity"
},
{
"description": "Detects code execution via Pester.bat (Pester - Powershell Modulte for testing)",
@@ -39103,9 +39526,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
"https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti_shadowcopy.yml"
],
"tags": [
@@ -39332,8 +39755,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/D4Vinci/One-Lin3r/blob/9fdfa5f0b9c698dfbd4cdfe7d2473192777ae1c6/one_lin3r/core/liners/windows/cmd/dll_loader_word.py",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/",
+ "https://github.com/D4Vinci/One-Lin3r/blob/9fdfa5f0b9c698dfbd4cdfe7d2473192777ae1c6/one_lin3r/core/liners/windows/cmd/dll_loader_word.py",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_winword.yml"
],
"tags": [
@@ -39366,8 +39789,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.reverse.it/sample/e3399d4802f9e6d6d539e3ae57e7ea9a54610a7c4155a6541df8e94d67af086e?environmentId=100",
"https://twitter.com/ClearskySec/status/960924755355369472",
+ "https://www.reverse.it/sample/e3399d4802f9e6d6d539e3ae57e7ea9a54610a7c4155a6541df8e94d67af086e?environmentId=100",
"https://researchcenter.paloaltonetworks.com/2018/02/unit42-sofacy-attacks-multiple-government-entities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_sofacy.yml"
],
@@ -39461,8 +39884,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.vmray.com/analyses/5ad401c3a568/report/overview.html",
"https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/",
+ "https://www.vmray.com/analyses/5ad401c3a568/report/overview.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_muddywater_dnstunnel.yml"
],
"tags": [
@@ -39635,8 +40058,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/powercfg-command-line-options",
"https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
+ "https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/powercfg-command-line-options",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powercfg.yml"
],
"tags": [
@@ -39660,9 +40083,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
"https://www.poweradmin.com/paexec/",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
+ "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexex_paexec_escalate_system.yml"
],
"tags": [
@@ -39695,8 +40118,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets",
"https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b",
+ "https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_sysprep_appdata.yml"
],
"tags": [
@@ -39729,8 +40152,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/",
"https://twitter.com/SBousseaden/status/1278977301745741825",
+ "https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_desktopimgdownldr.yml"
],
"tags": [
@@ -39796,14 +40219,14 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/776122138063409152",
- "https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
- "https://github.com/SigmaHQ/sigma/issues/3742",
"https://github.com/keyboardcrunch/SentinelOne-ATTACK-Queries/blob/6a228d23eefe963ca81f2d52f94b815f61ef5ee0/Tactics/DefenseEvasion.md#t1055-process-injection",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://twitter.com/gN3mes1s/status/941315826107510784",
+ "https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
+ "https://github.com/SigmaHQ/sigma/issues/3742",
"https://reaqta.com/2017/12/mavinject-microsoft-injector/",
+ "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_mavinject.yml"
],
"tags": [
@@ -39845,8 +40268,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
+ "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Shells/Invoke-PowerShellTcpOneLine.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_reverse_shell_connection.yml"
],
@@ -39880,8 +40303,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/",
+ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_diskshadow.yml"
],
"tags": [
@@ -40107,8 +40530,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/07e789f4f2f3259e7559fdccb36e96814c2dbff872a21e1fa03de9ee377d581f?environmentId=100",
"https://www.virusradar.com/en/Win32_Kasidet.AD/description",
+ "https://www.hybrid-analysis.com/sample/07e789f4f2f3259e7559fdccb36e96814c2dbff872a21e1fa03de9ee377d581f?environmentId=100",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netsh_fw_add_susp_image.yml"
],
"tags": [
@@ -40141,8 +40564,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
"https://twitter.com/SBousseaden/status/1207671369963646976",
+ "https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_wocao.yml"
],
"tags": [
@@ -40229,12 +40652,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_spawning_control.yml",
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
- "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set",
- "https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e",
- "https://twitter.com/andythevariable/status/1576953781581144064?s=20&t=QiJILvK4ZiBdR8RJe24u-A",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://twitter.com/andythevariable/status/1576953781581144064?s=20&t=QiJILvK4ZiBdR8RJe24u-A",
+ "https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e",
+ "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
+ "https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_spawning_control.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbins_by_office_applications.yml"
],
"tags": [
@@ -40284,9 +40707,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/higaisa-or-winnti-apt-41-backdoors-old-and-new/",
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-27939090904026cc396b0b629c8e4314acd6f5dac40a676edbc87f4567b47eb7",
"https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/chm-badness-delivers-a-banking-trojan/",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-27939090904026cc396b0b629c8e4314acd6f5dac40a676edbc87f4567b47eb7",
+ "https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/higaisa-or-winnti-apt-41-backdoors-old-and-new/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_html_help_spawn.yml"
],
"tags": [
@@ -40458,10 +40881,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/max_mal_/status/1542461200797163522",
- "https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464",
- "https://github.com/pr0xylife/Qakbot/blob/4f0795d79dabee5bc9dd69f17a626b48852e7869/Qakbot_AA_23.06.2022.txt",
"https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browser-extension-sharpext/",
+ "https://twitter.com/max_mal_/status/1542461200797163522",
+ "https://github.com/pr0xylife/Qakbot/blob/4f0795d79dabee5bc9dd69f17a626b48852e7869/Qakbot_AA_23.06.2022.txt",
+ "https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_curl_download.yml"
],
"tags": [
@@ -40540,6 +40963,57 @@
"uuid": "bac9fb54-2da7-44e9-988f-11e9a5edbc0c",
"value": "Password Spraying Attempts Using Dsacls"
},
+ {
+ "description": "Detect usage of the \"sqlite\" binary to query databases in Chromium-based browsers for potential data stealing.",
+ "meta": {
+ "author": "TropChaud",
+ "creation_date": "2022/12/19",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_sqlite_chromium_profile_data.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/84d9edaaaa2c5511144521b0e4af726d1c7276ce/atomics/T1539/T1539.md#atomic-test-2---steal-chrome-cookies-windows",
+ "https://blog.cyble.com/2022/04/21/prynt-stealer-a-new-info-stealer-performing-clipper-and-keylogger-activities/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sqlite_chromium_profile_data.yml"
+ ],
+ "tags": [
+ "attack.credential_access",
+ "attack.t1539",
+ "attack.t1555.003",
+ "attack.collection",
+ "attack.t1005"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "10ffac09-e42d-4f56-ab20-db94c67d76ff",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "58a3e6aa-4453-4cc8-a51f-4befe80b31a8",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "3c4a2599-71ee-4405-ba1e-0e28414b4bc5",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "24c77512-782b-448a-8950-eddb0785fc71",
+ "value": "SQLite Chromium Profile Data DB Access"
+ },
{
"description": "Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2021-26084",
"meta": {
@@ -40553,9 +41027,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
- "https://nvd.nist.gov/vuln/detail/CVE-2021-26084",
"https://github.com/h3v0x/CVE-2021-26084_Confluence",
+ "https://nvd.nist.gov/vuln/detail/CVE-2021-26084",
+ "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_atlassian_confluence_cve_2021_26084_exploit.yml"
],
"tags": [
@@ -40630,8 +41104,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://thedfirreport.com/2020/10/08/ryuks-return/",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_proc_create.yml"
],
"tags": [
@@ -40664,9 +41138,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/0gtweet/status/1588815661085917186?cxt=HHwWhIDUyaDbzYwsAAAA",
"https://www.elastic.co/guide/en/security/current/microsoft-iis-service-account-password-dumped.html",
"https://www.netspi.com/blog/technical/network-penetration-testing/decrypting-iis-passwords-to-break-out-of-the-dmz-part-2/",
- "https://twitter.com/0gtweet/status/1588815661085917186?cxt=HHwWhIDUyaDbzYwsAAAA",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_iis_service_account_password_dumped.yml"
],
"tags": [
@@ -40792,9 +41266,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://youtu.be/5mqid-7zp8k?t=2481",
"https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
- "https://youtu.be/5mqid-7zp8k?t=2481",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mailboxexport_share.yml"
],
@@ -40949,9 +41423,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dotnet/",
- "https://bohops.com/2019/08/19/dotnet-core-a-vector-for-awl-bypass-defense-evasion/",
"https://twitter.com/_felamos/status/1204705548668555264",
+ "https://bohops.com/2019/08/19/dotnet-core-a-vector-for-awl-bypass-defense-evasion/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dotnet/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dotnet.yml"
],
"tags": [
@@ -40984,8 +41458,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://lolbas-project.github.io/lolbas/Binaries/Regedit/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regedit_import_keys_ads.yml"
],
"tags": [
@@ -41082,8 +41556,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/harleyQu1nn/AggressorScripts",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1518/T1518.md",
+ "https://github.com/harleyQu1nn/AggressorScripts",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_software_discovery.yml"
],
"tags": [
@@ -41107,8 +41581,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://sourceforge.net/projects/mouselock/",
"https://github.com/klsecservices/Publications/blob/657deb6a6eb6e00669afd40173f425fb49682eaa/Incident-Response-Analyst-Report-2020.pdf",
+ "https://sourceforge.net/projects/mouselock/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mouse_lock.yml"
],
"tags": [
@@ -41223,8 +41697,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/7.B.4_C10730EA-6345-4934-AA0F-B0EFCA0C4BA6.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/17",
+ "https://threathunterplaybook.com/evals/apt29/detections/7.B.4_C10730EA-6345-4934-AA0F-B0EFCA0C4BA6.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_webdav_client_execution.yml"
],
"tags": [
@@ -41382,8 +41856,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
"https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
+ "https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_rundll32_dllregisterserver.yml"
],
"tags": [
@@ -41552,8 +42026,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://app.any.run/tasks/b12cccf3-1c22-4e28-9d3e-c7a6062f3914/",
+ "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://app.any.run/tasks/7ca5661d-a67b-43ec-98c1-dd7a8103c256/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_mustangpanda.yml"
],
@@ -41587,8 +42061,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1511489821247684615",
"https://twitter.com/mrd0x/status/1511415432888131586?s=20&t=DvVrzeZ1OcGiWowbhPV8Lg",
+ "https://twitter.com/mrd0x/status/1511489821247684615",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_dumpminitool.yml"
],
"tags": [
@@ -41657,8 +42131,8 @@
"logsource.product": "windows",
"refs": [
"https://app.any.run/tasks/51e7185c-52d7-4efb-ac0d-e86340053473/",
- "https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
"https://app.any.run/tasks/65a79440-373a-4725-8d74-77db9f2abda4/",
+ "https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_crime_maze_ransomware.yml"
],
"tags": [
@@ -41732,10 +42206,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
"https://twitter.com/ReaQta/status/1222548288731217921",
"https://eqllib.readthedocs.io/en/latest/analytics/532b5ed4-7930-11e9-8f5c-d46d6d62a49e.html",
"https://www.activecyber.us/activelabs/windows-uac-bypass",
+ "https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_wsreset.yml"
],
"tags": [
@@ -41769,9 +42243,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blog.f-secure.com/analysis-of-lockergoga-ransomware/",
"https://medium.com/@malwaredancer/lockergoga-input-arguments-ipc-communication-and-others-bd4e5a7ba80a",
"https://www.carbonblack.com/blog/tau-threat-intelligence-notification-lockergoga-ransomware/",
+ "https://blog.f-secure.com/analysis-of-lockergoga-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mal_lockergoga_ransomware.yml"
],
"tags": [
@@ -41804,9 +42278,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.python.org/3/using/cmdline.html#cmdoption-c",
"https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet",
"https://www.revshells.com/",
+ "https://docs.python.org/3/using/cmdline.html#cmdoption-c",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_python_inline_command_execution.yml"
],
"tags": [
@@ -41867,8 +42341,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/vysecurity/Aggressor-VYSEC/blob/0d61c80387b9432dab64b8b8a9fb52d20cfef80e/ping.cna",
"https://twitter.com/vysecurity/status/977198418354491392",
+ "https://github.com/vysecurity/Aggressor-VYSEC/blob/0d61c80387b9432dab64b8b8a9fb52d20cfef80e/ping.cna",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ping_hex_ip.yml"
],
"tags": [
@@ -41902,8 +42376,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.elastic.co/security-labs/exploring-the-qbot-attack-pattern",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks",
+ "https://www.elastic.co/security-labs/exploring-the-qbot-attack-pattern",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_schtasks_system.yml"
],
"tags": [
@@ -42045,8 +42519,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/detection-rules/blob/414d32027632a49fb239abb8fbbb55d3fa8dd861/rules/windows/discovery_peripheral_device.toml",
"Turla has used fsutil fsinfo drives to list connected drives.",
+ "https://github.com/elastic/detection-rules/blob/414d32027632a49fb239abb8fbbb55d3fa8dd861/rules/windows/discovery_peripheral_device.toml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_fsutil_drive_enumeration.yml"
],
"tags": [
@@ -42127,8 +42601,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/993298228840992768",
"https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OtherMSBinaries/Sqltoolsps.yml",
+ "https://twitter.com/pabraeken/status/993298228840992768",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_sqltoolsps_bin.yml"
],
"tags": [
@@ -42170,8 +42644,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Register-cimprovider/",
"https://twitter.com/PhilipTsukerman/status/992021361106268161",
+ "https://lolbas-project.github.io/lolbas/Binaries/Register-cimprovider/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_register_cimprovider.yml"
],
"tags": [
@@ -42238,15 +42712,15 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
- "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/",
- "https://blog.talosintelligence.com/2017/05/wannacry.html",
- "https://redcanary.com/blog/intelligence-insights-october-2021/",
- "https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100",
"https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
- "https://github.com/Neo23x0/Raccine#the-process",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
+ "https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100",
"https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadmin-exe-now/",
+ "https://blog.talosintelligence.com/2017/05/wannacry.html",
+ "https://github.com/Neo23x0/Raccine#the-process",
+ "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/",
"https://github.com/Neo23x0/Raccine/blob/20a569fa21625086433dcce8bb2765d0ea08dcb6/yara/gen_ransomware_command_lines.yar",
+ "https://redcanary.com/blog/intelligence-insights-october-2021/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_shadow_copies_deletion.yml"
],
"tags": [
@@ -42281,9 +42755,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
- "https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
+ "https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
+ "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location.yml"
],
"tags": [
@@ -42307,9 +42781,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download.yml"
],
"tags": [
@@ -42386,8 +42860,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://s3cur3th1ssh1t.github.io/SharpImpersonation-Introduction/",
"https://github.com/S3cur3Th1sSh1t/SharpImpersonation",
+ "https://s3cur3th1ssh1t.github.io/SharpImpersonation-Introduction/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sharp_impersonation_tool.yml"
],
"tags": [
@@ -42519,11 +42993,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/bohops/735edb7494fe1bd1010d67823842b712",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1216/T1216.md",
- "https://twitter.com/JohnLaTwC/status/1223292479270600706",
"https://twitter.com/bohops/status/980659399495741441",
"https://lolbas-project.github.io/lolbas/Scripts/Manage-bde/",
+ "https://twitter.com/JohnLaTwC/status/1223292479270600706",
+ "https://gist.github.com/bohops/735edb7494fe1bd1010d67823842b712",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1216/T1216.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_manage_bde_lolbas.yml"
],
"tags": [
@@ -42589,8 +43063,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/7872d8845a332dce517adae9c3389fde5313ff2fed38c2577f3b498da786db68/behavior",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bluebottle-banks-targeted-africa",
+ "https://www.virustotal.com/gui/file/7872d8845a332dce517adae9c3389fde5313ff2fed38c2577f3b498da786db68/behavior",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_double_ext_parent.yml"
],
"tags": [
@@ -42825,8 +43299,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/cube0x0",
"https://www.virustotal.com/gui/search/metadata%253ACube0x0/files",
+ "https://github.com/cube0x0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_cube0x0_tools.yml"
],
"tags": "No established tags"
@@ -42847,8 +43321,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
"https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
+ "https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_trickbot_wermgr.yml"
],
"tags": [
@@ -42881,10 +43355,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Csi/",
- "https://twitter.com/Z3Jpa29z/status/1317545798981324801",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Rcsi/",
"https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/",
+ "https://twitter.com/Z3Jpa29z/status/1317545798981324801",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Csi/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Rcsi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_csi.yml"
],
"tags": [
@@ -43020,8 +43494,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Pcalua/",
"https://pentestlab.blog/2020/07/06/indirect-command-execution/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Pcalua/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_pcalua.yml"
],
"tags": [
@@ -43123,8 +43597,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/hostname",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-6---hostname-discovery-windows",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/hostname",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_hostname.yml"
],
"tags": [
@@ -43148,10 +43622,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/hFireF0X/status/897640081053364225",
- "https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
"https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/",
+ "https://twitter.com/hFireF0X/status/897640081053364225",
"https://github.com/hfiref0x/UACME",
+ "https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cmstp_com_object_access.yml"
],
"tags": [
@@ -43221,8 +43695,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/x86matthew/status/1505476263464607744?s=12",
"https://svch0st.medium.com/stats-from-hunting-cobalt-strike-beacons-c17e56255f9b",
+ "https://twitter.com/x86matthew/status/1505476263464607744?s=12",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_parents.yml"
],
"tags": "No established tags"
@@ -43296,8 +43770,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/AdamTheAnalyst/status/1483497517119590403",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_defender_exclusion.yml"
],
"tags": [
@@ -43322,10 +43796,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/",
- "https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/",
- "https://twitter.com/cyb3rops/status/1186631731543236608",
"https://github.com/Neo23x0/DLLRunner",
+ "https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/",
+ "https://twitter.com/cyb3rops/status/1186631731543236608",
+ "https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_by_ordinal.yml"
],
"tags": [
@@ -43628,8 +44102,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/j0nh4t/status/1429049506021138437",
"https://streamable.com/q2dsji",
+ "https://twitter.com/j0nh4t/status/1429049506021138437",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_razorinstaller_explorer.yml"
],
"tags": [
@@ -43694,9 +44168,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://docs.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps",
"https://learn.microsoft.com/en-us/windows/win32/projfs/enabling-windows-projected-file-system",
- "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_windowsoptionalfeature.yml"
],
"tags": [
@@ -43752,8 +44226,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html",
"https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/",
+ "https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_apt29_thinktanks.yml"
],
"tags": [
@@ -43872,8 +44346,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control",
"https://attack.mitre.org/software/S0488/",
+ "https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_dragonfly.yml"
],
"tags": [
@@ -43900,8 +44374,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/child-processes/",
"https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
+ "https://redcanary.com/blog/child-processes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dllhost_no_cli.yml"
],
"tags": [
@@ -43925,10 +44399,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/0gtweet/status/1583356502340870144",
"https://lolbas-project.github.io/lolbas/Binaries/Setres/",
- "https://strontic.github.io/xcyclopedia/library/setres.exe-0E30E4C09637D7A128A37B59A3BC4D09.html",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731033(v=ws.11)",
+ "https://strontic.github.io/xcyclopedia/library/setres.exe-0E30E4C09637D7A128A37B59A3BC4D09.html",
+ "https://twitter.com/0gtweet/status/1583356502340870144",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_setres.yml"
],
"tags": [
@@ -43969,11 +44443,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware",
"https://labs.sentinelone.com/egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone",
"https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a",
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware",
"https://www.splunk.com/en_us/blog/security/darkside-ransomware-splunk-threat-update-and-detections.html",
- "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rclone_execution.yml"
],
"tags": [
@@ -44006,9 +44480,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
"https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cmd_shadowcopy_access.yml"
],
"tags": [
@@ -44041,9 +44515,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/haroonmeer/status/939099379834658817",
"https://twitter.com/c_APT_ure/status/939475433711722497",
"https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html",
+ "https://twitter.com/haroonmeer/status/939099379834658817",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_builtin_commands_recon.yml"
],
"tags": [
@@ -44404,8 +44878,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/an0n_r0/status/1474698356635193346?s=12",
"https://twitter.com/mrd0x/status/1475085452784844803?s=12",
+ "https://twitter.com/an0n_r0/status/1474698356635193346?s=12",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_download_office_domain.yml"
],
"tags": "No established tags"
@@ -44533,8 +45007,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/DefaultPack/",
"https://www.echotrail.io/insights/search/defaultpack.exe",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/DefaultPack/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_defaultpack.yml"
],
"tags": [
@@ -44571,8 +45045,8 @@
"refs": [
"https://twitter.com/gN3mes1s/status/1206874118282448897",
"https://securityboulevard.com/2019/08/agent-tesla-evading-edr-by-removing-api-hooks/",
- "https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf",
"https://app.any.run/tasks/c6993447-d1d8-414e-b856-675325e5aa09/",
+ "https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_csc_folder.yml"
],
"tags": [
@@ -44702,6 +45176,58 @@
"uuid": "18739897-21b1-41da-8ee4-5b786915a676",
"value": "GALLIUM Artefacts"
},
+ {
+ "description": "Detects suspicious and uncommon child processes of WmiPrvSE",
+ "meta": {
+ "author": "Vadim Khrykov (ThreatIntel), Cyb3rEng",
+ "creation_date": "2021/08/23",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_wmiprvse_susp_child_processes.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://blog.osarmor.com/319/onenote-attachment-delivers-asyncrat-malware/",
+ "https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmiprvse_susp_child_processes.yml"
+ ],
+ "tags": [
+ "attack.execution",
+ "attack.defense_evasion",
+ "attack.t1047",
+ "attack.t1204.002",
+ "attack.t1218.010"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "01a5a209-b94c-450b-b7f9-946497d91055",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "232b7f21-adf9-4b42-b936-b9d6f7df856e",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "b97f1d35-4249-4486-a6b5-ee60ccf24fab",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "8a582fe2-0882-4b89-a82a-da6b2dc32937",
+ "value": "Suspicious WmiPrvse Child Process Spawned"
+ },
{
"description": "Detects suspicious command line patterns as seen being used by MERCURY threat actor",
"meta": {
@@ -44962,6 +45488,49 @@
"uuid": "ca621ba5-54ab-4035-9942-d378e6fcde3c",
"value": "HandleKatz LSASS Dumper Usage"
},
+ {
+ "description": "Detect usage of the \"sqlite\" binary to query databases in Firefox and other Gecko-based browsers for potential data stealing.",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2022/04/08",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_sqlite_firefox_gecko_profile_data.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1539/T1539.md#atomic-test-1---steal-firefox-cookies-windows",
+ "https://blog.cyble.com/2022/04/21/prynt-stealer-a-new-info-stealer-performing-clipper-and-keylogger-activities/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sqlite_firefox_gecko_profile_data.yml"
+ ],
+ "tags": [
+ "attack.credential_access",
+ "attack.t1539",
+ "attack.collection",
+ "attack.t1005"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "10ffac09-e42d-4f56-ab20-db94c67d76ff",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "3c4a2599-71ee-4405-ba1e-0e28414b4bc5",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "4833155a-4053-4c9c-a997-777fcea0baa7",
+ "value": "SQLite Firefox Profile Data DB Access"
+ },
{
"description": "Detects a suspicious Microsoft certutil execution with sub commands like 'decode' sub command, which is sometimes used to decode malicious code",
"meta": {
@@ -44975,11 +45544,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/",
"https://twitter.com/JohnLaTwC/status/835149808817991680",
- "https://lolbas-project.github.io/lolbas/Binaries/Certutil/",
"https://blogs.technet.microsoft.com/pki/2006/11/30/basic-crl-checking-with-certutil/",
"https://twitter.com/egre55/status/1087685529016193025",
- "https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Certutil/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_certutil_command.yml"
],
"tags": [
@@ -45055,8 +45624,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://tools.thehacker.recipes/mimikatz/modules",
"Internal Research",
+ "https://tools.thehacker.recipes/mimikatz/modules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_system_user_anomaly.yml"
],
"tags": "No established tags"
@@ -45221,8 +45790,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
"https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-FodHelperBypass.ps1#L64",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_empire_uac_bypass.yml"
],
"tags": [
@@ -45290,10 +45859,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_uncommon_targetfolder.yml"
],
"tags": [
@@ -45471,8 +46040,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation",
"https://technet.microsoft.com/en-us/library/cc754243(v=ws.11).aspx",
+ "https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cmdkey_recon.yml"
],
"tags": [
@@ -45505,10 +46074,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder.yml"
],
"tags": [
@@ -45585,10 +46154,11 @@
"logsource.product": "windows",
"refs": [
"https://hunter2.gitbook.io/darthsidious/other/war-stories/domain-admin-in-30-minutes",
- "https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
"https://pentestlab.blog/2017/04/13/hot-potato/",
- "https://hunter2.gitbook.io/darthsidious/execution/responder-with-ntlm-relay-and-empire",
"https://github.com/ohpe/juicy-potato",
+ "https://hunter2.gitbook.io/darthsidious/execution/responder-with-ntlm-relay-and-empire",
+ "https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
+ "https://www.localpotato.com/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_tools_relay_attacks.yml"
],
"tags": [
@@ -45655,8 +46225,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://nmap.org/ncat/",
"https://www.revshells.com/",
+ "https://nmap.org/ncat/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netcat_execution.yml"
],
@@ -45724,8 +46294,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil",
- "https://abuse.io/lockergoga.txt",
"https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63",
+ "https://abuse.io/lockergoga.txt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_etw_trace_evasion.yml"
],
"tags": [
@@ -45751,10 +46321,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
"https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/resolver.py#L178",
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191",
"https://github.com/EmpireProject/Empire/blob/c2ba61ca8d2031dad0cfc1d5770ba723e8b710db/lib/common/helpers.py#L165",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_empire_launch.yml"
],
"tags": [
@@ -45800,9 +46370,9 @@
"value": "Password Cracking with Hashcat"
},
{
- "description": "Threat actors can use the PsLogList utility to dump event log in order to extract admin accounts and perform account discovery.",
+ "description": "Detects usage of the PsLogList utility to dump event log in order to extract admin accounts and perform account discovery or delete events logs",
"meta": {
- "author": "Nasreddine Bencherchali @nas_bench",
+ "author": "Nasreddine Bencherchali",
"creation_date": "2021/12/18",
"falsepositive": [
"Another tool that uses the command line switches of PsLogList",
@@ -45813,9 +46383,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Sysinternals/PsLogList",
- "https://research.nccgroup.com/2021/01/12/abusing-cloud-services-to-fly-under-the-radar/",
"https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos",
+ "https://research.nccgroup.com/2021/01/12/abusing-cloud-services-to-fly-under-the-radar/",
+ "https://twitter.com/EricaZelic/status/1614075109827874817",
+ "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Sysinternals/PsLogList",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psloglist.yml"
],
"tags": [
@@ -45850,9 +46421,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/frack113/status/1555830623633375232",
"https://www.acunetix.com/blog/articles/windows-short-8-3-filenames-web-security-problem/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc959352(v=technet.10)?redirectedfrom=MSDN",
- "https://twitter.com/frack113/status/1555830623633375232",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ntfs_short_name_path_use_cli.yml"
],
"tags": [
@@ -45951,9 +46522,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_ext.yml"
],
"tags": [
@@ -46121,11 +46692,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/885553465417756673",
"https://twitter.com/Hexacorn/status/885570278637678592",
- "http://www.windowsinspired.com/understanding-the-command-line-string-and-arguments-received-by-a-windows-program/",
- "https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html",
"https://twitter.com/vysecurity/status/885545634958385153",
+ "https://twitter.com/Hexacorn/status/885553465417756673",
+ "https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html",
+ "http://www.windowsinspired.com/understanding-the-command-line-string-and-arguments-received-by-a-windows-program/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cli_escape.yml"
],
"tags": [
@@ -46215,9 +46786,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://processhacker.sourceforge.io/",
"https://github.com/winsiderss/systeminformer",
"https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/",
+ "https://processhacker.sourceforge.io/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_process_hacker.yml"
],
"tags": "No established tags"
@@ -46238,8 +46809,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://pentestlab.blog/2017/03/31/insecure-registry-permissions/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_possible_privilege_escalation_via_service_reg_perm.yml"
],
"tags": [
@@ -46319,8 +46890,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Winget/",
"https://docs.microsoft.com/en-us/windows/package-manager/winget/install#local-install",
+ "https://lolbas-project.github.io/lolbas/Binaries/Winget/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_execution_via_winget.yml"
],
"tags": [
@@ -46553,9 +47124,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://ss64.com/ps/foreach-object.htmll",
"https://ss64.com/nt/for.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md",
+ "https://ss64.com/ps/foreach-object.htmll",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_network_scan_loop.yml"
],
"tags": [
@@ -46611,8 +47182,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus/Genshin%20Impact%20Figure%2010.jpg",
"https://www.trellix.com/en-sg/about/newsroom/stories/threat-labs/lockergoga-ransomware-family-used-in-targeted-attacks.html",
+ "https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus/Genshin%20Impact%20Figure%2010.jpg",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_service_stop.yml"
],
"tags": [
@@ -46754,8 +47325,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mattifestation/status/1196390321783025666",
"https://twitter.com/oulusoyum/status/1191329746069655553",
+ "https://twitter.com/mattifestation/status/1196390321783025666",
"https://lolbas-project.github.io/lolbas/Binaries/Tttracer/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_tttracer_mod_load.yml"
],
@@ -46798,9 +47369,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
- "https://redcanary.com/threat-detection-report/threats/qbot/",
"https://thedfirreport.com/2022/10/31/follina-exploit-leads-to-domain-compromise/",
+ "https://redcanary.com/threat-detection-report/threats/qbot/",
+ "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_esentutl_webcache.yml"
],
"tags": [
@@ -46886,9 +47457,9 @@
"logsource.product": "windows",
"refs": [
"https://www.softpedia.com/get/Antivirus/Removal-Tools/ithurricane-PowerTool.shtml",
- "https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/",
"https://www.trendmicro.com/en_us/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html",
"https://twitter.com/gbti_sa/status/1249653895900602375?lang=en",
+ "https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powertool_execution.yml"
],
"tags": [
@@ -47142,8 +47713,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/med0x2e/vba2clr",
"https://learn.microsoft.com/en-us/previous-versions/office/troubleshoot/office-developer/automate-word-create-file-using-visual-basic",
+ "https://github.com/med0x2e/vba2clr",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_svchost_child.yml"
],
"tags": [
@@ -47259,9 +47830,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
"https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
- "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regini.yml"
],
"tags": [
@@ -47318,8 +47889,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/blackorbird/status/1140519090961825792",
"https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html",
+ "https://twitter.com/blackorbird/status/1140519090961825792",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_double_extension.yml"
],
"tags": [
@@ -47489,8 +48060,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_proxy_exec_wmic.yml"
],
"tags": [
@@ -47540,8 +48111,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1461041276514623491c19-ps",
"https://twitter.com/tccontre18/status/1480950986650832903",
+ "https://twitter.com/mrd0x/status/1461041276514623491c19-ps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_http_pattern.yml"
],
"tags": [
@@ -47719,8 +48290,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/ShadowChasing1/status/1552595370961944576",
"https://www.virustotal.com/gui/file/a63376ee1dba76361df73338928e528ca5b20171ea74c24581605366dcaa0104/behavior",
+ "https://twitter.com/ShadowChasing1/status/1552595370961944576",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_net_use.yml"
],
"tags": [
@@ -47964,8 +48535,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks-create",
- "http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks-change",
+ "http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_schtasks_schedule_type.yml"
],
"tags": [
@@ -48023,8 +48594,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Bginfo/",
+ "https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_bginfo.yml"
],
"tags": [
@@ -48134,11 +48705,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
- "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
- "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
- "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://thedfirreport.com/2020/05/08/adfind-recon/",
+ "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
+ "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
+ "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
+ "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
"https://www.joeware.net/freetools/tools/adfind/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_adfind.yml"
],
@@ -48218,8 +48789,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys",
"https://app.any.run/tasks/9c0f37bc-867a-4314-b685-e101566766d7/",
+ "https://docs.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_reg_add_run_key.yml"
],
"tags": [
@@ -48446,8 +49017,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://labs.sentinelone.com/the-anatomy-of-an-apt-attack-and-cobaltstrike-beacons-encoded-configuration/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://ss64.com/bash/rar.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rar_flags.yml"
],
@@ -48611,8 +49182,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/klinix5/InstallerFileTakeOver",
"https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
+ "https://github.com/klinix5/InstallerFileTakeOver",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_lpe_cve_2021_41379.yml"
],
"tags": [
@@ -48846,8 +49417,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://persistence-info.github.io/Data/wpbbin.html",
"https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
+ "https://persistence-info.github.io/Data/wpbbin.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wpbbin_persistence.yml"
],
"tags": [
@@ -48906,14 +49477,14 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/776122138063409152",
- "https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
- "https://github.com/SigmaHQ/sigma/issues/3742",
"https://github.com/keyboardcrunch/SentinelOne-ATTACK-Queries/blob/6a228d23eefe963ca81f2d52f94b815f61ef5ee0/Tactics/DefenseEvasion.md#t1055-process-injection",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://twitter.com/gN3mes1s/status/941315826107510784",
+ "https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
+ "https://github.com/SigmaHQ/sigma/issues/3742",
"https://reaqta.com/2017/12/mavinject-microsoft-injector/",
+ "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_mavinject_process_injection.yml"
],
"tags": [
@@ -49078,12 +49649,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
- "https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf",
"https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
- "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
- "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Other/Advanced%20IP%20Scanner",
"https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer",
+ "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
+ "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Other/Advanced%20IP%20Scanner",
+ "https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf",
+ "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_advanced_ip_scanner.yml"
],
"tags": [
@@ -49108,8 +49679,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/detection-rules/blob/dd224fb3f81d0b4bf8593c5f02a029d647ba2b2d/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml",
"https://twitter.com/med0x2e/status/1520402518685200384",
+ "https://github.com/elastic/detection-rules/blob/dd224fb3f81d0b4bf8593c5f02a029d647ba2b2d/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ntlmrelay.yml"
],
"tags": [
@@ -49315,6 +49886,29 @@
"uuid": "1dd05363-104e-4b4a-b963-196a534b03a1",
"value": "Suspicious Mofcomp Execution"
},
+ {
+ "description": "Detects suspicious sub processes started by the Manage Engine ServiceDesk Plus Java web service process",
+ "meta": {
+ "author": "Florian Roth",
+ "creation_date": "2023/01/18",
+ "falsepositive": [
+ "Legitimate sub processes started by Manage Engine ServiceDesk Pro"
+ ],
+ "filename": "proc_creation_win_susp_manageengine_pattern.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://blog.viettelcybersecurity.com/saml-show-stopper/",
+ "https://github.com/horizon3ai/CVE-2022-47966/blob/3a51c6b72ebbd87392babd955a8fbeaee2090b35/CVE-2022-47966.py",
+ "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_manageengine_pattern.yml"
+ ],
+ "tags": "No established tags"
+ },
+ "uuid": "cea2b7ea-792b-405f-95a1-b903ea06458f",
+ "value": "Manage Engine Java Suspicious Sub Process"
+ },
{
"description": "Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities",
"meta": {
@@ -49353,9 +49947,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://app.any.run/tasks/210244b9-0b6b-4a2c-83a3-04bd3175d017/",
"https://www.winhelponline.com/blog/enable-and-disable-windows-firewall-quickly-using-command-line/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md#atomic-test-1---disable-microsoft-defender-firewall",
- "https://app.any.run/tasks/210244b9-0b6b-4a2c-83a3-04bd3175d017/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_netsh_firewall_disable.yml"
],
"tags": [
@@ -49457,8 +50051,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.mdsec.co.uk/2022/10/analysing-lastpass-part-1/",
"https://github.com/defaultnamehere/cookie_crimes/",
+ "https://www.mdsec.co.uk/2022/10/analysing-lastpass-part-1/",
"https://github.com/wunderwuzzi23/firefox-cookiemonster",
"https://yoroi.company/wp-content/uploads/2022/05/EternityGroup_report_compressed.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_browser_remote_debugging.yml"
@@ -49541,8 +50135,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406",
+ "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_pingback_backdoor.yml"
],
"tags": [
@@ -49556,7 +50150,7 @@
{
"description": "Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.",
"meta": {
- "author": "Matthew Green - @mgreen27, Florian Roth",
+ "author": "Matthew Green - @mgreen27, Florian Roth, frack113",
"creation_date": "2019/06/15",
"falsepositive": [
"Custom applications use renamed binaries adding slight change to binary name. Typically this is easy to spot and add to whitelist"
@@ -49567,12 +50161,16 @@
"logsource.product": "windows",
"refs": [
"https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
+ "https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks",
"https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
+ "https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/",
+ "https://twitter.com/christophetd/status/1164506034720952320",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant.yml"
],
"tags": [
"attack.defense_evasion",
- "attack.t1036.003"
+ "attack.t1036.003",
+ "car.2013-05-009"
]
},
"related": [
@@ -49585,7 +50183,7 @@
}
],
"uuid": "0ba1da6d-b6ce-4366-828c-18826c9de23e",
- "value": "Highly Relevant Renamed Binary"
+ "value": "Potential Defense Evasion Via Rename Of Highly Relevant Binaries"
},
{
"description": "Identifies use of the bcdedit command to delete boot configuration data. This tactic is sometimes used as by malware or an attacker as a destructive technique.",
@@ -49725,8 +50323,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=2288",
"https://www.hybrid-analysis.com/sample/f2943f5e45befa52fb12748ca7171d30096e1d4fc3c365561497c618341299d5?environmentId=100",
+ "https://adsecurity.org/?p=2288",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_sysvol_access.yml"
],
"tags": [
@@ -49819,8 +50417,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://lolbas-project.github.io/lolbas/Binaries/Regedit/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regedit_export_critical_keys.yml"
],
"tags": [
@@ -49877,9 +50475,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
- "https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
+ "https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
+ "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wab_unusual_parents.yml"
],
"tags": [
@@ -49929,8 +50527,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_install_reg_debugger_backdoor.yml"
],
"tags": [
@@ -49988,8 +50586,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/1e1ef6be-12fc-11e9-8d76-4d6bb837cda4.html",
"https://eqllib.readthedocs.io/en/latest/analytics/210b4ea4-12fc-11e9-8d76-4d6bb837cda4.html",
+ "https://eqllib.readthedocs.io/en/latest/analytics/1e1ef6be-12fc-11e9-8d76-4d6bb837cda4.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lsass_dump.yml"
],
@@ -50056,8 +50654,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/cfc8870b-ccd7-4210-88cf-a8087476a6d0",
"https://app.any.run/tasks/c28cabc8-a19f-40f3-a78b-cae506a5c0d4",
+ "https://app.any.run/tasks/cfc8870b-ccd7-4210-88cf-a8087476a6d0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_attrib_system_susp_paths.yml"
],
"tags": [
@@ -50123,8 +50721,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://securelist.com/schroedingers-petya/78870/",
"https://www.hybrid-analysis.com/sample/64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1?environmentId=100",
+ "https://securelist.com/schroedingers-petya/78870/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_notpetya.yml"
],
"tags": [
@@ -50175,8 +50773,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://asec.ahnlab.com/en/38156/",
"https://github.com/fatedier/frp",
+ "https://asec.ahnlab.com/en/38156/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_frp.yml"
],
"tags": [
@@ -50210,8 +50808,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
"https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
+ "https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_binary.yml"
],
"tags": [
@@ -50229,7 +50827,7 @@
}
],
"uuid": "36480ae1-a1cb-4eaa-a0d6-29801d7e9142",
- "value": "Renamed Binary"
+ "value": "Potential Defense Evasion Via Binary Rename"
},
{
"description": "Detects the malicious use of a control panel item",
@@ -50307,6 +50905,31 @@
"uuid": "344482e4-a477-436c-aa70-7536d18a48c7",
"value": "Execution via MSSQL Xp_cmdshell Stored Procedure"
},
+ {
+ "description": "Detect activation of DisableRestrictedAdmin to desable RestrictedAdmin mode.\nRestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop.\nThis prevents your credentials from being harvested during the initial connection process if the remote server has been compromise\n",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/13",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_lsa_disablerestrictedadmin.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
+ "https://github.com/redcanaryco/atomic-red-team/blob/a8e3cf63e97b973a25903d3df9fd55da6252e564/atomics/T1112/T1112.md",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lsa_disablerestrictedadmin.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.t1112"
+ ]
+ },
+ "uuid": "28ac00d6-22d9-4a3c-927f-bbd770104573",
+ "value": "Disabled RestrictedAdminMode For RDS - ProcCreation"
+ },
{
"description": "Dump sam, system or security hives using REG.exe utility",
"meta": {
@@ -50320,10 +50943,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md",
- "https://eqllib.readthedocs.io/en/latest/analytics/aed95fc6-5e3f-49dc-8b35-06508613f979.html",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://eqllib.readthedocs.io/en/latest/analytics/aed95fc6-5e3f-49dc-8b35-06508613f979.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_grabbing_sensitive_hives_via_reg.yml"
],
"tags": [
@@ -50373,11 +50996,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
- "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
- "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
- "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://thedfirreport.com/2020/05/08/adfind-recon/",
+ "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
+ "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
+ "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
+ "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
"https://www.joeware.net/freetools/tools/adfind/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_adfind_usage.yml"
],
@@ -50421,10 +51044,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://en.wikipedia.org/wiki/Hangul_(word_processor)",
- "https://twitter.com/cyberwar_15/status/1187287262054076416",
"https://www.securitynewspaper.com/2016/11/23/technical-teardown-exploit-malware-hwp-files/",
+ "https://en.wikipedia.org/wiki/Hangul_(word_processor)",
"https://www.hybrid-analysis.com/search?query=context:74940dcc5b38f9f9b1a0fea760d344735d7d91b610e6d5bd34533dd0153402c5&from_sample=5db135000388385a7644131f&block_redirect=1",
+ "https://twitter.com/cyberwar_15/status/1187287262054076416",
"https://blog.alyac.co.kr/1901",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hwp_exploits.yml"
],
@@ -50535,8 +51158,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/kagancapar/CVE-2022-29072",
"https://twitter.com/kagancapar/status/1515219358234161153",
+ "https://github.com/kagancapar/CVE-2022-29072",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_7zip_cve_2022_29072.yml"
],
"tags": [
@@ -50559,8 +51182,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/quarkslab/quarkspwdump",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/seedworm-apt-iran-middle-east",
+ "https://github.com/quarkslab/quarkspwdump",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_quarks_pwdump.yml"
],
"tags": [
@@ -50626,9 +51249,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Cdb/",
"https://twitter.com/nas_bench/status/1534957360032120833",
"https://web.archive.org/web/20170715043507/http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Cdb/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_cdb.yml"
],
"tags": [
@@ -50678,8 +51301,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tutorial-for-ntds-goodness-vssadmin-wmis-ntdsdit-system/",
"https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tutorial-for-ntds-goodness-vssadmin-wmis-ntdsdit-system/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_shadow_copies_creation.yml"
],
"tags": [
@@ -50761,8 +51384,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_remote_service.yml"
],
"tags": [
@@ -51059,8 +51682,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/",
"https://threatpost.com/maze-ransomware-ragnar-locker-virtual-machine/159350/",
+ "https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_run_virtualbox.yml"
],
"tags": [
@@ -51134,9 +51757,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.echotrail.io/insights/search/mshta.exe",
- "https://en.wikipedia.org/wiki/HTML_Application",
"https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/",
+ "https://en.wikipedia.org/wiki/HTML_Application",
+ "https://www.echotrail.io/insights/search/mshta.exe",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_mshta_pattern.yml"
],
"tags": [
@@ -51191,8 +51814,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/3proxy/3proxy",
"https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
+ "https://github.com/3proxy/3proxy",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_3proxy_usage.yml"
],
"tags": [
@@ -51212,6 +51835,31 @@
"uuid": "f38a82d2-fba3-4781-b549-525efbec8506",
"value": "3Proxy Usage"
},
+ {
+ "description": "Detect usage of the \"driverquery\" utility to perform reconnaissance on installed drivers",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/19",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_driverquery_recon.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
+ "https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html",
+ "https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_driverquery_recon.yml"
+ ],
+ "tags": [
+ "attack.discovery"
+ ]
+ },
+ "uuid": "9fc3072c-dc8f-4bf7-b231-18950000fadd",
+ "value": "Potential Recon Activity Using DriverQuery.EXE"
+ },
{
"description": "Detects a suspicious curl process start the adds a file to a web request",
"meta": {
@@ -51303,8 +51951,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/Tylous/ZipExec",
"https://twitter.com/SBousseaden/status/1451237393017839616",
+ "https://github.com/Tylous/ZipExec",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_zipexec.yml"
],
"tags": [
@@ -51484,9 +52132,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://guides.lib.umich.edu/c.php?g=282942&p=1885348",
- "https://blog.talosintelligence.com/2021/10/threat-hunting-in-large-datasets-by.html",
"https://thedfirreport.com/2021/11/29/continuing-the-bazar-ransomware-story/",
+ "https://blog.talosintelligence.com/2021/10/threat-hunting-in-large-datasets-by.html",
+ "https://guides.lib.umich.edu/c.php?g=282942&p=1885348",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_image.yml"
],
"tags": [
@@ -51519,8 +52167,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/994405551751815170",
"https://redcanary.com/blog/lateral-movement-winrm-wmi/",
+ "https://twitter.com/bohops/status/994405551751815170",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_winrm_execution.yml"
],
"tags": [
@@ -51580,10 +52228,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1211636381086339073",
"https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/",
"https://www.elastic.co/guide/en/security/current/remote-file-copy-to-a-hidden-share.html",
"https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view",
+ "https://twitter.com/SBousseaden/status/1211636381086339073",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_copy_lateral_movement.yml"
],
"tags": [
@@ -51730,8 +52378,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://twitter.com/Alh4zr3d/status/1580925761996828672",
+ "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_using_set_service_to_hide_services.yml"
],
"tags": [
@@ -51828,9 +52476,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/jonasLyk/status/1555914501802921984",
"https://www.acunetix.com/blog/articles/windows-short-8-3-filenames-web-security-problem/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc959352(v=technet.10)?redirectedfrom=MSDN",
- "https://twitter.com/jonasLyk/status/1555914501802921984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ntfs_short_name_use_image.yml"
],
"tags": [
@@ -51850,73 +52498,6 @@
"uuid": "3ef5605c-9eb9-47b0-9a71-b727e6aa5c3b",
"value": "Use NTFS Short Name in Image"
},
- {
- "description": "Detects the execution of a renamed PowerShell often used by attackers or malware",
- "meta": {
- "author": "Florian Roth, frack113",
- "creation_date": "2019/08/22",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_renamed_powershell.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://twitter.com/christophetd/status/1164506034720952320",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_powershell.yml"
- ],
- "tags": [
- "car.2013-05-009",
- "attack.defense_evasion",
- "attack.t1036.003"
- ]
- },
- "related": [
- {
- "dest-uuid": "bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20",
- "value": "Renamed PowerShell"
- },
- {
- "description": "Detect use of sqlite binary to query the Firefox cookies.sqlite database and steal the cookie data contained within it",
- "meta": {
- "author": "frack113",
- "creation_date": "2022/04/08",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_sqlite_firefox_cookies.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1539/T1539.md#atomic-test-1---steal-firefox-cookies-windows",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sqlite_firefox_cookies.yml"
- ],
- "tags": [
- "attack.credential_access",
- "attack.t1539"
- ]
- },
- "related": [
- {
- "dest-uuid": "10ffac09-e42d-4f56-ab20-db94c67d76ff",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "4833155a-4053-4c9c-a997-777fcea0baa7",
- "value": "SQLite Firefox Cookie DB Access"
- },
{
"description": "Detects the attempt to evade or obfuscate the executed command on the CommandLine using bogus path traversal",
"meta": {
@@ -51931,8 +52512,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/hexacorn/status/1448037865435320323",
"https://twitter.com/Gal_B1t/status/1062971006078345217",
+ "https://twitter.com/hexacorn/status/1448037865435320323",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_commandline_path_traversal_evasion.yml"
],
"tags": [
@@ -52005,8 +52586,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md#atomic-test-4---infdefaultinstallexe-inf-execution",
"https://lolbas-project.github.io/lolbas/Binaries/Infdefaultinstall/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md#atomic-test-4---infdefaultinstallexe-inf-execution",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_infdefaultinstall.yml"
],
"tags": [
@@ -52074,8 +52655,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/948061991012327424",
"https://lolbas-project.github.io/lolbas/Scripts/Cl_invocation/",
+ "https://twitter.com/bohops/status/948061991012327424",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_cl_invocation.yml"
],
"tags": [
@@ -52256,27 +52837,6 @@
"uuid": "7f43c430-5001-4f8b-aaa9-c3b88f18fa5c",
"value": "Execute From Alternate Data Streams"
},
- {
- "description": "Detects the execution of rundll32.exe that has been renamed to a different name to avoid detection",
- "meta": {
- "author": "Florian Roth",
- "creation_date": "2022/06/08",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_renamed_rundll32.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_rundll32.yml"
- ],
- "tags": "No established tags"
- },
- "uuid": "d4d2574f-ac17-4d9e-b986-aeeae0dc8fe2",
- "value": "Renamed Rundll32.exe Execution"
- },
{
"description": "Detect malicious GPO modifications can be used to implement many other malicious behaviors.",
"meta": {
@@ -52324,8 +52884,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_JohnHammond/status/1531672601067675648",
"https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
+ "https://twitter.com/_JohnHammond/status/1531672601067675648",
"https://twitter.com/nao_sec/status/1530196847679401984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msdt.yml"
],
@@ -52344,7 +52904,7 @@
}
],
"uuid": "258fc8ce-8352-443a-9120-8a11e4857fa5",
- "value": "Execute Arbitrary Commands Using MSDT.EXE"
+ "value": "Potential Arbitrary Command Execution Using MSDT.EXE"
},
{
"description": "Adversaries may search the Registry on compromised systems for insecurely stored credentials.\nThe Windows Registry stores configuration information that can be used by the system or other programs.\nAdversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs or services\n",
@@ -52425,11 +52985,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blog.truesec.com/2021/03/07/exchange-zero-day-proxylogon-and-hafnium/",
"https://twitter.com/GadixCRK/status/1369313704869834753?s=20",
- "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
- "https://twitter.com/BleepinComputer/status/1372218235949617161",
"https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3",
+ "https://twitter.com/BleepinComputer/status/1372218235949617161",
+ "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
+ "https://blog.truesec.com/2021/03/07/exchange-zero-day-proxylogon-and-hafnium/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_hafnium.yml"
],
"tags": [
@@ -53020,8 +53580,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1112/T1112.md",
"https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1562.001/T1562.001.md",
+ "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1112/T1112.md",
"https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_reg_add.yml"
],
@@ -53047,8 +53607,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Yasser_Elsnbary/status/1553804135354564608",
"https://h.43z.one/ipconverter/",
+ "https://twitter.com/Yasser_Elsnbary/status/1553804135354564608",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_obfuscated_ip_via_cli.yml"
],
"tags": [
@@ -53106,8 +53666,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.echotrail.io/insights/search/regsvr32.exe",
"https://redcanary.com/blog/intelligence-insights-april-2022/",
+ "https://www.echotrail.io/insights/search/regsvr32.exe",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_spawn_explorer.yml"
],
"tags": [
@@ -53175,9 +53735,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blu3-team.blogspot.com/2019/08/powershell-dns-c2-notes.html",
- "https://ragged-lab.blogspot.com/2020/06/it-is-always-dns-powershell-edition.html",
"https://github.com/lukebaggett/dnscat2-powershell",
+ "https://ragged-lab.blogspot.com/2020/06/it-is-always-dns-powershell-edition.html",
+ "https://blu3-team.blogspot.com/2019/08/powershell-dns-c2-notes.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dnscat2_powershell_implementation.yml"
],
"tags": [
@@ -53275,9 +53835,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://digital-forensics.sans.org/blog/2010/06/04/wmic-draft/",
"https://blog.malwarebytes.com/threat-analysis/2016/04/rokku-ransomware/",
"https://www.hybrid-analysis.com/sample/4be06ecd234e2110bd615649fe4a6fa95403979acf889d7e45a78985eb50acf9?environmentId=1",
- "https://digital-forensics.sans.org/blog/2010/06/04/wmic-draft/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_execution.yml"
],
"tags": [
@@ -53345,8 +53905,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/r00t-3xp10it/hacking-material-books/blob/43cb1e1932c16ff1f58b755bc9ab6b096046853f/obfuscation/simple_obfuscation.md#bypass-or-avoid-amsi-by-version-downgrade-",
"http://www.leeholmes.com/blog/2017/03/17/detecting-and-preventing-powershell-downgrade-attacks/",
+ "https://github.com/r00t-3xp10it/hacking-material-books/blob/43cb1e1932c16ff1f58b755bc9ab6b096046853f/obfuscation/simple_obfuscation.md#bypass-or-avoid-amsi-by-version-downgrade-",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_downgrade_attack.yml"
],
"tags": [
@@ -53415,8 +53975,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html",
"https://www.hybrid-analysis.com/sample/8da5b75b6380a41eee3a399c43dfe0d99eeefaa1fd21027a07b1ecaa4cd96fdd?environmentId=120",
+ "https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_copy_system32.yml"
],
"tags": [
@@ -53799,8 +54359,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1123/T1123.md",
"https://eqllib.readthedocs.io/en/latest/analytics/ab7a6ef4-0983-4275-a4f1-5c6bd3c31c23.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1123/T1123.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_audio_capture.yml"
],
"tags": [
@@ -53825,9 +54385,9 @@
"logsource.product": "windows",
"refs": [
"https://nodejs.org/api/cli.html",
+ "https://www.sprocketsecurity.com/resources/crossing-the-log4j-horizon-a-vulnerability-with-no-return",
"https://www.rapid7.com/blog/post/2022/01/18/active-exploitation-of-vmware-horizon-servers/",
"http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
- "https://www.sprocketsecurity.com/resources/crossing-the-log4j-horizon-a-vulnerability-with-no-return",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_node_abuse.yml"
],
"tags": [
@@ -53860,8 +54420,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/f87f1c4e-47e2-4c46-9cf4-31454c06ce03",
"https://twitter.com/JohnLaTwC/status/1082851155481288706",
+ "https://app.any.run/tasks/f87f1c4e-47e2-4c46-9cf4-31454c06ce03",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ps_appdata.yml"
],
"tags": [
@@ -53894,9 +54454,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mattharr0ey.medium.com/privilege-escalation-uac-bypass-in-changepk-c40b92818d1b",
"https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
"https://github.com/hfiref0x/UACME",
+ "https://mattharr0ey.medium.com/privilege-escalation-uac-bypass-in-changepk-c40b92818d1b",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_changepk_slui.yml"
],
"tags": [
@@ -53930,8 +54490,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw",
"https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100",
+ "https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_cve_2017_11882.yml"
],
"tags": [
@@ -54064,10 +54624,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=2604",
- "https://thedfirreport.com/2021/11/01/from-zero-to-domain-admin/",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-7.1",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.1",
+ "https://thedfirreport.com/2021/11/01/from-zero-to-domain-admin/",
+ "https://adsecurity.org/?p=2604",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_set_policies_to_unsecure_level.yml"
],
"tags": [
@@ -54100,9 +54660,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/990717080805789697",
- "https://twitter.com/0gtweet/status/1602644163824156672?s=20&t=kuxbUnZPltpvFPZdCrqPXA",
"https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
+ "https://twitter.com/0gtweet/status/1602644163824156672?s=20&t=kuxbUnZPltpvFPZdCrqPXA",
+ "https://twitter.com/pabraeken/status/990717080805789697",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_runonce_execution.yml"
],
"tags": [
@@ -54161,8 +54721,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://taggart-tech.com/quasar-electron/",
"https://github.com/mttaggart/quasar",
+ "https://taggart-tech.com/quasar-electron/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_electron_app_children.yml"
],
"tags": [
@@ -54219,11 +54779,11 @@
"logsource.product": "windows",
"refs": [
"https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/",
+ "https://twitter.com/Hexacorn/status/1224848930795552769",
+ "https://twitter.com/SBousseaden/status/1167417096374050817",
+ "https://twitter.com/Wietze/status/1542107456507203586",
"https://twitter.com/shantanukhande/status/1229348874298388484",
"https://twitter.com/pythonresponder/status/1385064506049630211?s=21",
- "https://twitter.com/SBousseaden/status/1167417096374050817",
- "https://twitter.com/Hexacorn/status/1224848930795552769",
- "https://twitter.com/Wietze/status/1542107456507203586",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_process_dump_rundll32_comsvcs.yml"
],
"tags": [
@@ -54259,16 +54819,16 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
"https://twitter.com/_xpn_/status/1268712093928378368",
+ "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"http://managed670.rssing.com/chan-5590147/all_p1.html",
"https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
- "https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
- "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
- "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
"https://bunnyinside.com/?term=f71e8cb9c76a",
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_etw_modification_cmdline.yml"
],
"tags": [
@@ -54401,8 +54961,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/",
"https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
+ "https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_trickbot_recon_activity.yml"
],
"tags": [
@@ -54491,9 +55051,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/990758590020452353",
"https://docs.microsoft.com/en-us/visualstudio/debugger/debug-using-the-just-in-time-debugger?view=vs-2019",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Vsjitdebugger/",
+ "https://twitter.com/pabraeken/status/990758590020452353",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_vsjitdebugger_bin.yml"
],
"tags": [
@@ -54644,8 +55204,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://curl.se/docs/manpage.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1071.001/T1071.001.md#atomic-test-2---malicious-user-agents---cmd",
+ "https://curl.se/docs/manpage.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_curl_useragent.yml"
],
"tags": [
@@ -54719,7 +55279,32 @@
]
},
"uuid": "beaa66d6-aa1b-4e3c-80f5-e0145369bfaf",
- "value": "Wevtutil Recon"
+ "value": "Potential Recon Activity Using Wevtutil"
+ },
+ {
+ "description": "Detect usage of the \"driverquery\" utility. Which can be used to perform reconnaissance on installed drivers",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/19",
+ "falsepositive": [
+ "Legitimate use by third party tools in order to investigate installed drivers"
+ ],
+ "filename": "proc_creation_win_driverquery_usage.yml",
+ "level": "medium",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
+ "https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html",
+ "https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_driverquery_usage.yml"
+ ],
+ "tags": [
+ "attack.discovery"
+ ]
+ },
+ "uuid": "a20def93-0709-4eae-9bd2-31206e21e6b2",
+ "value": "DriverQuery.EXE Usage"
},
{
"description": "Suspicious behaviours related to an actor tracked by Microsoft as SOURGUM",
@@ -54734,9 +55319,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/",
"https://www.virustotal.com/gui/file/c299063e3eae8ddc15839767e83b9808fd43418dc5a1af7e4f44b97ba53fbd3d/detection",
"https://github.com/Azure/Azure-Sentinel/blob/43e9be273dca321295190bfc4902858e009d4a35/Detections/MultipleDataSources/SOURGUM_IOC.yaml",
- "https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_sourgrum.yml"
],
"tags": [
@@ -54778,8 +55363,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
"https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_shadowcopy_deletion_via_powershell.yml"
],
"tags": [
@@ -54812,10 +55397,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/vysecurity/status/974806438316072960",
- "https://lolbas-project.github.io/lolbas/Binaries/Rpcping/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh875578(v=ws.11)",
+ "https://lolbas-project.github.io/lolbas/Binaries/Rpcping/",
"https://twitter.com/vysecurity/status/873181705024266241",
+ "https://twitter.com/vysecurity/status/974806438316072960",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rpcping.yml"
],
"tags": [
@@ -54848,8 +55433,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
"https://twitter.com/bopin2020/status/1366400799199272960",
+ "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml"
],
"tags": [
@@ -54883,8 +55468,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1216/T1216.md",
+ "https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_vbs_execute_psh.yml"
],
"tags": [
@@ -54925,9 +55510,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/jpillora/chisel/",
"https://blog.sekoia.io/lucky-mouse-incident-response-to-detection-engineering/",
"https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/",
- "https://github.com/jpillora/chisel/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_chisel_usage.yml"
],
"tags": [
@@ -55118,8 +55703,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/",
"https://rvsec0n.wordpress.com/2020/01/24/malwares-that-bypass-windows-defender/",
+ "https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_disable_defender_av_security_monitoring.yml"
],
@@ -55144,8 +55729,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/e491ce22-792f-11e9-8f5c-d46d6d62a49e.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/e491ce22-792f-11e9-8f5c-d46d6d62a49e.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_fodhelper.yml"
],
"tags": [
@@ -55605,9 +56190,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/",
"https://docs.microsoft.com/en-us/powershell/module/bitstransfer/add-bitsfile?view=windowsserver2019-ps",
"https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell",
+ "https://4sysops.com/archives/use-powershell-to-download-a-file-with-http-https-and-ftp/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_web_request_cmd_and_cmdlets.yml"
],
"tags": [
@@ -55673,10 +56258,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/84fc9b4a-ea2b-47b1-8aa6-9014402dfb56/",
"https://app.any.run/tasks/81f3c28c-c686-425d-8a2b-a98198d244e1/",
- "https://app.any.run/tasks/97f875e8-0e08-4328-815f-055e971ba754/",
"https://app.any.run/tasks/e13ab713-64cf-4b23-ad93-6dceaa5429ac/",
+ "https://app.any.run/tasks/84fc9b4a-ea2b-47b1-8aa6-9014402dfb56/",
+ "https://app.any.run/tasks/97f875e8-0e08-4328-815f-055e971ba754/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_emotet.yml"
],
"tags": [
@@ -55712,9 +56297,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
- "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
+ "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
+ "https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_net_recon.yml"
],
"tags": [
@@ -55794,48 +56379,6 @@
"uuid": "07e3cb2c-0608-410d-be4b-1511cb1a0448",
"value": "Tamper Windows Defender Remove-MpPreference"
},
- {
- "description": "Detects WMI spawning a PowerShell process",
- "meta": {
- "author": "Markus Neis / @Karneades",
- "creation_date": "2019/04/03",
- "falsepositive": [
- "AppvClient",
- "CCM"
- ],
- "filename": "proc_creation_win_wmi_spwns_powershell.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://any.run/report/68bc255f9b0db6a0d30a8f2dadfbee3256acfe12497bf93943bc1eab0735e45e/a2385d6f-34f7-403c-90d3-b1f9d2a90a5e",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmi_spwns_powershell.yml"
- ],
- "tags": [
- "attack.execution",
- "attack.t1047",
- "attack.t1059.001"
- ]
- },
- "related": [
- {
- "dest-uuid": "01a5a209-b94c-450b-b7f9-946497d91055",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- },
- {
- "dest-uuid": "970a3432-3237-47ad-bcca-7d8cbb217736",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "692f0bec-83ba-4d04-af7e-e884a96059b6",
- "value": "WMI Spawning Windows PowerShell"
- },
{
"description": "Detects adding and using Exchange PowerShell snap-ins to export mailbox data. As seen used by HAFNIUM and APT27",
"meta": {
@@ -55849,9 +56392,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://www.intrinsec.com/apt27-analysis/",
- "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_snapins_hafnium.yml"
],
"tags": [
@@ -55996,9 +56539,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Verclsid/",
"https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/",
"https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5",
+ "https://lolbas-project.github.io/lolbas/Binaries/Verclsid/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_verclsid_runs_com.yml"
],
"tags": [
@@ -56056,8 +56599,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/f16c729aad5c74f19784a24257236a8bbe27f7cdc4a89806031ec7f1bebbd475?environmentId=100",
"https://www.hybrid-analysis.com/sample/3a1f01206684410dbe8f1900bbeaaa543adfcd07368ba646b499fa5274b9edf6?environmentId=100",
+ "https://www.hybrid-analysis.com/sample/f16c729aad5c74f19784a24257236a8bbe27f7cdc4a89806031ec7f1bebbd475?environmentId=100",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cmd_http_appdata.yml"
],
"tags": [
@@ -56175,8 +56718,8 @@
"logsource.product": "windows",
"refs": [
"https://www.joesandbox.com/analysis/411752/0/html#7048BB9A06B8F2DD9D24C77F389D7B2B58D2",
- "https://app.any.run/tasks/8b9a571b-bcc1-4783-ba32-df4ba623b9c0/",
"https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html",
+ "https://app.any.run/tasks/8b9a571b-bcc1-4783-ba32-df4ba623b9c0/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mal_darkside_ransomware.yml"
],
"tags": [
@@ -56320,8 +56863,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)",
"https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf",
+ "https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netsh_fw_add.yml"
],
"tags": [
@@ -56354,8 +56897,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.011/T1218.011.md",
"https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.011/T1218.011.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_script_run.yml"
],
"tags": [
@@ -56446,10 +56989,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/antonioCoco/RogueWinRM",
- "https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
"https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://twitter.com/Cyb3rWard0g/status/1453123054243024897",
+ "https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
+ "https://github.com/antonioCoco/RogueWinRM",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_child_process_as_system_.yml"
],
"tags": [
@@ -56482,11 +57025,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/",
- "https://community.sophos.com/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers",
- "https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/",
"https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b",
+ "https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/",
+ "https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/",
"https://www.joesandbox.com/analysis/443736/0/html",
+ "https://community.sophos.com/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_revil_kaseya.yml"
],
"tags": [
@@ -56520,8 +57063,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Yasser_Elsnbary/status/1553804135354564608",
"https://h.43z.one/ipconverter/",
+ "https://twitter.com/Yasser_Elsnbary/status/1553804135354564608",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_obfuscated_ip_download.yml"
],
"tags": [
@@ -56545,8 +57088,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
- "https://redcanary.com/threat-detection-report/",
"https://www.cobaltstrike.com/help-windows-executable",
+ "https://redcanary.com/threat-detection-report/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cobaltstrike_load_by_rundll32.yml"
],
"tags": [
@@ -56613,7 +57156,7 @@
"value": "Network Sniffing"
},
{
- "description": "Detects a suspicious parents of powershell.exe process",
+ "description": "Detects a suspicious or uncommon parent processes of PowerShell",
"meta": {
"author": "Teymur Kheirkhabarov, Harish Segar (rule)",
"creation_date": "2020/03/20",
@@ -56658,10 +57201,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.picussecurity.com/resource/blog/how-to-detect-parent-pid-ppid-spoofing-attacks",
- "https://www.virustotal.com/gui/search/filename%253A*spoof*%2520filename%253A*ppid*/files",
"https://www.ired.team/offensive-security/defense-evasion/parent-process-id-ppid-spoofing",
"https://pentestlab.blog/2020/02/24/parent-pid-spoofing/",
+ "https://www.picussecurity.com/resource/blog/how-to-detect-parent-pid-ppid-spoofing-attacks",
+ "https://www.virustotal.com/gui/search/filename%253A*spoof*%2520filename%253A*ppid*/files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_selectmyparent.yml"
],
"tags": [
@@ -56694,10 +57237,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
"https://twitter.com/splinter_code/status/1483815103279603714",
"https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/",
"https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
+ "https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_advancedrun_priv_user.yml"
],
"tags": "No established tags"
@@ -56718,9 +57261,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd",
"https://lolbas-project.github.io/lolbas/Binaries/Dnscmd/",
"https://docs.microsoft.com/en-us/azure/dns/dns-zones-records",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dnscmd_discovery.yml"
],
"tags": [
@@ -56821,9 +57364,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-20---powershell-invoke-known-malicious-cmdlets",
"https://unit42.paloaltonetworks.com/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/",
"https://mikefrobbins.com/2017/06/15/simple-obfuscation-with-powershell-using-base64-encoding/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-20---powershell-invoke-known-malicious-cmdlets",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_encode.yml"
],
"tags": [
@@ -56889,8 +57432,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
"http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_atbroker.yml"
],
"tags": [
@@ -56958,8 +57501,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Rasautou/",
"https://www.fireeye.com/blog/threat-research/2019/10/staying-hidden-on-the-endpoint-evading-detection-with-shellcode.html",
+ "https://lolbas-project.github.io/lolbas/Binaries/Rasautou/",
"https://github.com/fireeye/DueDLLigence",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_rasautou_dll_execution.yml"
],
@@ -57026,9 +57569,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1",
"https://github.com/tevora-threat/SharpView/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1049/T1049.md#atomic-test-4---system-discovery-using-sharpview",
+ "https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_sharpview.yml"
],
"tags": [
@@ -57079,8 +57622,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/",
"https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/",
+ "https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_iss_module_install.yml"
],
"tags": [
@@ -57105,8 +57648,8 @@
"logsource.product": "windows",
"refs": [
"https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control",
- "https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware/",
"https://cybercryptosec.medium.com/covid-19-cyber-infection-c615ead7c29",
+ "https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_conhost_option.yml"
],
"tags": [
@@ -57206,8 +57749,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://attack.mitre.org/software/S0108/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.007/T1546.007.md",
+ "https://attack.mitre.org/software/S0108/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_netsh_dll_persistence.yml"
],
"tags": [
@@ -57265,8 +57808,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://tools.thehacker.recipes/mimikatz/modules",
"https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://tools.thehacker.recipes/mimikatz/modules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mimikatz_command_line.yml"
],
"tags": [
@@ -57391,9 +57934,9 @@
"logsource.product": "windows",
"refs": [
"https://github.com/defaultnamehere/cookie_crimes/",
- "https://mango.pdf.zone/stealing-chrome-cookies-without-a-password",
"https://embracethered.com/blog/posts/2020/cookie-crimes-on-mirosoft-edge/",
"https://embracethered.com/blog/posts/2020/chrome-spy-remote-control/",
+ "https://mango.pdf.zone/stealing-chrome-cookies-without-a-password",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_chromium_headless_debugging.yml"
],
"tags": [
@@ -57532,8 +58075,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://cyber.wtf/2021/11/15/guess-whos-back/",
"https://paste.cryptolaemus.com/emotet/2020/12/22/emotet-malware-IoCs_12-22-20.html",
+ "https://cyber.wtf/2021/11/15/guess-whos-back/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_emotet_rundll32_execution.yml"
],
"tags": [
@@ -57624,8 +58167,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.youtube.com/watch?v=ro2QuZTIMBM",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
+ "https://www.youtube.com/watch?v=ro2QuZTIMBM",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexesvc_renamed.yml"
],
"tags": [
@@ -57648,9 +58191,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/neonprimetime/status/1435584010202255375",
"https://www.joesandbox.com/analysis/476188/1/iochtml",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444",
+ "https://twitter.com/neonprimetime/status/1435584010202255375",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_control_cve_2021_40444.yml"
],
"tags": [
@@ -57683,8 +58226,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hvs-consulting.de/lazarus-report/",
"https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/",
+ "https://www.hvs-consulting.de/lazarus-report/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_lazarus_activity_dec20.yml"
],
"tags": [
@@ -57744,9 +58287,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/sblmsrsn/status/1445758411803480072?s=20",
- "https://lolbas-project.github.io/lolbas/Binaries/Certoc/",
"https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-fe98e74189873d6df72a15df2eaa0315c59ba9cdaca93ecd68afc4ea09194ef2",
+ "https://lolbas-project.github.io/lolbas/Binaries/Certoc/",
+ "https://twitter.com/sblmsrsn/status/1445758411803480072?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_certoc_execution.yml"
],
"tags": [
@@ -57941,8 +58484,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://lolbas-project.github.io/lolbas/Binaries/Regedit/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regedit_export_keys.yml"
],
"tags": [
@@ -58072,7 +58615,7 @@
"Unknown"
],
"filename": "proc_creation_win_wmiprvse_spawning_process.yml",
- "level": "high",
+ "level": "medium",
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
@@ -58094,7 +58637,7 @@
}
],
"uuid": "d21374ff-f574-44a7-9998-4a8c8bf33d7d",
- "value": "Wmiprvse Spawning Process"
+ "value": "WmiPrvSE Spawned A Process"
},
{
"description": "Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it",
@@ -58109,8 +58652,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
"https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
+ "https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_new_network_provider.yml"
],
"tags": [
@@ -58177,8 +58720,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://dtm.uk/wuauclt/",
"https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/",
+ "https://dtm.uk/wuauclt/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proxy_execution_wuauclt.yml"
],
"tags": [
@@ -58237,8 +58780,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://the.earth.li/~sgtatham/putty/0.58/htmldoc/Chapter7.html",
"https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/",
+ "https://the.earth.li/~sgtatham/putty/0.58/htmldoc/Chapter7.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_plink.yml"
],
"tags": [
@@ -58321,10 +58864,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/mbevilacqua/appcompatprocessor/blob/6c847937c5a836e2ce2fe2b915f213c345a3c389/AppCompatSearch.txt",
"https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
"https://github.com/ThreatHuntingProject/ThreatHunting/blob/cb22598bb70651f88e0285abc8d835757d2cb596/hunts/suspicious_process_creation_via_windows_event_logs.md",
"https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses",
+ "https://github.com/mbevilacqua/appcompatprocessor/blob/6c847937c5a836e2ce2fe2b915f213c345a3c389/AppCompatSearch.txt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_execution_path.yml"
],
"tags": [
@@ -58348,8 +58891,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fortinet.com/content/dam/fortinet/assets/analyst-reports/ar-qakbot.pdf",
"https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-to-knock-them-down/",
+ "https://www.fortinet.com/content/dam/fortinet/assets/analyst-reports/ar-qakbot.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msra_process_injection.yml"
],
"tags": [
@@ -58373,9 +58916,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
- "https://isc.sans.edu/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Mechanism+-+Part+1/15394",
"http://0xthem.blogspot.com/2014/03/t-emporal-persistence-with-and-schtasks.html",
+ "https://isc.sans.edu/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Mechanism+-+Part+1/15394",
+ "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_monitoring_for_persistence_via_bits.yml"
],
"tags": [
@@ -58489,8 +59032,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/kmkz/Pentesting/blob/47592e5e160d3b86c2024f09ef04ceb87d204995/Post-Exploitation-Cheat-Sheet",
"https://twitter.com/kmkz_security/status/1220694202301976576",
+ "https://github.com/kmkz/Pentesting/blob/47592e5e160d3b86c2024f09ef04ceb87d204995/Post-Exploitation-Cheat-Sheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_rdp_hijack_shadowing.yml"
],
"tags": [
@@ -58523,9 +59066,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://securelist.com/apt-slingshot/84312/",
"https://twitter.com/cyb3rops/status/972186477512839170",
"https://github.com/adamcaudill/EquationGroupLeak/search?utf8=%E2%9C%93&q=dll_u&type=",
- "https://securelist.com/apt-slingshot/84312/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_equationgroup_dll_u_load.yml"
],
"tags": [
@@ -58559,9 +59102,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "http://www.xuetr.com/",
"https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/",
"https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/",
+ "http://www.xuetr.com/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_pchunter.yml"
],
"tags": "No established tags"
@@ -58583,13 +59126,13 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/58d21840d915aaf4040ceb89522396124c82f325282f805d1085527e1e2ccfa1/detection",
"https://cybleinc.com/2021/02/15/ngrok-platform-abused-by-hackers-to-deliver-a-new-wave-of-phishing-attacks/",
- "https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html",
- "https://www.softwaretestinghelp.com/how-to-use-ngrok/",
- "https://stackoverflow.com/questions/42442320/ssh-tunnel-to-ngrok-and-initiate-rdp",
- "https://ngrok.com/docs",
+ "https://www.virustotal.com/gui/file/58d21840d915aaf4040ceb89522396124c82f325282f805d1085527e1e2ccfa1/detection",
"https://twitter.com/xorJosh/status/1598646907802451969",
+ "https://www.softwaretestinghelp.com/how-to-use-ngrok/",
+ "https://ngrok.com/docs",
+ "https://stackoverflow.com/questions/42442320/ssh-tunnel-to-ngrok-and-initiate-rdp",
+ "https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ngrok_pua.yml"
],
"tags": [
@@ -58669,10 +59212,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/",
"https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_fsharp_interpreters.yml"
],
"tags": [
@@ -58705,8 +59248,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_applications_spawning_wmi_commandline.yml"
],
"tags": [
@@ -58756,9 +59299,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/999090532839313408",
"https://twitter.com/pabraeken/status/995837734379032576",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msdeploy/",
+ "https://twitter.com/pabraeken/status/999090532839313408",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msdeploy.yml"
],
"tags": [
@@ -58825,8 +59368,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/0ced17419e01663a0cd836c9c2eb925e3031ffb5b18ccf35f4dea5d586d0203e?environmentId=120",
"https://twitter.com/mattifestation/status/735261176745988096",
+ "https://www.hybrid-analysis.com/sample/0ced17419e01663a0cd836c9c2eb925e3031ffb5b18ccf35f4dea5d586d0203e?environmentId=120",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_amsi_bypass.yml"
],
"tags": [
@@ -58908,8 +59451,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/1477717351017680899?s=12",
"https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340",
+ "https://twitter.com/bohops/status/1477717351017680899?s=12",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/AccCheckConsole/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml"
],
@@ -58933,9 +59476,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/0gtweet/status/1564968845726580736",
"https://strontic.github.io/xcyclopedia/library/ldifde.exe-979DE101F5059CEC1D2C56967CA2BAC0.html",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731033(v=ws.11)",
+ "https://twitter.com/0gtweet/status/1564968845726580736",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ldifde_file_load.yml"
],
"tags": [
@@ -58965,7 +59508,7 @@
"value": "Suspicious Ldifde Command Usage"
},
{
- "description": "Detects a suspicious child process of a Windows shell",
+ "description": "Detects suspicious child processes of a Windows shell and scripting processes such as wscript, rundll32, powershell, mshta...etc.",
"meta": {
"author": "Florian Roth, Tim Shelton",
"creation_date": "2018/04/06",
@@ -59013,7 +59556,7 @@
}
],
"uuid": "3a6586ad-127a-4d3b-a677-1e6eacdf8fde",
- "value": "Windows Shell Spawning Suspicious Program"
+ "value": "Windows Shell/Scripting Processes Spawning Suspicious Programs"
},
{
"description": "Accesschk is an access and privilege audit tool developed by SysInternal and often being used by attacker to verify privileges",
@@ -59028,10 +59571,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/carlospolop/PEASS-ng/blob/fa0f2e17fbc1d86f1fd66338a40e665e7182501d/winPEAS/winPEASbat/winPEAS.bat",
- "https://github.com/gladiatx0r/Powerless/blob/04f553bbc0c65baf4e57344deff84e3f016e6b51/Powerless.bat",
- "https://www.youtube.com/watch?v=JGs-aKf2OtU&ab_channel=OFFZONEMOSCOW",
"https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment?slide=43",
+ "https://github.com/carlospolop/PEASS-ng/blob/fa0f2e17fbc1d86f1fd66338a40e665e7182501d/winPEAS/winPEASbat/winPEAS.bat",
+ "https://www.youtube.com/watch?v=JGs-aKf2OtU&ab_channel=OFFZONEMOSCOW",
+ "https://github.com/gladiatx0r/Powerless/blob/04f553bbc0c65baf4e57344deff84e3f016e6b51/Powerless.bat",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_accesschk_usage_after_priv_escalation.yml"
],
"tags": [
@@ -59131,10 +59674,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://blog.sygnia.co/kaseya-ransomware-supply-chain-attack",
+ "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf",
"https://www.acronis.com/en-us/blog/posts/lockbit-ransomware/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
- "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf",
- "https://blog.sygnia.co/kaseya-ransomware-supply-chain-attack",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ping_del.yml"
],
"tags": [
@@ -59352,8 +59895,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.zerodayinitiative.com/blog/2019/11/19/thanksgiving-treat-easy-as-pie-windows-7-secure-desktop-escalation-of-privilege",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1388",
+ "https://www.zerodayinitiative.com/blog/2019/11/19/thanksgiving-treat-easy-as-pie-windows-7-secure-desktop-escalation-of-privilege",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_cve_2019_1388.yml"
],
"tags": [
@@ -59419,8 +59962,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
"https://twitter.com/bopin2020/status/1366400799199272960",
+ "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml"
],
"tags": [
@@ -59545,8 +60088,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/",
"https://github.com/GhostPack/Rubeus",
+ "https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/",
"https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_rubeus.yml"
],
@@ -59660,10 +60203,10 @@
"logsource.product": "windows",
"refs": [
"https://eqllib.readthedocs.io/en/latest/analytics/4d2e7fc1-af0b-4915-89aa-03d25ba7805e.html",
- "https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1007/T1007.md#atomic-test-2---system-service-discovery---netexe",
- "https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html",
"https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/",
+ "https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html",
+ "https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_net_execution.yml"
],
"tags": [
@@ -59902,9 +60445,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf",
"https://gist.githubusercontent.com/bohops/0cc6586f205f3691e04a1ebf1806aabd/raw/baf7b29891bb91e76198e30889fbf7d6642e8974/calc_exe.inf",
"https://twitter.com/Z3Jpa29z/status/1313742350292746241?s=20",
+ "https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf",
"https://lolbas-project.github.io/lolbas/Libraries/Setupapi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_setupapi_installhinfsection.yml"
],
@@ -59973,8 +60516,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/dtrace",
"https://twitter.com/0gtweet/status/1474899714290208777?s=12",
+ "https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/dtrace",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dtrace_kernel_dump.yml"
],
"tags": "No established tags"
@@ -59995,8 +60538,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
"http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html",
+ "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_tscon_rdp_redirect.yml"
],
"tags": [
@@ -60134,8 +60677,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
+ "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lsass_shtinkering.yml"
],
"tags": [
@@ -60311,8 +60854,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html",
"https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/",
+ "https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_anomalies.yml"
],
"tags": [
@@ -60335,7 +60878,7 @@
"value": "Regsvr32 Anomaly"
},
{
- "description": "Detects when adversaries stop services or processes by disabling their respective schdueled tasks in order to conduct data destructive activities",
+ "description": "Detects when adversaries stop services or processes by disabling their respective scheduled tasks in order to conduct data destructive activities",
"meta": {
"author": "frack113, Nasreddine Bencherchali",
"creation_date": "2021/12/26",
@@ -60347,9 +60890,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://twitter.com/MichalKoczwara/status/1553634816016498688",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-8---windows---disable-the-sr-scheduled-task",
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_schtasks_disable.yml"
],
"tags": [
@@ -60449,8 +60992,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Oddvarmoe/status/993383596244258816",
"https://twitter.com/_st0pp3r_/status/1560072680887525378",
+ "https://twitter.com/Oddvarmoe/status/993383596244258816",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml"
],
"tags": [
@@ -60584,9 +61127,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222088214581825540",
"https://twitter.com/gN3mes1s/status/1222095371175911424",
- "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dctask64_proc_inject.yml"
],
"tags": [
@@ -60676,8 +61219,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Csi/",
"https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Csi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dnx.yml"
],
"tags": [
@@ -60718,10 +61261,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/commit/937db704b9148e9cee7c7010cad4d00ce9c4fdad",
- "https://bohops.com/2020/10/15/exploring-the-wdac-microsoft-recommended-block-rules-visualuiaverifynative/",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/VisualUiaVerifyNative/",
+ "https://bohops.com/2020/10/15/exploring-the-wdac-microsoft-recommended-block-rules-visualuiaverifynative/",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/commit/937db704b9148e9cee7c7010cad4d00ce9c4fdad",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_visualuiaverifynative.yml"
],
"tags": [
@@ -60741,39 +61284,6 @@
"uuid": "b30a8bc5-e21b-4ca2-9420-0a94019ac56a",
"value": "Use of VisualUiaVerifyNative.exe"
},
- {
- "description": "Detects suspicious command execution (cmd) via Windows Management Instrumentation (WMI) on a remote host. This could be indicative of adversary lateral movement.",
- "meta": {
- "author": "Tim Rauch",
- "creation_date": "2022/09/27",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_susp_cmd_exectution_via_wmi.yml",
- "level": "medium",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://www.elastic.co/guide/en/security/current/suspicious-cmd-execution-via-wmi.html",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cmd_exectution_via_wmi.yml"
- ],
- "tags": [
- "attack.execution",
- "attack.t1047"
- ]
- },
- "related": [
- {
- "dest-uuid": "01a5a209-b94c-450b-b7f9-946497d91055",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "e31f89f7-36fb-4697-8ab6-48823708353b",
- "value": "Suspicious Cmd Execution via WMI"
- },
{
"description": "Detects command line parameters used by ADCSPwn, a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service",
"meta": {
@@ -60922,8 +61432,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/swagkarna/Defeat-Defender-V1.2.0",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh750728(v=ws.11)",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_file_permission_modifications.yml"
],
"tags": [
@@ -61016,9 +61526,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html",
"https://lolbas-project.github.io/lolbas/Binaries/Cmstp/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.003/T1218.003.md",
- "https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_cmstp.yml"
],
"tags": [
@@ -61062,8 +61572,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/AdamTheAnalyst/status/1483497517119590403",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_defender_base64.yml"
],
"tags": [
@@ -61087,8 +61597,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
+ "https://jpcertcc.github.io/ToolAnalysisResultSheet",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_tool_psexec.yml"
],
"tags": [
@@ -61294,9 +61804,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.cisa.gov/uscert/sites/default/files/publications/aa22-320a_joint_csa_iranian_government-sponsored_apt_actors_compromise_federal%20network_deploy_crypto%20miner_credential_harvester.pdf",
"https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/",
"http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
- "https://www.cisa.gov/uscert/sites/default/files/publications/aa22-320a_joint_csa_iranian_government-sponsored_apt_actors_compromise_federal%20network_deploy_crypto%20miner_credential_harvester.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_computer_discovery_get_adcomputer.yml"
],
"tags": [
@@ -61320,9 +61830,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
"https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
"https://github.com/hfiref0x/UACME",
+ "https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_wsreset_integrity_level.yml"
],
"tags": [
@@ -61438,8 +61948,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_spawning_wmi_commandline.yml"
],
"tags": [
@@ -61644,41 +62154,6 @@
"uuid": "dd3ee8cc-f751-41c9-ba53-5a32ed47e563",
"value": "Suspicious Reg Add Open Command"
},
- {
- "description": "Detects the execution of a renamed PsExec often used by attackers or malware",
- "meta": {
- "author": "Florian Roth",
- "creation_date": "2019/05/21",
- "falsepositive": [
- "Software that illegaly integrates PsExec in a renamed form",
- "Administrators that have renamed PsExec and no one knows why"
- ],
- "filename": "proc_creation_win_renamed_psexec.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_psexec.yml"
- ],
- "tags": [
- "car.2013-05-009",
- "attack.defense_evasion",
- "attack.t1036.003"
- ]
- },
- "related": [
- {
- "dest-uuid": "bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2",
- "value": "Renamed PsExec"
- },
{
"description": "Detects suspicious file execution by wscript and cscript",
"meta": {
@@ -61825,8 +62300,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
"https://redcanary.com/threat-detection-report/threats/qbot/",
+ "https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_reg_defender_exclusion.yml"
],
"tags": [
@@ -61850,8 +62325,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign-v1.pdf",
"https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html",
+ "https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign-v1.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sticky_keys_unauthenticated_privileged_cmd_access.yml"
],
"tags": [
@@ -61897,7 +62372,7 @@
"value": "EvilNum Golden Chickens Deployment via OCX Files"
},
{
- "description": "Detects when adversaries stop services or processes by deleting their respective schdueled tasks in order to conduct data destructive activities",
+ "description": "Detects when adversaries stop services or processes by deleting their respective scheduled tasks in order to conduct data destructive activities",
"meta": {
"author": "Nasreddine Bencherchali",
"creation_date": "2022/09/09",
@@ -62113,10 +62588,10 @@
"logsource.product": "windows",
"refs": [
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.001/T1070.001.md",
- "https://jdhnet.wordpress.com/2017/12/19/changing-the-location-of-the-windows-event-logs/",
- "https://gist.github.com/fovtran/ac0624983c7722e80a8f5a4babb170ee",
- "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
"https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil",
+ "https://jdhnet.wordpress.com/2017/12/19/changing-the-location-of-the-windows-event-logs/",
+ "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
+ "https://gist.github.com/fovtran/ac0624983c7722e80a8f5a4babb170ee",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_eventlog_clear.yml"
],
"tags": [
@@ -62143,7 +62618,7 @@
}
],
"uuid": "cc36992a-4671-4f21-a91d-6c2b72a2edf5",
- "value": "Suspicious Eventlog Clear or Configuration Using Wevtutil"
+ "value": "Suspicious Eventlog Clear or Configuration Change"
},
{
"description": "Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen",
@@ -62218,8 +62693,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_meterpreter_or_cobaltstrike_getsystem_service_start.yml"
],
"tags": [
@@ -62431,8 +62906,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/GhostPack/Seatbelt",
"https://www.bluetangle.dev/2022/08/fastening-seatbelt-on-threat-hunting.html",
+ "https://github.com/GhostPack/Seatbelt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_pua_seatbelt.yml"
],
"tags": [
@@ -62601,9 +63076,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/f420d295-0457-4e9b-9b9e-6732be227583/",
- "https://app.any.run/tasks/c4117d9a-f463-461a-b90f-4cd258746798/",
"https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
+ "https://app.any.run/tasks/c4117d9a-f463-461a-b90f-4cd258746798/",
+ "https://app.any.run/tasks/f420d295-0457-4e9b-9b9e-6732be227583/",
"https://twitter.com/nao_sec/status/1530196847679401984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sdiagnhost_susp_child.yml"
],
@@ -62638,8 +63113,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1123/T1123.md",
"https://eqllib.readthedocs.io/en/latest/analytics/f72a98cb-7b3d-4100-99c3-a138b6e9ff6e.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1123/T1123.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_soundrec_audio_capture.yml"
],
"tags": [
@@ -62663,8 +63138,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/dotnet/framework/tools/installutil-exe-installer-tool",
"https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/",
+ "https://docs.microsoft.com/en-us/dotnet/framework/tools/installutil-exe-installer-tool",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_instalutil.yml"
],
"tags": [
@@ -62814,10 +63289,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
"https://twitter.com/splinter_code/status/1483815103279603714",
"https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/",
"https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
+ "https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_advancedrun.yml"
],
"tags": "No established tags"
@@ -62967,8 +63442,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti_7zip.yml"
],
"tags": [
@@ -63167,8 +63642,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-an-iranian-state-sponsored-threat-actor/",
"https://github.com/shantanu561993/SharpChisel",
+ "https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-an-iranian-state-sponsored-threat-actor/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sharp_chisel_usage.yml"
],
"tags": [
@@ -63202,8 +63677,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://lolbas-project.github.io/lolbas/Binaries/Regedit/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regedit_import_keys.yml"
],
"tags": [
@@ -63227,10 +63702,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "http://blog.sevagas.com/?Hacking-around-HTA-files",
- "https://docs.microsoft.com/en-us/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script",
- "https://0x00sec.org/t/clientside-exploitation-in-2018-how-pentesting-has-changed/7356",
"https://twitter.com/mattifestation/status/1326228491302563846",
+ "https://docs.microsoft.com/en-us/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script",
+ "http://blog.sevagas.com/?Hacking-around-HTA-files",
+ "https://0x00sec.org/t/clientside-exploitation-in-2018-how-pentesting-has-changed/7356",
"https://medium.com/tsscyber/pentesting-and-hta-bypassing-powershell-constrained-language-mode-53a42856c997",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_mshta_execution.yml"
],
@@ -63419,8 +63894,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OSBinaries/Openwith.yml",
"https://twitter.com/harr0ey/status/991670870384021504",
+ "https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OSBinaries/Openwith.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_openwith.yml"
],
"tags": [
@@ -63453,9 +63928,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/",
"https://redacted.com/blog/bianlian-ransomware-gang-gives-it-a-go/",
"https://www.trellix.com/en-sg/about/newsroom/stories/threat-labs/lockergoga-ransomware-family-used-in-targeted-attacks.html",
+ "https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_net_default_accounts_manipulation.yml"
],
"tags": [
@@ -63488,8 +63963,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://nasbench.medium.com/a-deep-dive-into-rundll32-exe-642344b41e90",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.015/T1546.015.md",
+ "https://nasbench.medium.com/a-deep-dive-into-rundll32-exe-642344b41e90",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_rundll32_registered_com_objects.yml"
],
"tags": [
@@ -63579,9 +64054,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/jonasLyk/status/1555914501802921984",
"https://www.acunetix.com/blog/articles/windows-short-8-3-filenames-web-security-problem/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc959352(v=technet.10)?redirectedfrom=MSDN",
- "https://twitter.com/jonasLyk/status/1555914501802921984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ntfs_short_name_use_cli.yml"
],
"tags": [
@@ -63614,8 +64089,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OSBinaries/Powershell.yml",
"https://twitter.com/Moriarty_Meng/status/984380793383370752",
+ "https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OSBinaries/Powershell.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_run_powershell_script_from_input_stream.yml"
],
"tags": [
@@ -63913,8 +64388,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/b25aa548-7937-11e9-8f5c-d46d6d62a49e.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.001/T1218.001.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/b25aa548-7937-11e9-8f5c-d46d6d62a49e.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hh_chm.yml"
],
"tags": [
@@ -64198,8 +64673,8 @@
"logsource.product": "windows",
"refs": [
"https://community.spiceworks.com/topic/2195015-batch-script-to-uninstall-symantec-endpoint-protection",
- "https://community.broadcom.com/symantecenterprise/communities/community-home/digestviewer/viewthread?MessageKey=6ce94b67-74e1-4333-b16f-000b7fd874f0&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=digestviewer",
"https://www.exploit-db.com/exploits/37525",
+ "https://community.broadcom.com/symantecenterprise/communities/community-home/digestviewer/viewthread?MessageKey=6ce94b67-74e1-4333-b16f-000b7fd874f0&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=digestviewer",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_taskkill_sep.yml"
],
"tags": [
@@ -64438,8 +64913,8 @@
"refs": [
"https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions",
- "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://twitter.com/cglyer/status/1355171195654709249",
+ "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_security_product_uninstall.yml"
],
"tags": [
@@ -64536,10 +65011,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/generating-the-data-service-client-library-wcf-data-services",
"https://lolbas-project.github.io/lolbas/Binaries/DataSvcUtil/",
- "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe",
"https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/how-to-add-a-data-service-reference-wcf-data-services",
+ "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/generating-the-data-service-client-library-wcf-data-services",
+ "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe",
"https://gist.github.com/teixeira0xfffff/837e5bfed0d1b0a29a7cb1e5dbdd9ca6",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_data_exfiltration_by_using_datasvcutil.yml"
],
@@ -64726,11 +65201,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1482/T1482.md",
- "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
- "https://eqllib.readthedocs.io/en/latest/analytics/03e231a6-74bc-467a-acb1-e5676b0fb55e.html",
"https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
+ "https://eqllib.readthedocs.io/en/latest/analytics/03e231a6-74bc-467a-acb1-e5676b0fb55e.html",
+ "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1482/T1482.md",
+ "https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_trust_discovery.yml"
],
"tags": [
@@ -64763,8 +65238,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.verfassungsschutz.de/embed/broschuere-2020-06-bfv-cyber-brief-2020-01.pdf",
"https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/",
+ "https://www.verfassungsschutz.de/embed/broschuere-2020-06-bfv-cyber-brief-2020-01.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_ke3chang_regadd.yml"
],
"tags": [
@@ -64901,9 +65376,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
"https://www.poweradmin.com/paexec/",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
+ "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexex_paexec_flags.yml"
],
"tags": [
@@ -64936,8 +65411,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/1ZRR4H/status/1534259727059787783",
"https://app.any.run/tasks/e1fe6a62-bce8-4323-a49a-63795d9afd5d/",
+ "https://twitter.com/1ZRR4H/status/1534259727059787783",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_archiver_iso_phishing.yml"
],
"tags": [
@@ -65097,10 +65572,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/",
"https://app.any.run/tasks/388d5802-aa48-4826-b069-250420504758/",
"https://app.any.run/tasks/8e22486b-5edc-4cef-821c-373e945f296c/",
"https://inquest.net/blog/2018/06/22/a-look-at-formbook-stealer",
- "https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_formbook.yml"
],
"tags": [
@@ -65133,9 +65608,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.ired.team/offensive-security/lateral-movement/t1076-rdp-hijacking-for-lateral-movement",
- "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
"http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html",
+ "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
+ "https://www.ired.team/offensive-security/lateral-movement/t1076-rdp-hijacking-for-lateral-movement",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_tscon_localsystem.yml"
],
"tags": [
@@ -65323,8 +65798,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=41",
+ "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
"https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_x509enrollment.yml"
],
@@ -65456,8 +65931,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "sha256=01a461ad68d11b5b5096f45eb54df9ba62c5af413fa9eb544eacb598373a26bc",
"https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf",
+ "sha256=01a461ad68d11b5b5096f45eb54df9ba62c5af413fa9eb544eacb598373a26bc",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_paexec.yml"
],
"tags": [
@@ -65501,9 +65976,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://attack.mitre.org/software/S0404/",
- "https://twitter.com/vxunderground/status/1423336151860002816",
"https://thedfirreport.com/2021/08/01/bazarcall-to-conti-ransomware-via-trickbot-and-cobalt-strike/",
+ "https://twitter.com/vxunderground/status/1423336151860002816",
+ "https://attack.mitre.org/software/S0404/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_esentutl_params.yml"
],
"tags": [
@@ -65544,9 +66019,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222088214581825540",
"https://twitter.com/gN3mes1s/status/1222095371175911424",
- "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_dctask64.yml"
],
"tags": [
@@ -65710,8 +66185,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_reconnaissance.yml"
],
"tags": [
@@ -65962,9 +66437,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://bidouillesecurity.com/disable-windows-defender-in-powershell/",
- "https://vms.drweb.fr/virus/?i=24144899",
"https://github.com/gordonbay/Windows-On-Reins/blob/e587ac7a0407847865926d575e3c46f68cf7c68d/wor.ps1",
+ "https://vms.drweb.fr/virus/?i=24144899",
+ "https://bidouillesecurity.com/disable-windows-defender-in-powershell/",
"https://twitter.com/JohnLaTwC/status/1415295021041979392",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_reg_disable_sec_services.yml"
],
@@ -66190,8 +66665,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mattifestation/status/986280382042595328",
"https://subt0x11.blogspot.ch/2018/04/wmicexe-whitelisting-bypass-hacking.html",
+ "https://twitter.com/mattifestation/status/986280382042595328",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bypass_squiblytwo.yml"
],
"tags": [
@@ -66309,8 +66784,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdown",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_shutdown.yml"
],
"tags": [
@@ -66417,9 +66892,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Te/",
- "https://docs.microsoft.com/en-us/windows-hardware/drivers/taef/",
"https://twitter.com/pabraeken/status/993298228840992768",
+ "https://docs.microsoft.com/en-us/windows-hardware/drivers/taef/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Te/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_te_bin.yml"
],
"tags": [
@@ -66493,57 +66968,6 @@
"uuid": "7090adee-82e2-4269-bd59-80691e7c6338",
"value": "CHCP CodePage Locale Lookup"
},
- {
- "description": "This rule will monitor LOLBin process creations by wmiprvse. Add more LOLBins to rule logic if needed.",
- "meta": {
- "author": "Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)",
- "creation_date": "2021/08/23",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "proc_creation_win_lolbins_with_wmiprvse_parent_process.yml",
- "level": "high",
- "logsource.category": "process_creation",
- "logsource.product": "windows",
- "refs": [
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
- "https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbins_with_wmiprvse_parent_process.yml"
- ],
- "tags": [
- "attack.t1204.002",
- "attack.t1047",
- "attack.t1218.010",
- "attack.execution",
- "attack.defense_evasion"
- ]
- },
- "related": [
- {
- "dest-uuid": "232b7f21-adf9-4b42-b936-b9d6f7df856e",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- },
- {
- "dest-uuid": "01a5a209-b94c-450b-b7f9-946497d91055",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- },
- {
- "dest-uuid": "b97f1d35-4249-4486-a6b5-ee60ccf24fab",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "8a582fe2-0882-4b89-a82a-da6b2dc32937",
- "value": "Lolbins Process Creation with WmiPrvse"
- },
{
"description": "Detects actions caused by the RedMimicry Winnti playbook",
"meta": {
@@ -66642,9 +67066,9 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/bohops/status/1276357235954909188?s=12",
- "https://twitter.com/CyberRaiju/status/1273597319322058752",
"https://twitter.com/nas_bench/status/1535322450858233858",
"https://securityboulevard.com/2019/09/deobfuscating-ostap-trickbots-34000-line-javascript-downloader/",
+ "https://twitter.com/CyberRaiju/status/1273597319322058752",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_explorer_break_proctree.yml"
],
"tags": [
@@ -66668,10 +67092,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/",
- "https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://twitter.com/lefterispan/status/1286259016436514816",
+ "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
+ "https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml"
],
"tags": [
@@ -66759,6 +67183,48 @@
"uuid": "1fb76ab8-fa60-4b01-bddd-71e89bf555da",
"value": "Pubprn.vbs Proxy Execution"
},
+ {
+ "description": "Detects Powershell as a child of the WmiPrvSE process. Which could be a signe of remote access via WMI",
+ "meta": {
+ "author": "Markus Neis @Karneades",
+ "creation_date": "2019/04/03",
+ "falsepositive": [
+ "AppvClient",
+ "CCM"
+ ],
+ "filename": "proc_creation_win_wmiprvse_spawns_powershell.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://any.run/report/68bc255f9b0db6a0d30a8f2dadfbee3256acfe12497bf93943bc1eab0735e45e/a2385d6f-34f7-403c-90d3-b1f9d2a90a5e",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmiprvse_spawns_powershell.yml"
+ ],
+ "tags": [
+ "attack.execution",
+ "attack.t1047",
+ "attack.t1059.001"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "01a5a209-b94c-450b-b7f9-946497d91055",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "970a3432-3237-47ad-bcca-7d8cbb217736",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "692f0bec-83ba-4d04-af7e-e884a96059b6",
+ "value": "WmiPrvSE Spawned PowerShell"
+ },
{
"description": "Detects unusual parent or children of the ImagingDevices.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) processes as seen being used with bumblebee activity",
"meta": {
@@ -66888,13 +67354,13 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1",
- "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
- "https://pentestlab.blog/tag/ntds-dit/",
- "https://github.com/zcgonvh/NTDSDumpEx",
"https://github.com/rapid7/metasploit-framework/blob/d297adcebb5c1df6fe30b12ca79b161deb71571c/data/post/powershell/NTDSgrab.ps1",
- "https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
+ "https://github.com/zcgonvh/NTDSDumpEx",
+ "https://pentestlab.blog/tag/ntds-dit/",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1",
+ "https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1",
+ "https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
+ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ntds.yml"
],
"tags": [
@@ -66927,9 +67393,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://docs.microsoft.com/en-us/sql/tools/sqlcmd-utility?view=sql-server-ver15",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_conti_sqlcmd.yml"
],
"tags": [
@@ -66962,13 +67428,13 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/rundll32",
- "https://twitter.com/CyberRaiju/status/1251492025678983169",
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regsvr32",
"https://www.cobaltstrike.com/help-opsec",
- "https://blog.malwarebytes.com/malwarebytes-news/2020/10/kraken-attack-abuses-wer-service/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regsvr32",
"https://docs.microsoft.com/en-us/dotnet/framework/tools/regsvcs-exe-net-services-installation-tool#feedback",
+ "https://twitter.com/CyberRaiju/status/1251492025678983169",
+ "https://docs.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool",
+ "https://blog.malwarebytes.com/malwarebytes-news/2020/10/kraken-attack-abuses-wer-service/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bad_opsec_sacrificial_processes.yml"
],
"tags": [
@@ -67034,8 +67500,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.infosecmatter.com/crackmapexec-module-library/?cmem=smb-pe_inject",
"https://www.infosecmatter.com/crackmapexec-module-library/?cmem=mssql-mimikatz",
+ "https://www.infosecmatter.com/crackmapexec-module-library/?cmem=smb-pe_inject",
"https://mpgn.gitbook.io/crackmapexec/smb-protocol/authentication/checking-credentials-local",
"https://www.mandiant.com/resources/telegram-malware-iranian-espionage",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_crackmapexec_flags.yml"
@@ -67115,8 +67581,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trendmicro.com/en_us/research/22/j/lv-ransomware-exploits-proxyshell-in-attack.html",
"https://gist.github.com/jivoi/c354eaaf3019352ce32522f916c03d70",
+ "https://www.trendmicro.com/en_us/research/22/j/lv-ransomware-exploits-proxyshell-in-attack.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_download_patterns.yml"
],
"tags": [
@@ -67185,8 +67651,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
- "https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments",
+ "https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml"
],
"tags": [
@@ -67277,8 +67743,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/replace",
"https://lolbas-project.github.io/lolbas/Binaries/Replace/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/replace",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_replace.yml"
],
"tags": [
@@ -67345,8 +67811,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/991335019833708544",
"https://lolbas-project.github.io/lolbas/Binaries/Pcwrun/",
+ "https://twitter.com/pabraeken/status/991335019833708544",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_pcwrun.yml"
],
"tags": [
@@ -67448,8 +67914,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hvs-consulting.de/lazarus-report/",
"https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/",
+ "https://www.hvs-consulting.de/lazarus-report/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_lazarus_loader.yml"
],
"tags": [
@@ -67484,8 +67950,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md",
- "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
"https://www.joeware.net/freetools/tools/adfind/",
+ "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_adfind_enumeration.yml"
],
"tags": [
@@ -67531,8 +67997,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/child-processes/",
"https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/scrcons-exe-rare-child-process.html",
+ "https://redcanary.com/blog/child-processes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_script_event_consumer_spawn.yml"
],
"tags": [
@@ -67598,8 +68064,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_remote_command.yml"
],
"tags": [
@@ -67632,8 +68098,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/ch2sh/Jlaive",
"https://jstnk9.github.io/jstnk9/research/Jlaive-Antivirus-Evasion-Tool",
+ "https://github.com/ch2sh/Jlaive",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_jlaive_batch_execution.yml"
],
"tags": [
@@ -67735,9 +68201,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
"https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
- "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regini_ads.yml"
],
"tags": [
@@ -67828,9 +68294,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://blog.talosintelligence.com/2021/10/threat-hunting-in-large-datasets-by.html",
- "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_using_sc_to_hide_sevices.yml"
],
"tags": [
@@ -67856,10 +68322,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/synacktiv/Radmin3-Password-Cracker/blob/acfc87393e4b7c06353973a14a6c7126a51f36ac/regkey.txt",
"https://isc.sans.edu/diary/More+Data+Exfiltration/25698",
- "https://github.com/HyperSine/how-does-MobaXterm-encrypt-password",
"https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#inside-the-registry",
+ "https://github.com/HyperSine/how-does-MobaXterm-encrypt-password",
+ "https://github.com/synacktiv/Radmin3-Password-Cracker/blob/acfc87393e4b7c06353973a14a6c7126a51f36ac/regkey.txt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_enumeration_for_credentials_cli.yml"
],
"tags": [
@@ -67979,8 +68445,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/sensepost/ruler",
"https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html",
+ "https://github.com/sensepost/ruler",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_outlook.yml"
],
"tags": [
@@ -68068,19 +68534,20 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/samratashok/nishang",
- "https://github.com/calebstewart/CVE-2021-1675",
- "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
- "https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
- "https://adsecurity.org/?p=2921",
- "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://adsecurity.org/?p=2921",
"https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
"https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/calebstewart/CVE-2021-1675",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://github.com/samratashok/nishang",
+ "https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
"https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malicious_cmdlets.yml"
],
"tags": [
@@ -68313,9 +68780,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bigmacjpg/status/1349727699863011328?s=12",
- "https://app.any.run/tasks/40115012-a919-4208-bfed-41e82cb3dadf/",
"http://hyp3rlinx.altervista.org/advisories/Windows_TCPIP_Finger_Command_C2_Channel_and_Bypassing_Security_Software.txt",
+ "https://app.any.run/tasks/40115012-a919-4208-bfed-41e82cb3dadf/",
+ "https://twitter.com/bigmacjpg/status/1349727699863011328?s=12",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_finger_usage.yml"
],
"tags": [
@@ -68348,8 +68815,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1465058133303246867",
"https://docs.microsoft.com/en-us/powershell/high-performance-computing/mpiexec?view=hpc19-ps",
+ "https://twitter.com/mrd0x/status/1465058133303246867",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_mpiexec_lolbin.yml"
],
"tags": [
@@ -68383,8 +68850,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-1---system-information-discovery",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-1---system-information-discovery",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_systeminfo.yml"
],
"tags": [
@@ -68443,10 +68910,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/",
- "https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://twitter.com/lefterispan/status/1286259016436514816",
+ "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
+ "https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml"
],
"tags": [
@@ -68694,8 +69161,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dxcap/",
"https://twitter.com/harr0ey/status/992008180904419328",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dxcap/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_dxcap.yml"
],
"tags": [
@@ -68728,8 +69195,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/09/03/conti-affiliates-use-proxyshell-exchange-exploit-in-ransomware-attacks/",
"https://twitter.com/VK_Intel/status/1447795359900704769?t=Xz7vaLTvaaCZ5kHoZa6gMw&s=19",
+ "https://news.sophos.com/en-us/2021/09/03/conti-affiliates-use-proxyshell-exchange-exploit-in-ransomware-attacks/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_conti_cmd_ransomware.yml"
],
"tags": [
@@ -68796,8 +69263,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1511415432888131586",
"https://twitter.com/mrd0x/status/1511489821247684615",
+ "https://twitter.com/mrd0x/status/1511415432888131586",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_susp_dumpminitool.yml"
],
"tags": [
@@ -68831,8 +69298,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Xwizard/",
"http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Xwizard/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_dll_sideload_xwizard.yml"
],
"tags": [
@@ -68980,8 +69447,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://strontic.github.io/xcyclopedia/library/DeviceEnroller.exe-24BEF0D6B0ECED36BB41831759FDE18D.html",
"https://mobile.twitter.com/0gtweet/status/1564131230941122561",
+ "https://strontic.github.io/xcyclopedia/library/DeviceEnroller.exe-24BEF0D6B0ECED36BB41831759FDE18D.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_deviceenroller_evasion.yml"
],
"tags": [
@@ -69031,8 +69498,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti.yml"
],
"tags": [
@@ -69156,8 +69623,9 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619/detection",
- "https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/",
+ "https://www.nextron-systems.com/?s=antivirus",
+ "https://www.virustotal.com/gui/file/a4edfbd42595d5bddb442c82a02cf0aaa10893c1bf79ea08b9ce576f82749448",
+ "https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_password_dumper.yml"
],
"tags": [
@@ -69207,9 +69675,9 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675",
"https://twitter.com/mvelazco/status/1410291741241102338",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_printernightmare_cve_2021_34527.yml"
],
"tags": [
@@ -69233,7 +69701,7 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/",
+ "https://www.nextron-systems.com/?s=antivirus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_relevant_files.yml"
],
"tags": [
@@ -69256,7 +69724,7 @@
{
"description": "Detects a highly relevant Antivirus alert that reports an exploitation framework",
"meta": {
- "author": "Florian Roth",
+ "author": "Florian Roth, Arnim Rupp",
"creation_date": "2018/09/09",
"falsepositive": [
"Unlikely"
@@ -69266,7 +69734,10 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/",
+ "https://www.virustotal.com/gui/file/d9669f7e3eb3a9cdf6a750eeb2ba303b5ae148a43e36546896f1d1801e912466",
+ "https://www.virustotal.com/gui/file/8f8daabe1c8ceb5710949283818e16c4aa8059bf2ce345e2f2c90b8692978424",
+ "https://www.nextron-systems.com/?s=antivirus",
+ "https://www.virustotal.com/gui/file/925b0b28472d4d79b4bf92050e38cc2b8f722691c713fc28743ac38551bc3797",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_exploiting.yml"
],
"tags": [
@@ -69298,7 +69769,7 @@
{
"description": "Detects a highly relevant Antivirus alert that reports a hack tool or other attack tool",
"meta": {
- "author": "Florian Roth",
+ "author": "Florian Roth, Arnim Rupp",
"creation_date": "2021/08/16",
"falsepositive": [
"Unlikely"
@@ -69309,6 +69780,7 @@
"logsource.product": "No established product",
"refs": [
"https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/",
+ "https://www.nextron-systems.com/?s=antivirus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_hacktool.yml"
],
"tags": [
@@ -69341,15 +69813,16 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
+ "https://www.nextron-systems.com/?s=antivirus",
"https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection",
- "https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection",
- "https://github.com/tennc/webshell",
- "https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection",
- "https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection",
- "https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection",
- "https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection",
"https://www.virustotal.com/gui/file/b219f7d3c26f8bad7e175934cd5eda4ddb5e3983503e94ff07d39c0666821b7e/detection",
- "https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/",
+ "https://github.com/tennc/webshell",
+ "https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection",
+ "https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection",
+ "https://www.virustotal.com/gui/file/13ae8bfbc02254b389ab052aba5e1ba169b16a399d9bc4cb7414c4a73cd7dc78/detection",
+ "https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection",
+ "https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection",
+ "https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_webshell.yml"
],
"tags": [
@@ -69363,7 +69836,7 @@
{
"description": "Detects a highly relevant Antivirus alert that reports ransomware",
"meta": {
- "author": "Florian Roth",
+ "author": "Florian Roth, Arnim Rupp",
"creation_date": "2022/05/12",
"falsepositive": [
"Unlikely"
@@ -69373,7 +69846,12 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
+ "https://www.virustotal.com/gui/file/69fe77dd558e281621418980040e2af89a2547d377d0f2875502005ce22bc95c",
"https://www.nextron-systems.com/?s=antivirus",
+ "https://www.virustotal.com/gui/file/43b0f7872900bd234975a0877744554f4f355dc57505517abd1ef611e1ce6916",
+ "https://www.virustotal.com/gui/file/c312c05ddbd227cbb08958876df2b69d0f7c1b09e5689eb9d93c5b357f63eff7",
+ "https://www.virustotal.com/gui/file/20179093c59bca3acc6ce9a4281e8462f577ffd29fd7bf51cf2a70d106062045",
+ "https://www.virustotal.com/gui/file/554db97ea82f17eba516e6a6fdb9dc04b1d25580a1eb8cb755eeb260ad0bd61d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_ransomware.yml"
],
"tags": [
@@ -69528,9 +70006,9 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
"https://okta.github.io/okta-help/en/prod/Content/Topics/Security/threat-insight/configure-threatinsight-system-log.htm",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_security_threat_detected.yml"
],
"tags": "No established tags"
@@ -69551,14 +70029,24 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_user_account_locked_out.yml"
],
"tags": [
- "attack.impact"
+ "attack.impact",
+ "attack.t1531"
]
},
+ "related": [
+ {
+ "dest-uuid": "b24e2a20-3b3d-4bf0-823b-1ed765398fb0",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
"uuid": "14701da0-4b0f-4ee6-9c95-2ffb4e73bb9a",
"value": "Okta User Account Locked Out"
},
@@ -69575,8 +70063,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_api_token_revoked.yml"
],
"tags": [
@@ -69599,8 +70087,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_policy_rule_modified_or_deleted.yml"
],
"tags": [
@@ -69623,8 +70111,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_unauthorized_access_to_app.yml"
],
"tags": [
@@ -69647,8 +70135,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_application_sign_on_policy_modified_or_deleted.yml"
],
"tags": [
@@ -69671,14 +70159,24 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_admin_role_assigned_to_user_or_group.yml"
],
"tags": [
- "attack.impact"
+ "attack.persistence",
+ "attack.t1098.003"
]
},
+ "related": [
+ {
+ "dest-uuid": "2dbbdcd5-92cf-44c0-aea2-fe24783a6bc3",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
"uuid": "413d4a81-6c98-4479-9863-014785fd579c",
"value": "Okta Admin Role Assigned to an User or Group"
},
@@ -69695,8 +70193,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_application_modified_or_deleted.yml"
],
"tags": [
@@ -69719,8 +70217,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_network_zone_deactivated_or_deleted.yml"
],
"tags": [
@@ -69736,15 +70234,15 @@
"author": "Austin Songer @austinsonger",
"creation_date": "2021/09/12",
"falsepositive": [
- "Unknown"
+ "Legitimate creation of an API token by authorized users"
],
"filename": "okta_api_token_created.yml",
"level": "medium",
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_api_token_created.yml"
],
"tags": [
@@ -69767,14 +70265,26 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_mfa_reset_or_deactivated.yml"
],
"tags": [
- "attack.persistence"
+ "attack.persistence",
+ "attack.credential_access",
+ "attack.defense_evasion",
+ "attack.t1556.006"
]
},
+ "related": [
+ {
+ "dest-uuid": "b4409cd8-0da9-46e1-a401-a241afd4d1cc",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
"uuid": "50e068d7-1e6b-4054-87e5-0a592c40c7e0",
"value": "Okta MFA Reset or Deactivated"
},
@@ -69793,8 +70303,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
+ "https://developer.okta.com/docs/reference/api/system-log/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_policy_modified_or_deleted.yml"
],
"tags": [
@@ -69817,8 +70327,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_activity_from_anonymous_ip_addresses.yml"
],
"tags": [
@@ -69851,8 +70361,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_data_exfiltration_to_unsanctioned_app.yml"
],
"tags": [
@@ -69885,8 +70395,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_from_susp_ip_addresses.yml"
],
"tags": [
@@ -69919,8 +70429,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_susp_inbox_forwarding.yml"
],
"tags": [
@@ -69953,8 +70463,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_activity_by_terminated_user.yml"
],
"tags": [
@@ -69977,11 +70487,11 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://www.splunk.com/en_us/blog/security/a-golden-saml-journey-solarwinds-continued.html",
"https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/wp-m-unc2452-2021-000343-01.pdf",
- "https://www.sygnia.co/golden-saml-advisory",
- "https://us-cert.cisa.gov/ncas/alerts/aa21-008a",
"https://o365blog.com/post/aadbackdoor/",
+ "https://www.splunk.com/en_us/blog/security/a-golden-saml-journey-solarwinds-continued.html",
+ "https://us-cert.cisa.gov/ncas/alerts/aa21-008a",
+ "https://www.sygnia.co/golden-saml-advisory",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_new_federated_domain_added.yml"
],
"tags": [
@@ -70014,8 +70524,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_logon_from_risky_ip_address.yml"
],
"tags": [
@@ -70072,8 +70582,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_unusual_volume_of_file_deletion.yml"
],
"tags": [
@@ -70106,8 +70616,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_user_restricted_from_sending_email.yml"
],
"tags": [
@@ -70140,8 +70650,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_susp_oauth_app_file_download_activities.yml"
],
"tags": [
@@ -70164,8 +70674,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_impossible_travel_activity.yml"
],
"tags": [
@@ -70189,8 +70699,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml"
],
"tags": [
@@ -70256,8 +70766,8 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy",
+ "https://docs.microsoft.com/en-us/cloud-app-security/policy-template-reference",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_activity_from_infrequent_country.yml"
],
"tags": [
@@ -70387,9 +70897,9 @@
"logsource.category": "No established category",
"logsource.product": "gcp",
"refs": [
- "https://kubernetes.io/docs/reference/access-authn-authz/rbac/",
"https://github.com/elastic/detection-rules/pull/1267",
"https://kubernetes.io/docs/reference/kubernetes-api/authorization-resources/cluster-role-v1/#ClusterRole",
+ "https://kubernetes.io/docs/reference/access-authn-authz/rbac/",
"https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging",
"https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gcp/gcp_kubernetes_rolebinding.yml"
@@ -70439,9 +70949,9 @@
"logsource.category": "No established category",
"logsource.product": "gcp",
"refs": [
- "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
"https://kubernetes.io/docs/concepts/workloads/controllers/job/",
"https://cloud.google.com/kubernetes-engine/docs",
+ "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gcp/gcp_kubernetes_cronjob.yml"
],
"tags": [
@@ -70696,9 +71206,9 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
+ "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION_FROM_WHITELIST",
"https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
- "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_application_removed.yml"
],
"tags": [
@@ -70721,8 +71231,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-user-settings#GRANT_ADMIN_PRIVILEGE",
+ "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_user_granted_admin_privileges.yml"
],
"tags": [
@@ -70755,8 +71265,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-delegated-admin-settings",
+ "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_role_modified_or_deleted.yml"
],
"tags": [
@@ -70779,8 +71289,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-delegated-admin-settings",
+ "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_role_privilege_deleted.yml"
],
"tags": [
@@ -70804,8 +71314,8 @@
"logsource.product": "google_workspace",
"refs": [
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings#ENFORCE_STRONG_AUTHENTICATION",
- "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings?hl=en#ALLOW_STRONG_AUTHENTICATION",
+ "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_mfa_disabled.yml"
],
"tags": [
@@ -70828,8 +71338,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings#AUTHORIZE_API_CLIENT_ACCESS",
+ "https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_granted_domain_api_access.yml"
],
"tags": [
@@ -70909,12 +71419,12 @@
"logsource.product": "aws",
"refs": [
"https://github.com/elastic/detection-rules/pull/1145/files",
- "https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html",
- "https://docs.aws.amazon.com/AmazonS3/latest/API/API_RestoreObject.html",
- "https://docs.aws.amazon.com/AmazonS3/latest/API/API_Operations.html",
- "https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLogging.html",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketWebsite.html",
+ "https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html",
+ "https://docs.aws.amazon.com/AmazonS3/latest/API/API_Operations.html",
+ "https://docs.aws.amazon.com/AmazonS3/latest/API/API_RestoreObject.html",
+ "https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_s3_data_management_tampering.yml"
],
"tags": [
@@ -71057,8 +71567,8 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html",
"https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py",
+ "https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_ecs_task_definition_backdoor.yml"
],
"tags": [
@@ -71641,8 +72151,8 @@
"logsource.product": "aws",
"refs": [
"https://securitycafe.ro/2022/12/14/aws-enumeration-part-ii-practical-enumeration/",
- "https://github.com/Lifka/hacking-resources/blob/c2ae355d381bd0c9f0b32c4ead049f44e5b1573f/cloud-hacking-cheat-sheets.md",
"https://jamesonhacking.blogspot.com/2020/12/pivoting-to-private-aws-s3-buckets.html",
+ "https://github.com/Lifka/hacking-resources/blob/c2ae355d381bd0c9f0b32c4ead049f44e5b1573f/cloud-hacking-cheat-sheets.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_enum_buckets.yml"
],
"tags": [
@@ -72013,8 +72523,8 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/",
"https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html",
+ "https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_passed_role_to_glue_development_endpoint.yml"
],
"tags": [
@@ -73088,11 +73598,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_cluster_created_or_deleted.yml"
],
"tags": [
@@ -74027,11 +74537,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_secret_or_config_object_access.yml"
],
"tags": [
@@ -74089,11 +74599,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_role_access.yml"
],
"tags": [
@@ -74235,11 +74745,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_container_registry_created_or_deleted.yml"
],
"tags": [
@@ -74364,9 +74874,9 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://kubernetes.io/docs/concepts/workloads/controllers/job/",
+ "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
"https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_cronjob.yml"
],
@@ -74450,11 +74960,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_rolebinding_modified_or_deleted.yml"
],
"tags": [
@@ -75015,11 +75525,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_network_policy_change.yml"
],
"tags": [
@@ -75044,11 +75554,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
- "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
+ "https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_service_account_modified_or_deleted.yml"
],
"tags": [
@@ -75181,8 +75691,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/",
"https://twitter.com/jhencinski/status/1102695118455349248",
+ "https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_bitsadmin_susp_tld.yml"
],
"tags": [
@@ -75295,8 +75805,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/",
- "https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
"https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
+ "https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_exchange_owassrf_poc_exploitation.yml"
],
"tags": [
@@ -75506,9 +76016,9 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
+ "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/",
"https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/",
- "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_telegram_api.yml"
],
"tags": [
@@ -75593,10 +76103,10 @@
"logsource.product": "No established product",
"refs": [
"https://networkraptor.blogspot.com/2015/01/user-agent-strings.html",
- "http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules",
+ "https://perishablepress.com/blacklist/ua-2013.txt",
"https://www.bluecoat.com/en-gb/security-blog/2015-05-05/know-your-agents",
"http://www.botopedia.org/search?searchword=scan&searchphrase=all",
- "https://perishablepress.com/blacklist/ua-2013.txt",
+ "http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_malware.yml"
],
"tags": [
@@ -75672,8 +76182,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://www.kroll.com/en/insights/publications/cyber/new-m365-business-email-compromise-attacks-with-rclone",
"https://rclone.org/",
+ "https://www.kroll.com/en/insights/publications/cyber/new-m365-business-email-compromise-attacks-with-rclone",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_rclone.yml"
],
"tags": [
@@ -75776,8 +76286,20 @@
"refs": [
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ursnif_malware_download_url.yml"
],
- "tags": "No established tags"
+ "tags": [
+ "attack.command_and_control",
+ "attack.t1071.001"
+ ]
},
+ "related": [
+ {
+ "dest-uuid": "df8b2a25-8bdf-4856-953c-a04372b1c161",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
"uuid": "a36ce77e-30db-4ea0-8795-644d7af5dfb4",
"value": "Ursnif Malware Download URL Pattern"
},
@@ -75974,9 +76496,9 @@
"logsource.product": "No established product",
"refs": [
"https://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap",
- "https://www.spamhaus.org/statistics/tlds/",
- "https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/",
"https://promos.mcafee.com/en-US/PDF/MTMW_Report.pdf",
+ "https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/",
+ "https://www.spamhaus.org/statistics/tlds/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_download_susp_tlds_blacklist.yml"
],
"tags": [
@@ -76042,8 +76564,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/amazon.profile",
"https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100",
+ "https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/amazon.profile",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_cobalt_amazon.yml"
],
"tags": [
@@ -76251,8 +76773,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules",
"https://github.com/fastly/waf_testbed/blob/8bfc406551f3045e418cbaad7596cff8da331dfc/templates/default/scanners-user-agents.data.erb",
+ "http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_hacktool.yml"
],
"tags": [
@@ -76512,9 +77034,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://isc.sans.edu/diary/26734",
- "https://twitter.com/sudo_sudoka/status/1323951871078223874",
"https://twitter.com/jas502n/status/1321416053050667009?s=20",
+ "https://twitter.com/sudo_sudoka/status/1323951871078223874",
+ "https://isc.sans.edu/diary/26734",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_14882_weblogic_exploit.yml"
],
"tags": [
@@ -76548,10 +77070,10 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/TesterCC/exp_poc_library/blob/master/exp_poc/CVE-2021-26084_Confluence_OGNL_injection/CVE-2021-26084.md",
+ "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
"https://mraddon.blog/2017/03/20/confluence-trick-to-create-pages-from-blueprint-templates/",
"https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md",
- "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
+ "https://github.com/TesterCC/exp_poc_library/blob/master/exp_poc/CVE-2021-26084_Confluence_OGNL_injection/CVE-2021-26084.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_26084_confluence_rce_exploit.yml"
],
"tags": [
@@ -76617,8 +77139,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
+ "https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_exploitation_hafnium.yml"
],
"tags": [
@@ -76651,8 +77173,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.anquanke.com/post/id/226029",
"https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/",
+ "https://www.anquanke.com/post/id/226029",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_solarwinds_supernova_webshell.yml"
],
"tags": [
@@ -76676,8 +77198,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/pyn3rd/status/1020620932967223296",
"https://github.com/LandGrey/CVE-2018-2894",
+ "https://twitter.com/pyn3rd/status/1020620932967223296",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2018_2894_weblogic_exploit.yml"
],
"tags": [
@@ -76713,9 +77235,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://support.citrix.com/article/CTX276688",
- "https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/",
"https://dmaasland.github.io/posts/citrix.html",
+ "https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/",
+ "https://support.citrix.com/article/CTX276688",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_8193_8195_citrix_exploit.yml"
],
"tags": [
@@ -76805,8 +77327,8 @@
"logsource.product": "No established product",
"refs": [
"https://twitter.com/Al1ex4/status/1382981479727128580",
- "https://github.com/murataydemir/CVE-2021-27905",
"https://twitter.com/sec715/status/1373472323538362371",
+ "https://github.com/murataydemir/CVE-2021-27905",
"https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/",
"https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247484117&idx=1&sn=2fdab8cbe4b873f8dd8abb35d935d186",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_27905_apache_solr_exploit.yml"
@@ -76842,9 +77364,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/",
"https://www.yang99.top/index.php/archives/82/",
"https://github.com/vnhacker1337/CVE-2022-27925-PoC",
+ "https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_27925_exploit.yml"
],
"tags": [
@@ -76878,10 +77400,10 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html",
+ "https://twitter.com/_0xf4n9x_/status/1572052954538192901",
"https://www.rapid7.com/blog/post/2022/09/20/cve-2022-36804-easily-exploitable-vulnerability-in-atlassian-bitbucket-server-and-data-center/",
"https://blog.assetnote.io/2022/09/14/rce-in-bitbucket-server/",
- "https://twitter.com/_0xf4n9x_/status/1572052954538192901",
+ "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_36804_atlassian_bitbucket_command_injection.yml"
],
"tags": [
@@ -76919,8 +77441,8 @@
"refs": [
"https://www.acunetix.com/blog/articles/using-logs-to-investigate-a-web-application-attack/",
"https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/",
- "https://brightsec.com/blog/sql-injection-payloads/",
"https://github.com/payloadbox/sql-injection-payload-list",
+ "https://brightsec.com/blog/sql-injection-payloads/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_sql_injection_in_access_logs.yml"
],
"tags": "No established tags"
@@ -76942,8 +77464,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/",
- "https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
"https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
+ "https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_owassrf_poc_exploitation.yml"
],
"tags": [
@@ -77147,8 +77669,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html",
"https://medium.com/@logicbomb_1/bugbounty-how-i-was-able-to-download-the-source-code-of-indias-largest-telecom-service-52cf5c5640a1",
+ "https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_source_code_enumeration.yml"
],
"tags": [
@@ -77172,8 +77694,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/",
"https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/",
+ "https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/",
"https://twitter.com/yorickkoster/status/1279709009151434754",
"https://support.f5.com/csp/article/K52145254",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_5902_f5_bigip.yml"
@@ -77208,9 +77730,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://f5.pm/go-59627.html",
- "https://swarm.ptsecurity.com/unauth-rce-vmware",
"https://www.vmware.com/security/advisories/VMSA-2021-0002.html",
+ "https://swarm.ptsecurity.com/unauth-rce-vmware",
+ "https://f5.pm/go-59627.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_21972_vsphere_unauth_rce_exploit.yml"
],
"tags": [
@@ -77312,12 +77834,12 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/YfryTchsGD/Log4jAttackSurface",
"https://github.com/tangxiaofeng7/apache-log4j-poc",
+ "https://github.com/YfryTchsGD/Log4jAttackSurface",
+ "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
+ "https://news.ycombinator.com/item?id=29504755",
"https://www.lunasec.io/docs/blog/log4j-zero-day/",
"https://twitter.com/shutingrz/status/1469255861394866177?s=21",
- "https://news.ycombinator.com/item?id=29504755",
- "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_44228_log4j_fields.yml"
],
"tags": [
@@ -77397,7 +77919,7 @@
{
"description": "Detects possible Java payloads in web access logs",
"meta": {
- "author": "frack113",
+ "author": "frack113, Harjot Singh, \"@cyb3rjy0t\" (update)",
"creation_date": "2022/06/04",
"falsepositive": [
"Legitimate apps"
@@ -77407,10 +77929,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/",
- "https://twitter.com/httpvoid0x2f/status/1532924261035384832",
- "https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md",
"https://www.rapid7.com/blog/post/2021/09/02/active-exploitation-of-confluence-server-cve-2021-26084/",
+ "https://twitter.com/httpvoid0x2f/status/1532924261035384832",
+ "https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/",
+ "https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md",
+ "https://medium.com/geekculture/text4shell-exploit-walkthrough-ebc02a01f035",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_java_payload_in_access_logs.yml"
],
"tags": [
@@ -77491,8 +78014,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://mp.weixin.qq.com/s/wX9TMXl1KVWwB_k6EZOklw",
"https://twitter.com/pyn3rd/status/1351696768065409026",
+ "https://mp.weixin.qq.com/s/wX9TMXl1KVWwB_k6EZOklw",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_2109_weblogic_rce_exploit.yml"
],
"tags": [
@@ -77595,8 +78118,8 @@
"logsource.product": "No established product",
"refs": [
"https://sumsec.me/2022/CVE-2022-33891%20Apache%20Spark%20shell%20command%20injection.html",
- "https://github.com/apache/spark/pull/36315/files",
"https://github.com/W01fh4cker/cve-2022-33891/blob/fd973b56e78bca8822caa3a2e3cf1b5aff5d0950/cve_2022_33891_poc.py",
+ "https://github.com/apache/spark/pull/36315/files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml"
],
"tags": [
@@ -77630,9 +78153,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/wpscanteam/wpscan/blob/196fbab5b1ce3870a43515153d4f07878a89d410/lib/wpscan/browser.rb",
- "https://github.com/lanmaster53/recon-ng/blob/9e907dfe09fce2997f0301d746796408e01a60b7/recon/core/base.py#L92",
"https://github.com/xmendez/wfuzz/blob/1b695ee9a87d66a7d7bf6cae70d60a33fae51541/docs/user/basicusage.rst",
+ "https://github.com/lanmaster53/recon-ng/blob/9e907dfe09fce2997f0301d746796408e01a60b7/recon/core/base.py#L92",
+ "https://github.com/wpscanteam/wpscan/blob/196fbab5b1ce3870a43515153d4f07878a89d410/lib/wpscan/browser.rb",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_susp_useragents.yml"
],
"tags": [
@@ -77765,9 +78288,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
+ "https://youtu.be/5mqid-7zp8k?t=2231",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
- "https://youtu.be/5mqid-7zp8k?t=2231",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_proxyshell.yml"
],
"tags": [
@@ -77800,9 +78323,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
+ "https://youtu.be/5mqid-7zp8k?t=2231",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
- "https://youtu.be/5mqid-7zp8k?t=2231",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_proxyshell_successful.yml"
],
"tags": [
@@ -77850,12 +78373,12 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/YfryTchsGD/Log4jAttackSurface",
"https://github.com/tangxiaofeng7/apache-log4j-poc",
+ "https://github.com/YfryTchsGD/Log4jAttackSurface",
+ "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
+ "https://news.ycombinator.com/item?id=29504755",
"https://www.lunasec.io/docs/blog/log4j-zero-day/",
"https://twitter.com/shutingrz/status/1469255861394866177?s=21",
- "https://news.ycombinator.com/item?id=29504755",
- "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_44228_log4j.yml"
],
"tags": [
@@ -77954,9 +78477,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2",
- "https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild",
"https://www.tenable.com/security/research/tra-2021-13",
+ "https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild",
+ "https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_20090_2021_20091_arcadyan_router_exploit.yml"
],
"tags": [
@@ -77991,8 +78514,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/",
"https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/",
+ "https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_28188_terramaster_rce_exploit.yml"
],
"tags": [
@@ -78093,12 +78616,12 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782",
- "https://twitter.com/bl4sty/status/1445462677824761878",
- "https://twitter.com/h4x0r_dz/status/1445401960371429381",
"https://twitter.com/ptswarm/status/1445376079548624899",
"https://nvd.nist.gov/vuln/detail/CVE-2021-41773",
"https://github.com/projectdiscovery/nuclei-templates/blob/9d2889356eebba661c8407038e430759dfd4ec31/cves/2021/CVE-2021-41773.yaml",
+ "https://twitter.com/h4x0r_dz/status/1445401960371429381",
+ "https://twitter.com/bl4sty/status/1445462677824761878",
+ "https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_41773_apache_path_traversal.yml"
],
"tags": [
@@ -78236,8 +78759,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/aboul3la/status/1286012324722155525",
"https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter",
+ "https://twitter.com/aboul3la/status/1286012324722155525",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_3452_cisco_asa_ftd.yml"
],
"tags": [
@@ -78350,11 +78873,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://isc.sans.edu/diary/25686",
- "https://support.citrix.com/article/CTX267679",
"https://github.com/x1sec/CVE-2019-19781/blob/25f7ab97275b2d41800bb3414dac8ca3a78af7e5/CVE-2019-19781-DFIR.md",
+ "https://support.citrix.com/article/CTX267679",
"https://support.citrix.com/article/CTX267027",
"https://twitter.com/mpgn_x64/status/1216787131210829826",
+ "https://isc.sans.edu/diary/25686",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2019_19781_citrix_exploit.yml"
],
"tags": [
@@ -78464,8 +78987,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://us-cert.cisa.gov/ncas/alerts/aa21-259a",
"https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authentication-bypass-vulnerability-in-REST-API.html",
+ "https://us-cert.cisa.gov/ncas/alerts/aa21-259a",
"https://therecord.media/cisa-warns-of-zoho-server-zero-day-exploited-in-the-wild/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_40539_manageengine_adselfservice_exploit.yml"
],
@@ -78535,8 +79058,8 @@
"logsource.category": "file_event",
"logsource.product": "macos",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.014/T1546.014.md",
"https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.014/T1546.014.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/file_event/file_event_macos_emond_launch_daemon.yml"
],
"tags": [
@@ -78733,8 +79256,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-7f541fbc4a4a28a92970e8bf53effea5bd934604429112c920affb457f5b2685",
"https://wojciechregula.blog/post/macos-red-teaming-initial-access-via-applescript-url/",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-7f541fbc4a4a28a92970e8bf53effea5bd934604429112c920affb457f5b2685",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_susp_execution_macos_script_editor.yml"
],
"tags": [
@@ -79009,8 +79532,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-f5deb07688e1a8dec9530bc3071967b2da5c16b482e671812b864c37beb28f08",
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-f5deb07688e1a8dec9530bc3071967b2da5c16b482e671812b864c37beb28f08",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_xcsset_malware_infection.yml"
],
"tags": [
@@ -79057,9 +79580,9 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://github.com/usnistgov/macos_security/blob/932a51f3e819dd3e02ebfcf3ef433cfffafbe28b/rules/os/os_firmware_password_require.yaml",
- "https://support.apple.com/guide/security/firmware-password-protection-sec28382c9ca/web",
"https://www.manpagez.com/man/8/firmwarepasswd/",
+ "https://support.apple.com/guide/security/firmware-password-protection-sec28382c9ca/web",
+ "https://github.com/usnistgov/macos_security/blob/932a51f3e819dd3e02ebfcf3ef433cfffafbe28b/rules/os/os_firmware_password_require.yaml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_susp_macos_firmware_activity.yml"
],
"tags": [
@@ -79340,8 +79863,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://scriptingosx.com/2018/08/user-interaction-from-bash-scripts/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md",
+ "https://scriptingosx.com/2018/08/user-interaction-from-bash-scripts/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_gui_input_capture.yml"
],
"tags": [
@@ -79398,8 +79921,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-c68a1fcbf7a3f80c87225d7fdc031f691e9f3b6a14a36754be00762bfe6eae97",
"https://www.microsoft.com/security/blog/2022/02/02/the-evolution-of-a-mac-trojan-updateagents-progression/",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-c68a1fcbf7a3f80c87225d7fdc031f691e9f3b6a14a36754be00762bfe6eae97",
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_wizardupdate_malware_infection.yml"
],
@@ -79572,10 +80095,10 @@
"logsource.category": "No established category",
"logsource.product": "qualys",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://community.qualys.com/docs/DOC-6406-reporting-toolbox-focused-search-lists",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
- "https://community.qualys.com/docs/DOC-6406-reporting-toolbox-focused-search-lists",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/default_credentials_usage.yml"
],
"tags": "No established tags"
@@ -79594,9 +80117,9 @@
"logsource.category": "No established category",
"logsource.product": "qualys",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/host_without_firewall.yml"
],
"tags": "No established tags"
@@ -79617,9 +80140,9 @@
"logsource.category": "No established category",
"logsource.product": "No established product",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/netflow_cleartext_protocols.yml"
],
"tags": "No established tags"
@@ -79640,8 +80163,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/Azure/Azure-Sentinel/pull/3059",
+ "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_omigod_scx_runasprovider_executeshellcommand.yml"
],
"tags": [
@@ -79797,8 +80320,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/",
"https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor",
+ "https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_bpfdoor_file_accessed.yml"
],
"tags": [
@@ -80032,9 +80555,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.006/T1547.006.md",
- "https://linux.die.net/man/8/insmod",
"https://man7.org/linux/man-pages/man8/kmod.8.html",
+ "https://linux.die.net/man/8/insmod",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.006/T1547.006.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_load_module_insmod.yml"
],
"tags": [
@@ -80094,8 +80617,8 @@
"logsource.product": "linux",
"refs": [
"https://github.com/berdav/CVE-2021-4034",
- "https://access.redhat.com/security/cve/CVE-2021-4034",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034",
+ "https://access.redhat.com/security/cve/CVE-2021-4034",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_cve_2021_4034.yml"
],
"tags": [
@@ -80154,8 +80677,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://firewalld.org/documentation/man-pages/firewall-cmd.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md",
+ "https://firewalld.org/documentation/man-pages/firewall-cmd.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_disable_system_firewall.yml"
],
"tags": [
@@ -80212,9 +80735,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://mn3m.info/posts/suid-vs-capabilities/",
- "https://man7.org/linux/man-pages/man8/getcap.8.html",
"https://int0x33.medium.com/day-44-linux-capabilities-privilege-escalation-via-openssl-with-selinux-enabled-and-enforced-74d2bec02099",
+ "https://man7.org/linux/man-pages/man8/getcap.8.html",
+ "https://mn3m.info/posts/suid-vs-capabilities/",
"https://www.hackingarticles.in/linux-privilege-escalation-using-capabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_capabilities_discovery.yml"
],
@@ -80274,8 +80797,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/Neo23x0/auditd/blob/master/audit.rules",
"Self Experience",
+ "https://github.com/Neo23x0/auditd/blob/master/audit.rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_auditing_config_change.yml"
],
"tags": [
@@ -80688,8 +81211,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/",
"https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor",
+ "https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_bpfdoor_port_redirect.yml"
],
"tags": [
@@ -80912,8 +81435,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://twitter.com/0xm1rch/status/1600857731073654784?s=20&t=MdrBPqv4hnBEfAJBayMCZA",
"https://github.com/Neo23x0/auditd/blob/master/audit.rules",
+ "https://twitter.com/0xm1rch/status/1600857731073654784?s=20&t=MdrBPqv4hnBEfAJBayMCZA",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_debugfs_usage.yml"
],
"tags": [
@@ -80946,9 +81469,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
+ "https://man7.org/linux/man-pages/man1/passwd.1.html",
"https://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntu",
"https://linux.die.net/man/1/chage",
- "https://man7.org/linux/man-pages/man1/passwd.1.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1201/T1201.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_password_policy_discovery.yml"
],
@@ -81074,10 +81597,10 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://linux.die.net/man/8/pam_tty_audit",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/T1056.001.md",
- "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing",
"https://access.redhat.com/articles/4409591#audit-record-types-2",
+ "https://linux.die.net/man/8/pam_tty_audit",
+ "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_keylogging_with_pam_d.yml"
],
"tags": [
@@ -81178,8 +81701,8 @@
"logsource.product": "linux",
"refs": [
"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files",
- "https://www.youtube.com/watch?v=VmvY5SQm5-Y&ab_channel=M45C07",
"https://access.redhat.com/articles/4409591#audit-record-types-2",
+ "https://www.youtube.com/watch?v=VmvY5SQm5-Y&ab_channel=M45C07",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_create_account.yml"
],
"tags": [
@@ -81212,8 +81735,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-1---port-scan",
"https://www.andreafortuna.org/2021/03/06/some-useful-tips-about-dev-tcp/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-1---port-scan",
"https://book.hacktricks.xyz/shells/shells/linux",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_susp_dev_tcp.yml"
],
@@ -81484,8 +82007,8 @@
"logsource.product": "linux",
"refs": [
"https://github.com/redcanaryco/atomic-red-team/blob/25acadc0b43a07125a8a5b599b28bbc1a91ffb06/atomics/T1136.001/T1136.001.md#atomic-test-5---create-a-new-user-in-linux-with-root-uid-and-gid",
- "https://linux.die.net/man/8/useradd",
"https://digital.nhs.uk/cyber-alerts/2018/cc-2825",
+ "https://linux.die.net/man/8/useradd",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_privileged_user_creation.yml"
],
"tags": [
@@ -81526,8 +82049,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/",
"https://github.com/Immersive-Labs-Sec/nimbuspwn",
+ "https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_nimbuspwn_privilege_escalation_exploit.yml"
],
"tags": [
@@ -81641,10 +82164,10 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
+ "http://www.threatgeek.com/2017/03/widespread-exploitation-attempts-using-cve-2017-5638.html",
"https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb",
"https://artkond.com/2017/03/23/pivoting-guide/",
"http://pastebin.com/FtygZ1cg",
- "http://www.threatgeek.com/2017/03/widespread-exploitation-attempts-using-cve-2017-5638.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_shell_susp_commands.yml"
],
"tags": [
@@ -81712,8 +82235,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.003/T1070.003.md",
"https://www.hackers-arise.com/single-post/2016/06/20/Covering-your-BASH-Shell-Tracks-AntiForensics",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.003/T1070.003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_shell_clear_cmd_history.yml"
],
"tags": [
@@ -82530,8 +83053,8 @@
"logsource.product": "linux",
"refs": [
"https://gtfobins.github.io/gtfobins/vim/",
- "https://gtfobins.github.io/gtfobins/rvim/",
"https://gtfobins.github.io/gtfobins/vimdiff/",
+ "https://gtfobins.github.io/gtfobins/rvim/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_gtfobin_vim.yml"
],
"tags": [
@@ -82826,11 +83349,11 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://curl.se/docs/manpage.html",
- "https://twitter.com/d1r4c/status/1279042657508081664",
- "https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html",
"https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76",
+ "https://twitter.com/d1r4c/status/1279042657508081664",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-19---curl-upload-file",
+ "https://curl.se/docs/manpage.html",
+ "https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_susp_curl_fileupload.yml"
],
"tags": [
@@ -82896,9 +83419,9 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://linux.die.net/man/8/userdel",
"https://linuxize.com/post/how-to-delete-group-in-linux/",
"https://www.cyberciti.biz/faq/linux-remove-user-command/",
+ "https://linux.die.net/man/8/userdel",
"https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_userdel.yml"
],
@@ -83286,8 +83809,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/Azure/Azure-Sentinel/pull/3059",
+ "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_omigod_scx_runasprovider_executescript.yml"
],
"tags": [
@@ -83406,8 +83929,8 @@
"refs": [
"https://linuxize.com/post/how-to-delete-group-in-linux/",
"https://www.cyberciti.biz/faq/linux-remove-user-command/",
- "https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/",
"https://linux.die.net/man/8/groupdel",
+ "https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_groupdel.yml"
],
"tags": [
@@ -83440,8 +83963,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS",
"https://www.trendmicro.com/pl_pl/research/20/i/the-evolution-of-malicious-shell-scripts.html",
+ "https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_base64_shebang_cli.yml"
],
"tags": [
@@ -83474,8 +83997,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://github.com/diego-treitos/linux-smart-enumeration",
"https://github.com/carlospolop/PEASS-ng",
+ "https://github.com/diego-treitos/linux-smart-enumeration",
"https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_capa_discovery.yml"
],
@@ -83737,8 +84260,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/Azure/Azure-Sentinel/pull/3059",
+ "https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_omigod_scx_runasprovider_executeshellcommand.yml"
],
"tags": [
@@ -83789,9 +84312,9 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://en.wikipedia.org/wiki/Nohup",
- "https://www.computerhope.com/unix/unohup.htm",
"https://gtfobins.github.io/gtfobins/nohup/",
+ "https://www.computerhope.com/unix/unohup.htm",
+ "https://en.wikipedia.org/wiki/Nohup",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_nohup.yml"
],
"tags": "No established tags"
@@ -84117,8 +84640,8 @@
"logsource.product": "linux",
"refs": [
"https://sumsec.me/2022/CVE-2022-33891%20Apache%20Spark%20shell%20command%20injection.html",
- "https://github.com/apache/spark/pull/36315/files",
"https://github.com/W01fh4cker/cve-2022-33891/blob/fd973b56e78bca8822caa3a2e3cf1b5aff5d0950/cve_2022_33891_poc.py",
+ "https://github.com/apache/spark/pull/36315/files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_cve_2022_33891_spark_shell_command_injection.yml"
],
"tags": [
@@ -84246,5 +84769,5 @@
"value": "Security Software Discovery - Linux"
}
],
- "version": 20230112
+ "version": 20230120
}
From 2f0dfc765667f1b7ef2dd21eb2aaa3c587e13c26 Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Mon, 23 Jan 2023 10:10:46 +0100
Subject: [PATCH 2/2] chg: [sigma] updated
---
clusters/sigma-rules.json | 2686 ++++++++++++++++++++++---------------
1 file changed, 1572 insertions(+), 1114 deletions(-)
diff --git a/clusters/sigma-rules.json b/clusters/sigma-rules.json
index 5783bf7..e33434b 100644
--- a/clusters/sigma-rules.json
+++ b/clusters/sigma-rules.json
@@ -174,9 +174,9 @@
"logsource.category": "firewall",
"logsource.product": "No established product",
"refs": [
- "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/firewall/net_firewall_cleartext_protocols.yml"
],
"tags": "No established tags"
@@ -232,9 +232,9 @@
"logsource.category": "dns",
"logsource.product": "No established product",
"refs": [
- "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://core.telegram.org/bots/faq",
"https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/",
+ "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/dns/net_dns_susp_telegram_api.yml"
],
@@ -460,8 +460,8 @@
"logsource.category": "dns",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/stvemillertime/status/1024707932447854592",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Backdoors/DNS_TXT_Pwnage.ps1",
+ "https://twitter.com/stvemillertime/status/1024707932447854592",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/dns/net_dns_susp_txt_exec_strings.yml"
],
"tags": [
@@ -1330,8 +1330,8 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://threatpost.com/microsoft-petitpotam-poc/168163/",
"https://vx-underground.org/archive/Symantec/windows-vista-network-attack-07-en.pdf",
+ "https://threatpost.com/microsoft-petitpotam-poc/168163/",
"https://msrc.microsoft.com/update-guide/vulnerability/ADV210003",
"https://github.com/topotam/PetitPotam/blob/d83ac8f2dd34654628c17490f99106eb128e7d1e/PetitPotam/PetitPotam.cpp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_potential_petit_potam_efs_rpc_call.yml"
@@ -1702,9 +1702,9 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
+ "https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/",
"https://github.com/Maka8ka/NGLite",
"https://github.com/nknorg/nkn-sdk-go",
- "https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dns_nkn.yml"
],
"tags": [
@@ -1752,9 +1752,9 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://twitter.com/_dirkjan/status/1309214379003588608",
"https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
"https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
+ "https://twitter.com/_dirkjan/status/1309214379003588608",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_smb_spoolss_named_pipe.yml"
],
"tags": [
@@ -1779,8 +1779,8 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/37",
"https://github.com/OTRF/detection-hackathon-apt29",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/37",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_domain_user_enumeration.yml"
],
"tags": [
@@ -1847,12 +1847,12 @@
"logsource.category": "No established category",
"logsource.product": "zeek",
"refs": [
- "https://github.com/zeek/zeek/blob/691b099de13649d6576c7b9d637f8213ff818832/scripts/base/protocols/dce-rpc/consts.zeek",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-par/93d1915d-4d9f-4ceb-90a7-e8f2a59adc29",
+ "https://old.zeek.org/zeekweek2019/slides/bzar.pdf",
+ "https://github.com/zeek/zeek/blob/691b099de13649d6576c7b9d637f8213ff818832/scripts/base/protocols/dce-rpc/consts.zeek",
+ "https://www.crowdstrike.com/blog/cve-2021-1678-printer-spooler-relay-security-advisory/",
"https://github.com/corelight/CVE-2021-1675",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
- "https://old.zeek.org/zeekweek2019/slides/bzar.pdf",
- "https://www.crowdstrike.com/blog/cve-2021-1678-printer-spooler-relay-security-advisory/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dce_rpc_printnightmare_print_driver_install.yml"
],
"tags": [
@@ -1976,9 +1976,9 @@
"logsource.product": "zeek",
"refs": [
"https://tdm.socprime.com/tdm/info/eLbyj4JjI15v#sigma",
+ "https://www.netresec.com/?page=Blog&month=2021-01&post=Finding-Targeted-SUNBURST-Victims-with-pDNS",
"https://twitter.com/neu5ron/status/1346245602502443009",
"https://tools.ietf.org/html/rfc2929#section-2.1",
- "https://www.netresec.com/?page=Blog&month=2021-01&post=Finding-Targeted-SUNBURST-Victims-with-pDNS",
"https://github.com/SigmaHQ/sigma/tree/master/rules/network/zeek/zeek_dns_susp_zbit_flag.yml"
],
"tags": [
@@ -2152,10 +2152,10 @@
"logsource.category": "application",
"logsource.product": "ruby_on_rails",
"refs": [
- "http://guides.rubyonrails.org/action_controller_overview.html",
- "https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb",
- "https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception",
"http://edgeguides.rubyonrails.org/security.html",
+ "http://guides.rubyonrails.org/action_controller_overview.html",
+ "https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception",
+ "https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/ruby/appframework_ruby_on_rails_exceptions.yml"
],
"tags": [
@@ -2188,10 +2188,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-WKST.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-WKST.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sharphound_recon_account.yml"
],
"tags": [
@@ -2215,10 +2215,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/zeronetworks/rpcfirewall",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_registry_recon.yml"
],
"tags": [
@@ -2241,10 +2241,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_recon.yml"
],
"tags": [
@@ -2267,10 +2267,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SCMR.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SCMR.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_service_lateral_movement.yml"
],
"tags": [
@@ -2303,10 +2303,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_atsvc_lateral_movement.yml"
],
"tags": [
@@ -2341,8 +2341,8 @@
"logsource.product": "rpc_firewall",
"refs": [
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-DRSR.md",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_dcsync_attack.yml"
],
@@ -2391,10 +2391,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_lateral_movement.yml"
],
"tags": [
@@ -2428,8 +2428,8 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_dcom_or_wmi.yml"
],
@@ -2471,10 +2471,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sasec_lateral_movement.yml"
],
"tags": [
@@ -2508,12 +2508,12 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-pan/e44d984c-07d3-414c-8ffc-f8c8ad8512a8",
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-pan/e44d984c-07d3-414c-8ffc-f8c8ad8512a8",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RPRN-PAR.md",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1",
- "https://github.com/zeronetworks/rpcfirewall",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_printing_lateral_movement.yml"
],
"tags": [
@@ -2536,10 +2536,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/02b1f559-fda2-4ba3-94c2-806eb2777183",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/02b1f559-fda2-4ba3-94c2-806eb2777183",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sharphound_recon_sessions.yml"
],
"tags": [
@@ -2564,8 +2564,8 @@
"refs": [
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942",
- "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-EFSR.md",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_efs_abuse.yml"
],
"tags": [
@@ -2588,10 +2588,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/zeronetworks/rpcfirewall",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_sasec_recon.yml"
],
"tags": [
@@ -2614,10 +2614,10 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://github.com/zeronetworks/rpcfirewall",
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md",
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78",
+ "https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement.yml"
],
"tags": [
@@ -2641,9 +2641,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
- "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
- "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
"https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
+ "https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md",
+ "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_remote_server_service_abuse.yml"
],
@@ -2667,9 +2667,9 @@
"logsource.category": "application",
"logsource.product": "rpc_firewall",
"refs": [
+ "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931",
"https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md",
- "https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/",
"https://github.com/zeronetworks/rpcfirewall",
"https://github.com/SigmaHQ/sigma/tree/master/rules/application/rpc_firewall/rpc_firewall_atsvc_recon.yml"
],
@@ -2727,10 +2727,10 @@
"logsource.product": "windows",
"refs": [
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
"https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_proc_access_lsass_susp_source.yml"
],
"tags": [
@@ -2911,8 +2911,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/timbmsft/status/900724491076214784",
"https://github.com/hlldz/Invoke-Phant0m",
+ "https://twitter.com/timbmsft/status/900724491076214784",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_invoke_phantom.yml"
],
"tags": [
@@ -2946,8 +2946,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/mrd0x/status/1460597833917251595",
- "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
"https://twitter.com/_xpn_/status/1491557187168178176",
+ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump_evasion.yml"
],
"tags": [
@@ -3192,10 +3192,10 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003.001/T1003.001.md",
- "https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
"https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html",
"https://research.splunk.com/endpoint/windows_possible_credential_dumping/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003.001/T1003.001.md",
+ "https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump.yml"
],
"tags": [
@@ -3229,10 +3229,10 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
+ "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
"https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
- "https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
+ "http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_cred_dump_lsass_access.yml"
],
"tags": [
@@ -3268,10 +3268,10 @@
"logsource.product": "windows",
"refs": [
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
"https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_rare_proc_access_lsass.yml"
],
"tags": [
@@ -3306,10 +3306,10 @@
"logsource.product": "windows",
"refs": [
"http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
"https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html",
"https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow",
- "https://docs.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_proc_access_lsass.yml"
],
"tags": [
@@ -3517,8 +3517,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
"https://twitter.com/_xpn_/status/1491557187168178176",
+ "https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_lsass_memdump_indicators.yml"
],
"tags": [
@@ -3587,8 +3587,8 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://github.com/boku7/injectAmsiBypass",
"https://github.com/boku7/spawn",
+ "https://github.com/boku7/injectAmsiBypass",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_cobaltstrike_bof_injection_pattern.yml"
],
"tags": [
@@ -3623,9 +3623,9 @@
"logsource.category": "process_access",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1541920424635912196",
- "https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-3.html",
"https://github.com/elastic/detection-rules/blob/2bc1795f3d7bcc3946452eb4f07ae799a756d94e/rules/windows/credential_access_lsass_handle_via_malseclogon.toml",
+ "https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-3.html",
+ "https://twitter.com/SBousseaden/status/1541920424635912196",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_access/proc_access_win_susp_seclogon.yml"
],
"tags": [
@@ -3739,8 +3739,8 @@
"logsource.category": "sysmon_error",
"logsource.product": "windows",
"refs": [
- "https://talesfrominfosec.blogspot.com/2017/12/killing-sysmon-silently.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://talesfrominfosec.blogspot.com/2017/12/killing-sysmon-silently.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/sysmon/sysmon_config_modification_error.yml"
],
"tags": [
@@ -3773,8 +3773,8 @@
"logsource.category": "sysmon_status",
"logsource.product": "windows",
"refs": [
- "https://talesfrominfosec.blogspot.com/2017/12/killing-sysmon-silently.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://talesfrominfosec.blogspot.com/2017/12/killing-sysmon-silently.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/sysmon/sysmon_config_modification_status.yml"
],
"tags": [
@@ -3807,8 +3807,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752",
"https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575",
+ "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_susp_cobaltstrike_pipe_patterns.yml"
],
"tags": [
@@ -3833,8 +3833,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752",
"https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575",
+ "https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_mal_cobaltstrike_re.yml"
],
"tags": [
@@ -3916,10 +3916,10 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/d4rksystem/status/1357010969264873472",
+ "https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis/",
"https://blog.cobaltstrike.com/2021/02/09/learn-pipe-fitting-for-all-of-your-offense-projects/",
"https://redcanary.com/threat-detection-report/threats/cobalt-strike/",
- "https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis/",
+ "https://twitter.com/d4rksystem/status/1357010969264873472",
"https://github.com/SigmaHQ/sigma/issues/253",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_mal_cobaltstrike.yml"
],
@@ -3945,8 +3945,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "Internal Research",
"https://attack.mitre.org/groups/G0010/",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_apt_turla_namedpipes.yml"
],
"tags": [
@@ -4135,8 +4135,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_psexec_default_pipe_from_susp_location.yml"
],
"tags": [
@@ -4170,8 +4170,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1429530155291193354?s=20",
"https://github.com/zcgonvh/EfsPotato",
+ "https://twitter.com/SBousseaden/status/1429530155291193354?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_efspotato_namedpipe.yml"
],
"tags": [
@@ -4231,18 +4231,18 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://www.us-cert.gov/ncas/alerts/TA17-117A",
- "https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html",
- "https://thedfirreport.com/2020/06/21/snatch-ransomware/",
- "https://github.com/RiccardoAncarani/LiquidSnake",
- "https://securelist.com/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/71275/",
- "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf",
- "https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/",
- "https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity",
- "https://us-cert.cisa.gov/ncas/analysis-reports/ar19-304a",
"https://securelist.com/faq-the-projectsauron-apt/75533/",
- "https://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
+ "https://us-cert.cisa.gov/ncas/analysis-reports/ar19-304a",
+ "https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html",
+ "https://www.us-cert.gov/ncas/alerts/TA17-117A",
+ "https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/",
"https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/",
+ "https://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf",
+ "https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity",
+ "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf",
+ "https://securelist.com/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/71275/",
+ "https://github.com/RiccardoAncarani/LiquidSnake",
+ "https://thedfirreport.com/2020/06/21/snatch-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_mal_namedpipes.yml"
],
"tags": [
@@ -4267,8 +4267,8 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_psexec_default_pipe.yml"
],
"tags": [
@@ -4302,9 +4302,9 @@
"logsource.category": "pipe_created",
"logsource.product": "windows",
"refs": [
- "https://o365blog.com/post/adfs/",
- "https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/ADFSDBNamedPipeConnection.yaml",
"https://github.com/Azure/SimuLand",
+ "https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/ADFSDBNamedPipeConnection.yaml",
+ "https://o365blog.com/post/adfs/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/pipe_created/pipe_created_susp_adfs_namedpipe_connection.yml"
],
"tags": [
@@ -4768,9 +4768,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages",
"https://twitter.com/MsftSecIntel/status/1257324139515269121",
"https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore",
- "https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_iso_mount.yml"
],
"tags": [
@@ -4898,8 +4898,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6423",
+ "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_device_installation_blocked.yml"
],
"tags": "No established tags"
@@ -4945,8 +4945,8 @@
"logsource.product": "windows",
"refs": [
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4672",
- "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4964",
+ "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_admin_logon.yml"
],
"tags": "No established tags"
@@ -5032,8 +5032,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/Set-AuditRule/blob/c3dec5443414231714d850565d364ca73475ade5/rules/registry/aad_connect_health_monitoring_agent.yml",
"https://o365blog.com/post/hybridhealthagent/",
+ "https://github.com/OTRF/Set-AuditRule/blob/c3dec5443414231714d850565d364ca73475ade5/rules/registry/aad_connect_health_monitoring_agent.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_aadhealth_mon_agent_regkey_access.yml"
],
"tags": [
@@ -5253,9 +5253,9 @@
"refs": [
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4624",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4776",
- "https://github.com/sensepost/ruler",
- "https://github.com/staaldraad/go-ntlm/blob/cd032d41aa8ce5751c07cb7945400c0f5c81e2eb/ntlm/ntlmv1.go#L427",
"https://github.com/sensepost/ruler/issues/47",
+ "https://github.com/staaldraad/go-ntlm/blob/cd032d41aa8ce5751c07cb7945400c0f5c81e2eb/ntlm/ntlmv1.go#L427",
+ "https://github.com/sensepost/ruler",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_ruler.yml"
],
"tags": [
@@ -5331,8 +5331,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html",
"https://blog.f-secure.com/wp-content/uploads/2019/10/CosmicDuke.pdf",
+ "https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html",
"https://awakesecurity.com/blog/threat-hunting-for-paexec/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_mal_service_installs.yml"
],
@@ -5486,9 +5486,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4634",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4647",
+ "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_user_logoff.yml"
],
"tags": "No established tags"
@@ -5556,9 +5556,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis",
- "https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/",
"https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events",
+ "https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/",
+ "https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_pass_the_hash_2.yml"
],
"tags": [
@@ -5715,8 +5715,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1207671369963646976",
"https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
+ "https://twitter.com/SBousseaden/status/1207671369963646976",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_apt_wocao.yml"
],
"tags": [
@@ -5769,9 +5769,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_dirkjan/status/1309214379003588608",
"https://dirkjanm.io/a-different-way-of-abusing-zerologon/",
"https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1",
+ "https://twitter.com/_dirkjan/status/1309214379003588608",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dce_rpc_smb_spoolss_named_pipe.yml"
],
"tags": [
@@ -5986,15 +5986,15 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4729",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730",
+ "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634",
+ "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
+ "https://www.cisecurity.org/controls/cis-controls-list/",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=632",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4728",
- "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=633",
- "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_group_modification_logging.yml"
],
"tags": "No established tags"
@@ -6064,8 +6064,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/detection-rules/blob/fb6ee2c69864ffdfe347bf3b050cb931f53067a6/rules/windows/privilege_escalation_krbrelayup_suspicious_logon.toml",
"https://twitter.com/sbousseaden/status/1518976397364056071?s=12&t=qKO5eKHvWhAP19a50FTZ7g",
+ "https://github.com/elastic/detection-rules/blob/fb6ee2c69864ffdfe347bf3b050cb931f53067a6/rules/windows/privilege_escalation_krbrelayup_suspicious_logon.toml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_krbrelayup.yml"
],
"tags": [
@@ -6294,8 +6294,8 @@
"logsource.product": "windows",
"refs": [
"https://blog.alsid.eu/dcshadow-explained-4510f52fc19d",
- "https://twitter.com/gentilkiwi/status/1003236624925413376",
"https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
+ "https://twitter.com/gentilkiwi/status/1003236624925413376",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_possible_dc_shadow.yml"
],
"tags": [
@@ -6432,9 +6432,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4616",
"Private Cuckoo Sandbox (from many years ago, no longer have hash, NDA as well)",
"Live environment caused by malware",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4616",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_time_modification.yml"
],
"tags": [
@@ -7107,8 +7107,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4649",
+ "https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_replay_attack_detected.yml"
],
"tags": "No established tags"
@@ -7129,9 +7129,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://gist.github.com/Cyb3rWard0g/cf08c38c61f7e46e8404b38201ca01c8",
"https://twitter.com/SecurityJosh/status/1283027365770276866",
"https://twitter.com/Flangvik/status/1283054508084473861",
- "https://gist.github.com/Cyb3rWard0g/cf08c38c61f7e46e8404b38201ca01c8",
"https://securityjosh.github.io/2020/04/23/Mute-Sysmon.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_sysmon_channel_reference_deletion.yml"
],
@@ -7411,9 +7411,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/splunk/security_content/blob/develop/detections/endpoint/petitpotam_suspicious_kerberos_tgt_request.yml",
- "https://github.com/topotam/PetitPotam",
"https://isc.sans.edu/forums/diary/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability/27668/",
+ "https://github.com/topotam/PetitPotam",
+ "https://github.com/splunk/security_content/blob/develop/detections/endpoint/petitpotam_suspicious_kerberos_tgt_request.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_petitpotam_susp_tgt_request.yml"
],
"tags": [
@@ -7583,8 +7583,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=3458",
"https://www.trimarcsecurity.com/single-post/TrimarcResearch/Detecting-Kerberoasting-Activity",
+ "https://adsecurity.org/?p=3458",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_rc4_kerberos.yml"
],
"tags": [
@@ -7725,9 +7725,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4741",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4743",
"https://github.com/Yamato-Security/EnableWindowsLogSettings/blob/7f6d755d45ac7cc9fc35b0cbf498e6aa4ef19def/ConfiguringSecurityLogAuditPolicies.md",
- "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4741",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_add_remove_computer.yml"
],
"tags": "No established tags"
@@ -7822,8 +7822,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4699",
"https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4701",
+ "https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4699",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_scheduled_task_delete.yml"
],
"tags": [
@@ -8183,10 +8183,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4800",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_workstation_was_locked.yml"
],
"tags": "No established tags"
@@ -8236,16 +8236,16 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
- "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
- "https://twitter.com/_xpn_/status/1268712093928378368",
"https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"http://managed670.rssing.com/chan-5590147/all_p1.html",
+ "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
"https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
- "https://bunnyinside.com/?term=f71e8cb9c76a",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://bunnyinside.com/?term=f71e8cb9c76a",
+ "https://twitter.com/_xpn_/status/1268712093928378368",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dot_net_etw_tamper.yml"
],
"tags": [
@@ -8373,8 +8373,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/44fbe85f72ee91582876b49678f9a26292a155fb/Command%20and%20Control/DE_RDP_Tunnel_5156.evtx",
"https://twitter.com/SBousseaden/status/1096148422984384514",
+ "https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/44fbe85f72ee91582876b49678f9a26292a155fb/Command%20and%20Control/DE_RDP_Tunnel_5156.evtx",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_rdp_reverse_tunnel.yml"
],
"tags": [
@@ -8477,8 +8477,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/",
+ "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_teams_suspicious_objectaccess.yml"
],
"tags": [
@@ -8511,8 +8511,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=2053",
"https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/",
+ "https://adsecurity.org/?p=2053",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_enable_weak_encryption.yml"
],
"tags": [
@@ -8624,8 +8624,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://securitydatasets.com/notebooks/small/windows/08_lateral_movement/SDWIN-200806015757.html?highlight=create%20file",
"https://github.com/OTRF/ThreatHunter-Playbook/blob/f7a58156dbfc9b019f17f638b8c62d22e557d350/playbooks/WIN-201012004336.yaml",
+ "https://securitydatasets.com/notebooks/small/windows/08_lateral_movement/SDWIN-200806015757.html?highlight=create%20file",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_smb_file_creation_admin_shares.yml"
],
"tags": [
@@ -8649,8 +8649,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/duzvik/status/1269671601852813320",
"https://medium.com/@7a616368/can-you-track-processes-accessing-the-camera-and-microphone-7e6885b37072",
+ "https://twitter.com/duzvik/status/1269671601852813320",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_camera_microphone_access.yml"
],
"tags": [
@@ -8741,9 +8741,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "http://www.stuffithoughtiknew.com/2019/02/detecting-bloodhound.html",
"https://www.specterops.io/assets/resources/an_ace_up_the_sleeve.pdf",
"https://docs.microsoft.com/en-us/windows/win32/adschema/attributes-all",
- "http://www.stuffithoughtiknew.com/2019/02/detecting-bloodhound.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_ad_user_enumeration.yml"
],
"tags": [
@@ -8767,9 +8767,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/",
- "https://msdn.microsoft.com/en-us/library/cc220234.aspx",
"https://adsecurity.org/?p=3466",
+ "https://msdn.microsoft.com/en-us/library/cc220234.aspx",
+ "https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_alert_ad_user_backdoors.yml"
],
"tags": [
@@ -8827,8 +8827,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1581300963650187264?",
"https://cyberstoph.org/posts/2022/03/detecting-shadow-credentials/",
+ "https://twitter.com/SBousseaden/status/1581300963650187264?",
"https://www.elastic.co/guide/en/security/8.4/potential-shadow-credentials-added-to-ad-object.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_possible_shadow_credentials_added.yml"
],
@@ -8862,8 +8862,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_mal_wceaux_dll.yml"
],
"tags": [
@@ -8897,8 +8897,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/",
+ "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://www.sans.org/webcasts/119395",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_cobaltstrike_service_installs.yml"
],
@@ -8990,10 +8990,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662",
"https://blog.blacklanternsecurity.com/p/detecting-dcsync?s=r",
- "https://twitter.com/gentilkiwi/status/1003236624925413376",
"https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2",
+ "https://twitter.com/gentilkiwi/status/1003236624925413376",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_dcsync.yml"
],
"tags": [
@@ -9084,8 +9084,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625",
"https://twitter.com/SBousseaden/status/1101431884540710913",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_failed_logon_reasons.yml"
],
"tags": [
@@ -9112,8 +9112,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1490608838701166596",
"https://www.elastic.co/guide/en/security/current/windows-service-installed-via-an-unusual-client.html",
+ "https://twitter.com/SBousseaden/status/1490608838701166596",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_service_installation_by_unusal_client.yml"
],
"tags": [
@@ -9179,9 +9179,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/malmoeb/status/1511760068743766026",
"https://github.com/WazeHell/sam-theadmin/blob/main/sam_the_admin.py",
"https://github.com/helloexp/0day/blob/614227a7b9beb0e91e7e2c6a5e532e6f7a8e883c/00-CVE_EXP/CVE-2021-42287/sam-the-admin/sam_the_admin.py",
- "https://twitter.com/malmoeb/status/1511760068743766026",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/security/win_security_susp_computer_name.yml"
],
"tags": [
@@ -9372,8 +9372,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://goo.gl/PsqrhT",
"https://twitter.com/JohnLaTwC/status/1004895028995477505",
+ "https://goo.gl/PsqrhT",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/ntlm/win_susp_ntlm_auth.yml"
],
"tags": [
@@ -9678,8 +9678,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/5092b2672b4cb87a8dd1c2e6047b487b95995ad8ed5e9fc217f46b8bfb1b8c01",
"https://www.virustotal.com/gui/file/15b57c1b68cd6ce3c161042e0f3be9f32d78151fe95461eedc59a79fc222c7ed",
+ "https://www.virustotal.com/gui/file/5092b2672b4cb87a8dd1c2e6047b487b95995ad8ed5e9fc217f46b8bfb1b8c01",
"https://www.virustotal.com/gui/file/13828b390d5f58b002e808c2c4f02fdd920e236cc8015480fa33b6c1a9300e31",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_av_relevant_match.yml"
],
@@ -9793,8 +9793,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5",
"https://technet.microsoft.com/en-us/library/security/4022344",
+ "https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_susp_msmpeng_crash.yml"
],
"tags": [
@@ -9853,9 +9853,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-erref/596a1078-e883-4972-9bbc-49e60bebca55",
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
"https://github.com/deepinstinct/Lsass-Shtinkering",
+ "https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-erref/596a1078-e883-4972-9bbc-49e60bebca55",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_werfault_susp_lsass_credential_dump.yml"
],
"tags": [
@@ -9888,10 +9888,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.youtube.com/watch?v=ebmW42YYveI",
"https://twitter.com/VM_vivisector/status/1217190929330655232",
- "https://twitter.com/DidierStevens/status/1217533958096924676",
+ "https://www.youtube.com/watch?v=ebmW42YYveI",
"https://twitter.com/FlemmingRiis/status/1217147415482060800",
+ "https://twitter.com/DidierStevens/status/1217533958096924676",
"https://nullsec.us/windows-event-log-audit-cve/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_audit_cve.yml"
],
@@ -10050,8 +10050,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16",
"https://docs.microsoft.com/en-us/sql/t-sql/statements/drop-server-audit-transact-sql?view=sql-server-ver16",
+ "https://docs.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16",
"https://www.netspi.com/blog/technical/network-penetration-testing/sql-server-persistence-part-1-startup-stored-procedures/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/application/win_mssql_disable_audit_settings.yml"
],
@@ -10172,8 +10172,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/",
"https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/",
+ "https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/driverframeworks/win_usb_device_plugged.yml"
],
"tags": [
@@ -10197,8 +10197,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/j00sean/status/1537750439701225472",
"https://twitter.com/nas_bench/status/1539679555908141061",
+ "https://twitter.com/j00sean/status/1537750439701225472",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/diagnosis/scripted/win_diagnosis_scripted_load_remote_diagcab.yml"
],
"tags": [
@@ -10221,8 +10221,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/40fe118976734578f83e5e839b9c63ae7a4af82d/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md#windows-codeintegrity-operational-log",
"https://twitter.com/SBousseaden/status/1483810148602814466",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/40fe118976734578f83e5e839b9c63ae7a4af82d/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md#windows-codeintegrity-operational-log",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/code_integrity/win_codeintegrity_attempted_dll_load.yml"
],
"tags": [
@@ -10245,8 +10245,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/40fe118976734578f83e5e839b9c63ae7a4af82d/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md#windows-codeintegrity-operational-log",
"https://twitter.com/wdormann/status/1590434950335320065",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/40fe118976734578f83e5e839b9c63ae7a4af82d/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md#windows-codeintegrity-operational-log",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/code_integrity/win_codeintegrity_blocked_driver_load.yml"
],
"tags": [
@@ -10338,9 +10338,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/hhlxf/PrintNightmare",
- "https://github.com/afwu/PrintNightmare",
"https://twitter.com/KevTheHermit/status/1410203844064301056",
+ "https://github.com/afwu/PrintNightmare",
+ "https://github.com/hhlxf/PrintNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/smbclient/win_susp_failed_guest_logon.yml"
],
"tags": [
@@ -10387,11 +10387,11 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse",
"https://winaero.com/enable-openssh-server-windows-10/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse",
"https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack/tree/master/TA0008-Lateral%20Movement/T1021.004-Remote%20Service%20SSH",
- "https://virtualizationreview.com/articles/2020/05/21/ssh-server-on-windows-10.aspx",
"https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16",
+ "https://virtualizationreview.com/articles/2020/05/21/ssh-server-on-windows-10.aspx",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/openssh/win_sshd_openssh_server_listening_on_socket.yml"
],
"tags": [
@@ -10415,9 +10415,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/hhlxf/PrintNightmare",
- "https://github.com/afwu/PrintNightmare",
"https://twitter.com/fuzzyf10w/status/1410202370835898371",
+ "https://github.com/afwu/PrintNightmare",
+ "https://github.com/hhlxf/PrintNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/printservice/win_exploit_cve_2021_1675_printspooler.yml"
],
"tags": [
@@ -10485,9 +10485,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWProvidersManifests/Windows11/22H2/W11_22H2_Pro_20221220_22621.963/WEPExplorer/LsaSrv.xml",
"https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection",
"https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers",
- "https://github.com/nasbench/EVTX-ETW-Resources/blob/7a806a148b3d9d381193d4a80356016e6e8b1ee8/ETWProvidersManifests/Windows11/22H2/W11_22H2_Pro_20221220_22621.963/WEPExplorer/LsaSrv.xml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/lsa_server/win_lsa_server_normal_user_admin.yml"
],
"tags": [
@@ -10535,8 +10535,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide",
"https://bhabeshraj.com/post/tampering-with-microsoft-defenders-tamper-protection",
+ "https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_tamper_protection_trigger.yml"
],
"tags": [
@@ -10560,8 +10560,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_disabled.yml"
],
"tags": [
@@ -10686,8 +10686,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus",
"https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/windefend/win_defender_history_delete.yml"
],
"tags": [
@@ -10849,10 +10849,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_direct_ip_access.yml"
],
"tags": [
@@ -11022,8 +11022,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/malmoeb/status/1535142803075960832",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md",
+ "https://twitter.com/malmoeb/status/1535142803075960832",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_susp_domain.yml"
],
@@ -11058,8 +11058,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/malmoeb/status/1535142803075960832",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md",
+ "https://twitter.com/malmoeb/status/1535142803075960832",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/bits_client/win_bits_client_uncommon_domain.yml"
],
"tags": [
@@ -11646,8 +11646,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/",
+ "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://www.sans.org/webcasts/119395",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_cobaltstrike_service_installs.yml"
],
@@ -11717,9 +11717,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_susp_dhcp_config.yml"
],
"tags": [
@@ -11845,8 +11845,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.secura.com/blog/zero-logon",
"https://bi-zone.medium.com/hunting-for-zerologon-f65c61586382",
+ "https://www.secura.com/blog/zero-logon",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_possible_zerologon_exploitation_using_wellknown_tools.yml"
],
"tags": [
@@ -12291,8 +12291,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_defender_disabled.yml"
],
"tags": [
@@ -12409,8 +12409,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/jonasLyk/status/1347900440000811010",
- "https://twitter.com/wdormann/status/1347958161609809921",
"https://www.bleepingcomputer.com/news/security/windows-10-bug-corrupts-your-hard-drive-on-seeing-this-files-icon/",
+ "https://twitter.com/wdormann/status/1347958161609809921",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_ntfs_vuln_exploit.yml"
],
"tags": [
@@ -12495,9 +12495,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_susp_dhcp_config_failed.yml"
],
"tags": [
@@ -13043,8 +13043,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/system/win_system_service_install_psexec.yml"
],
"tags": [
@@ -13256,8 +13256,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)",
+ "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/dns_server_analytic/win_dns_analytic_apt_gallium.yml"
],
"tags": [
@@ -13492,9 +13492,9 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://nxlog.co/documentation/nxlog-user-guide/applocker.html",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
+ "https://nxlog.co/documentation/nxlog-user-guide/applocker.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/applocker/win_applocker_file_was_not_allowed_to_run.yml"
],
"tags": [
@@ -13565,11 +13565,11 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
+ "https://github.com/BloodHoundAD/SharpHound3/blob/7d96b991b1887ff50349ce59c80980bc0d95c86a/SharpHound3/LdapBuilder.cs",
+ "https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/Recon/PowerView.ps1",
+ "https://github.com/fox-it/BloodHound.py/blob/d65eb614831cd30f26028ccb072f5e77ca287e0b/bloodhound/ad/domain.py#L427",
"https://medium.com/falconforce/falconfriday-detecting-active-directory-data-collection-0xff21-c22d1a57494c",
"https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/hunting-for-reconnaissance-activities-using-ldap-search-filters/ba-p/824726",
- "https://github.com/BloodHoundAD/SharpHound3/blob/7d96b991b1887ff50349ce59c80980bc0d95c86a/SharpHound3/LdapBuilder.cs",
- "https://github.com/fox-it/BloodHound.py/blob/d65eb614831cd30f26028ccb072f5e77ca287e0b/bloodhound/ad/domain.py#L427",
- "https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/Recon/PowerView.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/ldap/win_ldap_recon.yml"
],
"tags": [
@@ -13611,10 +13611,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "Internal Research",
"https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_uncommon_package_locations.yml"
],
"tags": [
@@ -13637,10 +13637,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "Internal Research",
"https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_package_locations.yml"
],
"tags": [
@@ -13663,10 +13663,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "Internal Research",
"https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_domains.yml"
],
"tags": [
@@ -13689,10 +13689,10 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
- "Internal Research",
"https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting",
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_appx_package_installation.yml"
],
"tags": [
@@ -13739,8 +13739,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://forensicitguy.github.io/analyzing-magnitude-magniber-appx/",
+ "https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
"https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_mal_appx_names.yml"
],
@@ -14050,8 +14050,8 @@
"logsource.category": "create_stream_hash",
"logsource.product": "windows",
"refs": [
- "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
+ "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_stream_hash/create_stream_hash_susp_domain_ext_combo.yml"
],
"tags": [
@@ -14085,8 +14085,8 @@
"logsource.category": "create_stream_hash",
"logsource.product": "windows",
"refs": [
- "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015",
+ "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_stream_hash/create_stream_hash_susp_domain_ext_combo_med.yml"
],
"tags": [
@@ -14328,9 +14328,9 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://www.dfirnotes.net/portproxy_detection/",
"https://adepts.of0x.cc/netsh-portproxy-code/",
"https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html",
+ "https://www.dfirnotes.net/portproxy_detection/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_portproxy_registry_key.yml"
],
"tags": [
@@ -14462,8 +14462,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/4464eaf0-f34f-40d5-b970-736437a21913",
- "https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760",
"https://www.lexjansen.com/sesug/1993/SESUG93035.pdf",
+ "https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_mimikatz_printernightmare.yml"
],
"tags": [
@@ -14522,8 +14522,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
"https://twitter.com/pabraeken/status/990717080805789697",
+ "https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_runonce_persistence.yml"
],
"tags": [
@@ -14547,8 +14547,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/14f90406-10a0-4d36-a672-31cabe149f2f.html",
"http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/",
+ "https://eqllib.readthedocs.io/en/latest/analytics/14f90406-10a0-4d36-a672-31cabe149f2f.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_new_dll_added_to_appcertdlls_registry_key.yml"
],
"tags": [
@@ -14728,8 +14728,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/eset/malware-ioc/tree/master/oceanlotus",
"https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/",
+ "https://github.com/eset/malware-ioc/tree/master/oceanlotus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_apt_oceanlotus_registry.yml"
],
"tags": [
@@ -14813,8 +14813,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
"https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
+ "https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_stickykey_like_backdoor.yml"
],
"tags": [
@@ -14958,8 +14958,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "https://outflank.nl/blog/2018/01/16/hunting-for-evil-detect-macros-being-executed/",
"http://az4n6.blogspot.com/2016/02/more-on-trust-records-macros-and.html",
+ "https://outflank.nl/blog/2018/01/16/hunting-for-evil-detect-macros-being-executed/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_trust_record_modification.yml"
],
"tags": [
@@ -14983,8 +14983,8 @@
"logsource.category": "registry_event",
"logsource.product": "windows",
"refs": [
- "http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
"https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
+ "http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_susp_atbroker_change.yml"
],
"tags": [
@@ -15135,8 +15135,8 @@
"refs": [
"https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/",
"https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass",
- "https://github.com/hfiref0x/UACME",
"https://tria.ge/211119-gs7rtshcfr/behavioral2 [Lokibot sample from Nov 2021]",
+ "https://github.com/hfiref0x/UACME",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_event/registry_event_shell_open_keys_manipulation.yml"
],
"tags": [
@@ -15484,11 +15484,11 @@
"logsource.category": "registry_delete",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/7",
+ "https://threathunterplaybook.com/evals/apt29/detections/3.C.1_22A46621-7A92-48C1-81BF-B3937EB4FDC3.html",
"https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
"https://docs.microsoft.com/en-us/windows/win32/shell/launch",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/7",
"https://docs.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code",
- "https://threathunterplaybook.com/evals/apt29/detections/3.C.1_22A46621-7A92-48C1-81BF-B3937EB4FDC3.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_delete/registry_delete_removal_com_hijacking_registry_key.yml"
],
"tags": [
@@ -15694,11 +15694,11 @@
"logsource.category": "registry_add",
"logsource.product": "windows",
"refs": [
- "https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/",
"https://www.fortinet.com/blog/threat-research/new-netwire-rat-variant-spread-by-phishing",
+ "https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/",
+ "https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/",
"https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line",
"https://unit42.paloaltonetworks.com/guloader-installing-netwire-rat/",
- "https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_add/registry_add_mal_netwire.yml"
],
"tags": [
@@ -15814,8 +15814,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/",
"https://twitter.com/Hexacorn/status/991447379864932352",
+ "http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/",
"https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OSBinaries/Wab.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_wab_dllpath_reg_change.yml"
],
@@ -15883,8 +15883,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/",
"https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/",
+ "https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_cve_2021_31979_cve_2021_33771_exploits.yml"
],
"tags": [
@@ -15944,8 +15944,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/",
"https://persistence-info.github.io/Data/htmlhelpauthor.html",
+ "https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_chm.yml"
],
"tags": [
@@ -16168,9 +16168,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentversion_nt.yml"
],
"tags": [
@@ -16194,13 +16194,13 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
"https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
+ "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
+ "http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
"http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
"https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
- "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
"https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_terminal_server_suspicious.yml"
],
"tags": [
@@ -16274,9 +16274,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_session_manager.yml"
],
"tags": [
@@ -16357,8 +16357,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass",
"https://www.exploit-db.com/exploits/47696",
+ "http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_comhijack_sdclt.yml"
],
"tags": [
@@ -16448,9 +16448,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/zloader-with-a-new-infection-technique/",
"https://twitter.com/inversecos/status/1494174785621819397",
"https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/",
- "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/zloader-with-a-new-infection-technique/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_office_security.yml"
],
"tags": [
@@ -16570,10 +16570,10 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node.yml"
],
"tags": [
@@ -16597,8 +16597,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index",
"https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files",
+ "https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_susp_keyboard_layout_load.yml"
],
"tags": [
@@ -16764,8 +16764,8 @@
"logsource.product": "windows",
"refs": [
"https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf",
- "https://persistence-info.github.io/Data/codesigning.html",
"https://github.com/gtworek/PSBits/tree/master/SIP",
+ "https://persistence-info.github.io/Data/codesigning.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_sip_persistence.yml"
],
"tags": [
@@ -16800,9 +16800,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_classes.yml"
],
"tags": [
@@ -16974,8 +16974,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.youtube.com/watch?v=3gz1QmiMhss&t=1251s",
"https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1546.015/T1546.015.md",
+ "https://www.youtube.com/watch?v=3gz1QmiMhss&t=1251s",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_treatas_persistence.yml"
],
"tags": [
@@ -17031,8 +17031,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/DebugPrivilege/CPP/blob/c39d365617dbfbcb01fffad200d52b6239b2918c/Windows%20Defender/RestoreDefenderConfig.cpp",
"https://twitter.com/WhichbufferArda/status/1543900539280293889",
+ "https://github.com/DebugPrivilege/CPP/blob/c39d365617dbfbcb01fffad200d52b6239b2918c/Windows%20Defender/RestoreDefenderConfig.cpp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_winevt_logging.yml"
],
"tags": [
@@ -17065,8 +17065,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-33---windows-add-registry-value-to-load-service-in-safe-mode-without-network",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-34---windows-add-registry-value-to-load-service-in-safe-mode-with-network",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-33---windows-add-registry-value-to-load-service-in-safe-mode-without-network",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode.yml"
],
"tags": [
@@ -17183,8 +17183,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/",
"https://www.deepinstinct.com/2021/02/16/lsass-memory-dumps-are-stealthier-than-ever-before-part-2/",
+ "https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_globalflags.yml"
],
"tags": [
@@ -17406,8 +17406,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1137/T1137.md",
"https://docs.microsoft.com/en-us/outlook/troubleshoot/security/information-about-email-security-settings",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1137/T1137.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_outlook_security.yml"
],
"tags": [
@@ -17441,10 +17441,10 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
- "https://persistence-info.github.io/Data/userinitmprlogonscript.html",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://persistence-info.github.io/Data/userinitmprlogonscript.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_common.yml"
],
"tags": [
@@ -17559,13 +17559,13 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
"https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html",
+ "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
+ "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
+ "http://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+6+Registry/Registry+Keys+for+Terminal+Services/",
"http://woshub.com/rds-shadow-how-to-connect-to-a-user-session-in-windows-server-2012-r2/",
"https://twitter.com/SagieSec/status/1469001618863624194?t=HRf0eA0W1YYzkTSHb-Ky1A&s=03",
- "https://admx.help/HKLM/SOFTWARE/Policies/Microsoft/Windows%20NT/Terminal%20Services",
"https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-190407183310.html",
- "https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_terminal_server_tampering.yml"
],
"tags": [
@@ -17624,9 +17624,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_office.yml"
],
"tags": [
@@ -17651,9 +17651,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node_classes.yml"
],
"tags": [
@@ -17701,8 +17701,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190",
"https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_cve_2022_30190_msdt_follina.yml"
],
"tags": [
@@ -17884,9 +17884,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://itconnect.uw.edu/tools-services-support/it-systems-infrastructure/msinf/other-help/understanding-sddl-syntax/",
"https://learn.microsoft.com/en-us/windows/win32/api/winevt/",
"https://app.any.run/tasks/77b2e328-8f36-46b2-b2e2-8a80398217ab/",
- "https://itconnect.uw.edu/tools-services-support/it-systems-infrastructure/msinf/other-help/understanding-sddl-syntax/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_change_winevt_channelaccess.yml"
],
"tags": [
@@ -17920,9 +17920,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_winsock2.yml"
],
"tags": [
@@ -18151,10 +18151,10 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://gist.github.com/anadr/7465a9fde63d41341136949f14c21105",
"https://admx.help/?Category=Windows_7_2008R2&Policy=Microsoft.Policies.WindowsDefender::SpyNetReporting",
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_windows_defender_tamper.yml"
],
"tags": [
@@ -18468,8 +18468,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-4---add-domain-to-trusted-sites-zone",
+ "https://docs.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_change_security_zones.yml"
],
"tags": [
@@ -18502,8 +18502,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/",
"https://persistence-info.github.io/Data/naturallanguage6.html",
+ "https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_natural_language.yml"
],
"tags": [
@@ -18559,8 +18559,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100",
+ "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_uac_bypass_eventvwr.yml"
],
"tags": [
@@ -18596,9 +18596,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_wow6432node_currentversion.yml"
],
"tags": [
@@ -18647,9 +18647,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentcontrolset.yml"
],
"tags": [
@@ -18755,9 +18755,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_system_scripts.yml"
],
"tags": [
@@ -18781,8 +18781,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
"https://github.com/redcanaryco/atomic-red-team/blob/a8e3cf63e97b973a25903d3df9fd55da6252e564/atomics/T1112/T1112.md",
+ "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_lsa_disablerestrictedadmin.yml"
],
"tags": [
@@ -18807,8 +18807,8 @@
"logsource.product": "windows",
"refs": [
"https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Asaf%20Gilboa%20-%20LSASS%20Shtinkering%20Abusing%20Windows%20Error%20Reporting%20to%20Dump%20LSASS.pdf",
- "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://learn.microsoft.com/en-us/windows/win32/wer/collecting-user-mode-dumps",
+ "https://github.com/deepinstinct/Lsass-Shtinkering",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_lsass_usermode_dumping.yml"
],
"tags": [
@@ -18841,9 +18841,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx",
"https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx",
- "https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_dhcp_calloutdll.yml"
],
"tags": [
@@ -18901,9 +18901,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-7---bypass-uac-using-sdclt-delegateexecute",
- "https://devblogs.microsoft.com/oldnewthing/20100312-01/?p=14623",
"https://docs.microsoft.com/en-us/windows/win32/api/shobjidl_core/nn-shobjidl_core-iexecutecommand",
+ "https://devblogs.microsoft.com/oldnewthing/20100312-01/?p=14623",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-7---bypass-uac-using-sdclt-delegateexecute",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_bypass_uac_using_delegateexecute.yml"
],
"tags": [
@@ -18993,8 +18993,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.slideshare.net/JamieWilliams130/started-from-the-bottom-exploiting-data-sources-to-uncover-attck-behaviors",
"https://twitter.com/jamieantisocial/status/1304520651248668673",
+ "https://www.slideshare.net/JamieWilliams130/started-from-the-bottom-exploiting-data-sources-to-uncover-attck-behaviors",
"https://www.sans.org/cyber-security-summit/archives",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_enabling_cor_profiler_env_variables.yml"
],
@@ -19252,8 +19252,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-1---bypass-uac-using-event-viewer-cmd",
+ "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_bypass_uac_using_eventviewer.yml"
],
"tags": [
@@ -19347,8 +19347,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/1.A.1_DFD6A782-9BDB-4550-AB6B-525E825B095E.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/1",
+ "https://threathunterplaybook.com/evals/apt29/detections/1.A.1_DFD6A782-9BDB-4550-AB6B-525E825B095E.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_new_application_appcompat.yml"
],
"tags": [
@@ -19381,8 +19381,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://gist.github.com/anadr/7465a9fde63d41341136949f14c21105",
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_windows_defender_service.yml"
],
"tags": [
@@ -19407,8 +19407,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/pabraeken/status/998627081360695297",
- "https://jstnk9.github.io/jstnk9/research/InstallScreenSaver-SCR-files",
"https://twitter.com/VakninHai/status/1517027824984547329",
+ "https://jstnk9.github.io/jstnk9/research/InstallScreenSaver-SCR-files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml"
],
"tags": [
@@ -19516,10 +19516,10 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
+ "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/",
- "https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_currentversion.yml"
],
"tags": [
@@ -19576,9 +19576,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=TrojanSpy%3aMSIL%2fHakey.A",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md#atomic-test-1---modify-registry-of-current-user-profile---cmd",
"https://unit42.paloaltonetworks.com/ransomware-families/",
+ "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=TrojanSpy%3aMSIL%2fHakey.A",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_hidden_extention.yml"
],
"tags": [
@@ -19651,8 +19651,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.reddit.com/r/hacking/comments/ajtrws/bypassing_highest_uac_level_windows_810/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.002/T1548.002.md#atomic-test-9---bypass-uac-using-silentcleanup-task",
+ "https://www.reddit.com/r/hacking/comments/ajtrws/bypassing_highest_uac_level_windows_810/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_bypass_uac_using_silentcleanup_task.yml"
],
"tags": [
@@ -19686,9 +19686,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://yoroi.company/research/cyber-criminal-espionage-operation-insists-on-italian-manufacturing/",
"https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_microsoft_office_security_features.yml"
],
"tags": [
@@ -19736,8 +19736,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://admx.help/?Category=Office2016&Policy=office16.Office.Microsoft.Policies.Windows::L_MacroRuntimeScanScope",
"https://github.com/S3cur3Th1sSh1t/OffensiveVBA/blob/28cc6a2802d8176195ac19b3c8e9a749009a82a3/src/AMSIbypasses.vba",
+ "https://admx.help/?Category=Office2016&Policy=office16.Office.Microsoft.Policies.Windows::L_MacroRuntimeScanScope",
"https://www.microsoft.com/en-us/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_macroruntimescanscope.yml"
],
@@ -19761,10 +19761,10 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/detection-rules/issues/1371",
"https://chromeenterprise.google/policies/?policy=DnsOverHttpsMode",
- "https://admx.help/HKLM/Software/Policies/Mozilla/Firefox/DNSOverHTTPS",
"https://www.tenforums.com/tutorials/151318-how-enable-disable-dns-over-https-doh-microsoft-edge.html",
+ "https://github.com/elastic/detection-rules/issues/1371",
+ "https://admx.help/HKLM/Software/Policies/Mozilla/Firefox/DNSOverHTTPS",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_dns_over_https_enabled.yml"
],
"tags": [
@@ -19822,8 +19822,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence",
"https://github.com/redcanaryco/atomic-red-team/blob/4ae9580a1a8772db87a1b6cdb0d03e5af231e966/atomics/T1137.006/T1137.006.md",
+ "https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistance_xll.yml"
],
"tags": [
@@ -19889,9 +19889,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://twitter.com/MichalKoczwara/status/1553634816016498688",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_autologger_sessions.yml"
],
"tags": [
@@ -19914,17 +19914,17 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
+ "https://blog.xpnsec.com/hiding-your-dotnet-complus-etwenabled/",
+ "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
+ "http://managed670.rssing.com/chan-5590147/all_p1.html",
"https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
+ "https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
+ "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://bunnyinside.com/?term=f71e8cb9c76a",
"https://twitter.com/_xpn_/status/1268712093928378368",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
- "https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
- "http://managed670.rssing.com/chan-5590147/all_p1.html",
- "https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
- "https://bunnyinside.com/?term=f71e8cb9c76a",
- "https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
- "https://blog.xpnsec.com/hiding-your-dotnet-complus-etwenabled/",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_dot_net_etw_tamper.yml"
],
"tags": [
@@ -19992,9 +19992,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
"https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md",
+ "https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_asep_reg_keys_modification_internet_explorer.yml"
],
"tags": [
@@ -20018,8 +20018,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
"https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
+ "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_new_network_provider.yml"
],
"tags": [
@@ -20053,8 +20053,8 @@
"logsource.product": "windows",
"refs": [
"https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md",
"https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_disable_function_user.yml"
],
"tags": [
@@ -20103,9 +20103,9 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://persistence-info.github.io/Data/ifilters.html",
"https://twitter.com/0gtweet/status/1468548924600459267",
"https://github.com/gtworek/PSBits/tree/master/IFilter",
+ "https://persistence-info.github.io/Data/ifilters.html",
"https://github.com/gtworek/PSBits/blob/8d767892f3b17eefa4d0668f5d2df78e844f01d8/IFilter/Dll.cpp#L281-L308",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_ifilter.yml"
],
@@ -20153,8 +20153,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/dez_/status/1560101453150257154",
"https://forensafe.com/blogs/typedpaths.html",
+ "https://twitter.com/dez_/status/1560101453150257154",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_persistence_typed_paths.yml"
],
"tags": [
@@ -20178,8 +20178,8 @@
"logsource.category": "registry_set",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md#atomic-test-4---tinyturla-backdoor-service-w64time",
+ "https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/registry/registry_set/registry_set_servicedll_hijack.yml"
],
"tags": [
@@ -20394,10 +20394,10 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/winrm/windows-remote-management-architecture",
"https://github.com/bohops/WSMan-WinRM",
- "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
"https://twitter.com/chadtilbury/status/1275851297770610688",
+ "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
+ "https://docs.microsoft.com/en-us/windows/win32/winrm/windows-remote-management-architecture",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_wsman_provider_image_load.yml"
],
"tags": [
@@ -20472,8 +20472,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/ba88ca45589fae0139a40ca27738a8fc2dfbe1be5a64a9558f4e0f52b35c5add",
"https://twitter.com/am0nsec/status/1412232114980982787",
+ "https://www.virustotal.com/gui/file/ba88ca45589fae0139a40ca27738a8fc2dfbe1be5a64a9558f4e0f52b35c5add",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_susp_vss_ps_load.yml"
],
"tags": [
@@ -20543,8 +20543,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/tifkin_/status/1321916444557365248",
"https://twitter.com/rbmaslen/status/1321859647091970051",
+ "https://twitter.com/tifkin_/status/1321916444557365248",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_pcre_net_load.yml"
],
"tags": [
@@ -20799,12 +20799,12 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "http://remoteawesomethoughts.blogspot.com/2019/05/windows-10-task-schedulerservice.html",
- "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
"https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
- "https://decoded.avast.io/martinchlumecky/png-steganography/",
- "https://github.com/Wh04m1001/SysmonEoP",
"https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
+ "https://decoded.avast.io/martinchlumecky/png-steganography/",
+ "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
+ "http://remoteawesomethoughts.blogspot.com/2019/05/windows-10-task-schedulerservice.html",
+ "https://github.com/Wh04m1001/SysmonEoP",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_non_existent_dlls.yml"
],
"tags": [
@@ -20919,8 +20919,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "http://www.windowexe.com/bbs/board.php?q=jsschhlp-exe-c-program-files-common-files-justsystem-jsschhlp-jsschhlp",
"https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/",
+ "http://www.windowexe.com/bbs/board.php?q=jsschhlp-exe-c-program-files-common-files-justsystem-jsschhlp-jsschhlp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_jsschhlp.yml"
],
"tags": [
@@ -21006,8 +21006,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/XForceIR/SideLoadHunter/blob/cc7ef2e5d8908279b0c4cee4e8b6f85f7b8eed52/SideLoads/README.md",
- "https://blog.cyble.com/2022/07/27/targeted-attacks-being-carried-out-via-dll-sideloading/",
"https://hijacklibs.net/",
+ "https://blog.cyble.com/2022/07/27/targeted-attacks-being-carried-out-via-dll-sideloading/",
"https://blog.cyble.com/2022/07/21/qakbot-resurfaces-with-new-playbook/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_from_non_system_location.yml"
],
@@ -21102,8 +21102,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpapiset-minidumpwritedump",
- "https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6",
"https://www.pinvoke.net/default.aspx/dbghelp/MiniDumpWriteDump.html",
+ "https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_susp_dbghelp_dbgcore_load.yml"
],
"tags": [
@@ -21252,10 +21252,10 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
- "https://thewover.github.io/Introducing-Donut/",
- "https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
"https://github.com/tyranid/DotNetToJScript",
+ "https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
+ "https://thewover.github.io/Introducing-Donut/",
+ "https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_susp_script_dotnet_clr_dll_load.yml"
],
"tags": [
@@ -21427,8 +21427,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://decoded.avast.io/martinchlumecky/png-steganography/",
"https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
+ "https://decoded.avast.io/martinchlumecky/png-steganography/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_side_load_scm.yml"
],
"tags": [
@@ -21720,9 +21720,9 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/HunterPlaybook/status/1301207718355759107",
- "https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/",
"https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html",
+ "https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/",
+ "https://twitter.com/HunterPlaybook/status/1301207718355759107",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_scrcons_imageload_wmi_scripteventconsumer.yml"
],
"tags": [
@@ -21758,8 +21758,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/p3nt4/PowerShdll",
"https://adsecurity.org/?p=2921",
+ "https://github.com/p3nt4/PowerShdll",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_in_memory_powershell.yml"
],
"tags": [
@@ -21942,8 +21942,8 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password",
"https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-creduipromptforcredentialsa",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password",
"https://securitydatasets.com/notebooks/small/windows/06_credential_access/SDWIN-201020013208.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_uipromptforcreds_dlls.yml"
],
@@ -21969,9 +21969,9 @@
"logsource.category": "image_load",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/oulusoyum/status/1191329746069655553",
"https://twitter.com/mattifestation/status/1196390321783025666",
"https://lolbas-project.github.io/lolbas/Binaries/Tttracer/",
+ "https://twitter.com/oulusoyum/status/1191329746069655553",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/image_load/image_load_tttracer_mod_load.yml"
],
"tags": [
@@ -22112,8 +22112,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/RiccardoAncarani/LiquidSnake",
- "https://in.security/an-intro-into-abusing-and-identifying-wmi-event-subscriptions-for-persistence/",
"https://github.com/Neo23x0/signature-base/blob/615bf1f6bac3c1bdc417025c40c073e6c2771a76/yara/gen_susp_lnk_files.yar#L19",
+ "https://in.security/an-intro-into-abusing-and-identifying-wmi-event-subscriptions-for-persistence/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml"
],
"tags": [
@@ -22146,8 +22146,8 @@
"logsource.category": "ps_classic_start",
"logsource.product": "windows",
"refs": [
- "https://github.com/besimorhino/powercat",
"https://nmap.org/ncat/",
+ "https://github.com/besimorhino/powercat",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_powercat.yml"
],
@@ -22182,8 +22182,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/bohops/WSMan-WinRM",
- "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
"https://twitter.com/chadtilbury/status/1275851297770610688",
+ "https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_wsman_com_provider_no_powershell.yml"
],
"tags": [
@@ -22334,8 +22334,8 @@
"logsource.category": "No established category",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_classic/posh_pc_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -22752,6 +22752,33 @@
"uuid": "8d31a8ce-46b5-4dd6-bdc3-680931f1db86",
"value": "Bad Opsec Powershell Code Artifacts"
},
+ {
+ "description": "Detects usage of the \"Import-Module\" cmdlet to load the \"Microsoft.ActiveDirectory.Management.dl\" DLL. Which is often used by attackers to perform AD enumeration.",
+ "meta": {
+ "author": "Nasreddine Bencherchali, frack113",
+ "creation_date": "2023/01/22",
+ "falsepositive": [
+ "Legitimate use of the library for administrative activity"
+ ],
+ "filename": "posh_pm_active_directory_module_dll_import.yml",
+ "level": "medium",
+ "logsource.category": "ps_module",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/samratashok/ADModule",
+ "https://twitter.com/cyb3rops/status/1617108657166061568?s=20",
+ "https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/active-directory-enumeration-with-ad-module-without-rsat-or-admin-privileges",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_active_directory_module_dll_import.yml"
+ ],
+ "tags": [
+ "attack.reconnaissance",
+ "attack.discovery",
+ "attack.impact"
+ ]
+ },
+ "uuid": "74176142-4684-4d8a-8b0a-713257e7df8e",
+ "value": "Potential Active Directory Enumeration Using AD Module - PsModule"
+ },
{
"description": "A General detection for the Get-Clipboard commands in PowerShell logs. This could be an adversary capturing clipboard contents.",
"meta": {
@@ -22790,8 +22817,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/8",
"https://threathunterplaybook.com/evals/apt29/detections/4.A.3_09F29912-8E93-461E-9E89-3F06F6763383.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/8",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_decompress_commands.yml"
],
"tags": [
@@ -22981,41 +23008,6 @@
"uuid": "b140afd9-474b-4072-958e-2ebb435abd68",
"value": "Suspicious Get-ADDBAccount Usage"
},
- {
- "description": "Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network",
- "meta": {
- "author": "frack113",
- "creation_date": "2021/07/21",
- "falsepositive": [
- "Unknown"
- ],
- "filename": "posh_pm_powercat.yml",
- "level": "medium",
- "logsource.category": "ps_module",
- "logsource.product": "windows",
- "refs": [
- "https://github.com/besimorhino/powercat",
- "https://nmap.org/ncat/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
- "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_powercat.yml"
- ],
- "tags": [
- "attack.command_and_control",
- "attack.t1095"
- ]
- },
- "related": [
- {
- "dest-uuid": "c21d5a77-d422-4a69-acd7-2c53c1faa34b",
- "tags": [
- "estimative-language:likelihood-probability=\"almost-certain\""
- ],
- "type": "related-to"
- }
- ],
- "uuid": "bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2",
- "value": "Netcat The Powershell Version - PowerShell Module"
- },
{
"description": "Detects keywords that could indicate clearing PowerShell history",
"meta": {
@@ -23084,6 +23076,89 @@
"uuid": "2f211361-7dce-442d-b78a-c04039677378",
"value": "Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell Module"
},
+ {
+ "description": "Detects Commandlet names from well-known PowerShell exploitation frameworks",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/20",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "posh_pm_malicious_commandlets.yml",
+ "level": "high",
+ "logsource.category": "ps_module",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/calebstewart/CVE-2021-1675",
+ "https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://github.com/besimorhino/powercat",
+ "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
+ "https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
+ "https://github.com/HarmJ0y/DAMP",
+ "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://adsecurity.org/?p=2921",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/samratashok/nishang",
+ "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
+ "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_malicious_commandlets.yml"
+ ],
+ "tags": [
+ "attack.execution",
+ "attack.discovery",
+ "attack.t1482",
+ "attack.t1087",
+ "attack.t1087.001",
+ "attack.t1087.002",
+ "attack.t1069.001",
+ "attack.t1069.002",
+ "attack.t1069",
+ "attack.t1059.001"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "767dbf9e-df3f-45cb-8998-4903ab5f80c0",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "25659dd6-ea12-45c4-97e6-381e3e4b593e",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "a01bf75f-00b2-4568-a58f-565ff9bf202b",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "2aed01ad-3df3-4410-a8cb-11ea4ded587c",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "970a3432-3237-47ad-bcca-7d8cbb217736",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "7d0d0329-0ef1-4e84-a9f5-49500f9d7c6c",
+ "value": "Malicious PowerShell Commandlets - PoshModule"
+ },
{
"description": "Detects remote PowerShell sessions",
"meta": {
@@ -23259,7 +23334,7 @@
}
],
"uuid": "de41232e-12e8-49fa-86bc-c05c7e722df9",
- "value": "Suspicious PowerShell Download - PowerShell Module"
+ "value": "Suspicious PowerShell Download - PoshModule"
},
{
"description": "Detects Obfuscated Powershell via Stdin in Scripts",
@@ -23331,6 +23406,55 @@
"uuid": "a136cde0-61ad-4a61-9b82-8dc490e60dd2",
"value": "Invoke-Obfuscation CLIP+ Launcher - PowerShell Module"
},
+ {
+ "description": "Detects the execution of known offensive powershell scripts used for exploitation or reconnaissance",
+ "meta": {
+ "author": "frack113, Nasreddine Bencherchali",
+ "creation_date": "2023/01/20",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "posh_pm_exploit_scripts.yml",
+ "level": "high",
+ "logsource.category": "ps_module",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/PowerShellMafia/PowerSploit",
+ "https://github.com/AlsidOfficial/WSUSpendu/",
+ "https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://github.com/besimorhino/powercat",
+ "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
+ "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
+ "https://github.com/HarmJ0y/DAMP",
+ "https://github.com/S3cur3Th1sSh1t/WinPwn",
+ "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/nettitude/Invoke-PowerThIEf",
+ "https://github.com/samratashok/nishang",
+ "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/CsEnox/EventViewer-UACBypass",
+ "https://github.com/NetSPI/PowerUpSQL",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_exploit_scripts.yml"
+ ],
+ "tags": [
+ "attack.execution",
+ "attack.t1059.001"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "970a3432-3237-47ad-bcca-7d8cbb217736",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "41025fd7-0466-4650-a813-574aaacbe7f4",
+ "value": "Malicious PowerShell Scripts - PoshModule"
+ },
{
"description": "Detects suspicious PowerShell invocation command parameters",
"meta": {
@@ -23536,8 +23660,8 @@
"logsource.category": "ps_module",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_module/posh_pm_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -23906,8 +24030,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-pssession?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-10---powershell-invoke-downloadcradle",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-pssession?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_remote_session_creation.yml"
],
"tags": [
@@ -24030,9 +24154,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)",
"https://www.trendmicro.com/en_id/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt",
- "https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_msxml_com.yml"
],
"tags": [
@@ -24169,10 +24293,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon",
- "https://adsecurity.org/?p=2277",
"https://thedfirreport.com/2020/10/08/ryuks-return",
"https://powersploit.readthedocs.io/en/stable/Recon/README",
+ "https://adsecurity.org/?p=2277",
+ "https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_powerview_malicious_commandlets.yml"
],
"tags": [
@@ -24314,8 +24438,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/send-mailmessage?view=powershell-7.2",
"https://www.ietf.org/rfc/rfc2821.txt",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/send-mailmessage?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048.003/T1048.003.md#atomic-test-5---exfiltration-over-alternative-protocol---smtp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_send_mailmessage.yml"
],
@@ -24376,8 +24500,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
+ "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_using_set_service_to_hide_services.yml"
],
"tags": [
@@ -24525,11 +24649,11 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://www.tutorialspoint.com/how-to-get-windows-firewall-profile-settings-using-powershell",
"http://powershellhelp.space/commands/set-netfirewallrule-psv5.php",
"https://docs.microsoft.com/en-us/powershell/module/netsecurity/set-netfirewallprofile?view=windowsserver2019-ps",
"https://www.elastic.co/guide/en/security/current/windows-firewall-disabled-via-powershell.html",
"http://woshub.com/manage-windows-firewall-powershell/",
+ "https://www.tutorialspoint.com/how-to-get-windows-firewall-profile-settings-using-powershell",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_windows_firewall_profile_disabled.yml"
],
"tags": [
@@ -24652,8 +24776,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/src/Get-Keystrokes.ps1",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/src/Get-Keystrokes.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_keylogging.yml"
],
"tags": [
@@ -24710,10 +24834,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://youtu.be/5mqid-7zp8k?t=2481",
"https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/",
- "https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
+ "https://youtu.be/5mqid-7zp8k?t=2481",
+ "https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_mailboxexport_share.yml"
],
"tags": [
@@ -24982,9 +25106,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://adsecurity.org/?p=2604",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-7.1",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.1",
- "https://adsecurity.org/?p=2604",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_set_policies_to_unsecure_level.yml"
],
"tags": [
@@ -25041,8 +25165,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-3---remove-the-zoneidentifier-alternate-data-stream",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/unblock-file?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-3---remove-the-zoneidentifier-alternate-data-stream",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_unblock_file.yml"
],
"tags": [
@@ -25167,8 +25291,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/5b67c9b141fa3918017f8fa44f2f88f0b1ecb9e1/atomics/T1562.001/T1562.001.md",
"https://docs.microsoft.com/en-us/powershell/module/dism/disable-windowsoptionalfeature?view=windowsserver2022-ps",
+ "https://github.com/redcanaryco/atomic-red-team/blob/5b67c9b141fa3918017f8fa44f2f88f0b1ecb9e1/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_disable_windowsoptionalfeature.yml"
],
"tags": [
@@ -25509,8 +25633,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.006/T1021.006.md#atomic-test-2---invoke-command",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/invoke-command?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.006/T1021.006.md#atomic-test-2---invoke-command",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_invoke_command_remote.yml"
],
"tags": [
@@ -25543,8 +25667,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/NathanMcNulty/status/1569497348841287681",
"https://docs.microsoft.com/en-us/powershell/module/dnsclient/add-dnsclientnrptrule?view=windowsserver2022-ps",
+ "https://twitter.com/NathanMcNulty/status/1569497348841287681",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_add_dnsclient_rule.yml"
],
"tags": [
@@ -25688,6 +25812,33 @@
"uuid": "35f41cd7-c98e-469f-8a02-ec4ba0cc7a7e",
"value": "PowerShell Write-EventLog Usage"
},
+ {
+ "description": "Detects usage of the \"Import-Module\" cmdlet to load the \"Microsoft.ActiveDirectory.Management.dl\" DLL. Which is often used by attackers to perform AD enumeration.",
+ "meta": {
+ "author": "frack113, Nasreddine Bencherchali",
+ "creation_date": "2023/01/22",
+ "falsepositive": [
+ "Legitimate use of the library for administrative activity"
+ ],
+ "filename": "posh_ps_active_directory_module_dll_import.yml",
+ "level": "medium",
+ "logsource.category": "ps_script",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/samratashok/ADModule",
+ "https://twitter.com/cyb3rops/status/1617108657166061568?s=20",
+ "https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/active-directory-enumeration-with-ad-module-without-rsat-or-admin-privileges",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_active_directory_module_dll_import.yml"
+ ],
+ "tags": [
+ "attack.reconnaissance",
+ "attack.discovery",
+ "attack.impact"
+ ]
+ },
+ "uuid": "9e620995-f2d8-4630-8430-4afd89f77604",
+ "value": "Potential Active Directory Enumeration Using AD Module - PsScript"
+ },
{
"description": "Detects execution of ADRecon.ps1 for AD reconnaissance which has been reported to be actively used by FIN7",
"meta": {
@@ -25736,8 +25887,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
"https://docs.microsoft.com/en-us/powershell/module/grouppolicy/get-gpo?view=windowsserver2022-ps",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_get_gpo.yml"
],
"tags": [
@@ -25898,8 +26049,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/nettcpip/test-netconnection?view=windowsserver2022-ps",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1571/T1571.md#atomic-test-1---testing-usage-of-uncommonly-used-port-with-powershell",
+ "https://docs.microsoft.com/en-us/powershell/module/nettcpip/test-netconnection?view=windowsserver2022-ps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_test_netconnection.yml"
],
"tags": [
@@ -25955,9 +26106,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2022-ps",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://bidouillesecurity.com/disable-windows-defender-in-powershell/",
+ "https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2022-ps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_tamper_defender.yml"
],
"tags": [
@@ -26070,8 +26221,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://o365blog.com/aadinternals/",
"https://github.com/Gerenios/AADInternals",
+ "https://o365blog.com/aadinternals/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_aadinternals_cmdlets_execution.yml"
],
"tags": [
@@ -26168,8 +26319,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.002/T1021.002.md#atomic-test-2---map-admin-share-powershell",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/new-psdrive?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.002/T1021.002.md#atomic-test-2---map-admin-share-powershell",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_new_psdrive.yml"
],
"tags": [
@@ -26217,8 +26368,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.004/T1564.004.md",
"http://www.powertheshell.com/ntfsstreams/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.004/T1564.004.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_ntfs_ads_access.yml"
],
"tags": [
@@ -26285,8 +26436,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-6---wmi-invoke-cimmethod-scheduled-task",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-4---powershell-cmdlet-scheduled-task",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.005/T1053.005.md#atomic-test-6---wmi-invoke-cimmethod-scheduled-task",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cmdlet_scheduled_task.yml"
],
"tags": [
@@ -26420,8 +26571,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.011/T1574.011.md#atomic-test-1---service-registry-permissions-weakness",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.2",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.011/T1574.011.md#atomic-test-1---service-registry-permissions-weakness",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_get_acl_service.yml"
],
"tags": [
@@ -26536,9 +26687,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.001/T1070.001.md",
"https://twitter.com/oroneequalsone/status/1568432028361830402",
+ "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_clear_eventlog.yml"
],
"tags": [
@@ -26658,9 +26809,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1",
- "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
"https://github.com/nccgroup/redsnarf/blob/35949b30106ae543dc6f2bc3f1be10c6d9a8d40e/redsnarf.py",
+ "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
+ "https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_wmi_unquoted_service_search.yml"
],
"tags": [
@@ -26719,8 +26870,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/storage/mount-diskimage?view=windowsserver2022-ps",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.005/T1553.005.md#atomic-test-2---mount-an-iso-image-and-run-executable-from-the-iso",
+ "https://docs.microsoft.com/en-us/powershell/module/storage/mount-diskimage?view=windowsserver2022-ps",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_run_from_mount_diskimage.yml"
],
"tags": [
@@ -26928,8 +27079,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
+ "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_service_dacl_modification_set_service.yml"
],
"tags": [
@@ -26988,8 +27139,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/nas_bench/status/1537919885031772161",
"https://lolbas-project.github.io/lolbas/Binaries/Msdt/",
+ "https://twitter.com/nas_bench/status/1537919885031772161",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_follina_execution.yml"
],
"tags": [
@@ -27022,8 +27173,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/995111125447577600",
"https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
+ "https://twitter.com/pabraeken/status/995111125447577600",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_mutexverifiers_lolscript.yml"
],
"tags": [
@@ -27198,10 +27349,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/hlldz/Phant0m/blob/30c2935d8cf4aafda17ee2fab7cd0c4aa9a607c2/old/Invoke-Phant0m.ps1",
+ "https://posts.specterops.io/entering-a-covenant-net-command-and-control-e11038bcf462",
"https://gist.github.com/MHaggis/0dbe00ad401daa7137c81c99c268cfb7",
"https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/CodeExecution/Invoke-ReflectivePEInjection.ps1",
- "https://posts.specterops.io/entering-a-covenant-net-command-and-control-e11038bcf462",
+ "https://github.com/hlldz/Phant0m/blob/30c2935d8cf4aafda17ee2fab7cd0c4aa9a607c2/old/Invoke-Phant0m.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_keywords.yml"
],
"tags": [
@@ -27325,8 +27476,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1036.003/T1036.003.md",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1036.003/T1036.003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_start_process.yml"
],
"tags": [
@@ -27594,8 +27745,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://docs.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps",
+ "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://learn.microsoft.com/en-us/windows/win32/projfs/enabling-windows-projected-file-system",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_enable_windowsoptionalfeature.yml"
],
@@ -27619,10 +27770,10 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/dotnet/api/system.windows.input.keyboard.iskeydown?view=windowsdesktop-7.0",
- "https://twitter.com/ScumBots/status/1610626724257046529",
- "https://www.virustotal.com/gui/file/720a7ee9f2178c70501d7e3f4bcc28a4f456e200486dbd401b25af6da3b4da62/content",
"https://www.virustotal.com/gui/file/d4486b63512755316625230e0c9c81655093be93876e0d80732e7eeaf7d83476/content",
+ "https://www.virustotal.com/gui/file/720a7ee9f2178c70501d7e3f4bcc28a4f456e200486dbd401b25af6da3b4da62/content",
+ "https://twitter.com/ScumBots/status/1610626724257046529",
+ "https://learn.microsoft.com/en-us/dotnet/api/system.windows.input.keyboard.iskeydown?view=windowsdesktop-7.0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_keylogger_activity.yml"
],
"tags": [
@@ -27647,8 +27798,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-7",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1057/T1057.md#atomic-test-3---process-discovery---get-process",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-process?view=powershell-7",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_get_process.yml"
],
"tags": [
@@ -27801,20 +27952,21 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
- "https://adsecurity.org/?p=2921",
- "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
- "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
"https://github.com/calebstewart/CVE-2021-1675",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
- "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
- "https://github.com/DarkCoderSc/PowerRunAsSystem/",
- "https://github.com/samratashok/nishang",
+ "https://github.com/besimorhino/powercat",
+ "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
"https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
- "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://adsecurity.org/?p=2921",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/samratashok/nishang",
+ "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
+ "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_malicious_commandlets.yml"
],
"tags": [
@@ -27918,9 +28070,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://stefanos.cloud/blog/kb/how-to-clear-the-powershell-command-history/",
"https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics",
"https://www.shellhacks.com/clear-history-powershell/",
+ "https://stefanos.cloud/blog/kb/how-to-clear-the-powershell-command-history/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_clearing_windows_console_history.yml"
],
"tags": [
@@ -28061,9 +28213,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=41",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
- "https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_x509enrollment.yml"
],
"tags": "No established tags"
@@ -28225,8 +28377,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/Arno0x/DNSExfiltrator",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1048/T1048.md#atomic-test-3---dnsexfiltration-doh",
+ "https://github.com/Arno0x/DNSExfiltrator",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_invoke_dnsexfiltration.yml"
],
"tags": [
@@ -28319,8 +28471,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/data/module_source/persistence/Persistence.psm1#L545",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.003/T1546.003.md",
+ "https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/data/module_source/persistence/Persistence.psm1#L545",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_wmi_persistence.yml"
],
"tags": [
@@ -28353,9 +28505,9 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7.2",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1020/T1020.md",
"https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html",
+ "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7.2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_upload.yml"
],
"tags": [
@@ -28479,8 +28631,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
+ "https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_susp_win32_shadowcopy_deletion.yml"
],
"tags": [
@@ -28673,8 +28825,8 @@
"logsource.category": "ps_script",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/995111125447577600",
"https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/",
+ "https://twitter.com/pabraeken/status/995111125447577600",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/powershell/powershell_script/posh_ps_cl_mutexverifiers_lolscript_count.yml"
],
"tags": [
@@ -28950,9 +29102,9 @@
"logsource.category": "create_remote_thread",
"logsource.product": "windows",
"refs": [
+ "https://github.com/GhostPack/KeeThief",
"https://www.cisa.gov/uscert/ncas/alerts/aa20-259a",
"https://github.com/denandz/KeeFarce",
- "https://github.com/GhostPack/KeeThief",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/create_remote_thread/create_remote_thread_win_password_dumper_keepass.yml"
],
"tags": [
@@ -29288,10 +29440,10 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/malmoeb/status/1551449425842786306",
+ "https://github.com/fengjixuchui/gdrv-loader",
"https://www.virustotal.com/gui/file/cfc5c585dd4e592dd1a08887ded28b92d9a5820587b6f4f8fa4f56d60289259b/details",
"https://medium.com/@fsx30/weaponizing-vulnerable-driver-for-privilege-escalation-gigabyte-edition-e73ee523598b",
- "https://github.com/fengjixuchui/gdrv-loader",
- "https://twitter.com/malmoeb/status/1551449425842786306",
"https://www.virustotal.com/gui/file/31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427/details",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_gigabyte_driver.yml"
],
@@ -29341,18 +29493,18 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
- "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37969",
- "https://github.com/CaledoniaProject/drivers-binaries",
- "https://eclypsium.com/2019/11/12/mother-of-all-drivers/",
- "https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/",
- "https://github.com/stong/CVE-2020-15368",
- "https://github.com/Chigusa0w0/AsusDriversPrivEscala",
- "https://github.com/namazso/physmem_drivers",
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
"https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
"https://github.com/jbaines-r7/dellicious",
+ "https://github.com/stong/CVE-2020-15368",
+ "https://github.com/CaledoniaProject/drivers-binaries",
+ "https://eclypsium.com/2019/11/12/mother-of-all-drivers/",
+ "https://github.com/Chigusa0w0/AsusDriversPrivEscala",
+ "https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/",
+ "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37969",
+ "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
+ "https://github.com/namazso/physmem_drivers",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_drivers_names.yml"
],
"tags": [
@@ -29419,8 +29571,8 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
"https://github.com/xmrig/xmrig/tree/master/bin/WinRing0",
+ "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_winring0_driver.yml"
],
"tags": [
@@ -29444,8 +29596,8 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://reqrypt.org/windivert-doc.html",
"https://rastamouse.me/ntlm-relaying-via-cobalt-strike/",
+ "https://reqrypt.org/windivert-doc.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_windivert.yml"
],
"tags": [
@@ -29488,21 +29640,21 @@
"logsource.product": "windows",
"refs": [
"https://www.unknowncheats.me/forum/downloads.php?do=file&id=25444",
- "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
- "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/ATSZIO.md",
- "https://github.com/CaledoniaProject/drivers-binaries",
- "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/DRIVER7.md",
- "https://www.unknowncheats.me/forum/anti-cheat-bypass/334557-vulnerable-driver-megathread.html",
- "https://www.unknowncheats.me/forum/downloads.php?do=file&id=21780",
- "https://github.com/stong/CVE-2020-15368",
- "https://www.rapid7.com/db/modules/exploit/windows/local/razer_zwopenprocess/",
- "https://github.com/tandasat/ExploitCapcom",
- "https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part",
- "https://github.com/namazso/physmem_drivers",
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
"https://github.com/eclypsium/Screwed-Drivers/blob/master/DRIVERS.md",
"https://github.com/jbaines-r7/dellicious",
+ "https://github.com/stong/CVE-2020-15368",
+ "https://github.com/CaledoniaProject/drivers-binaries",
+ "https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part",
+ "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/ATSZIO.md",
+ "https://www.rapid7.com/db/modules/exploit/windows/local/razer_zwopenprocess/",
+ "https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules",
+ "https://www.unknowncheats.me/forum/anti-cheat-bypass/334557-vulnerable-driver-megathread.html",
+ "https://github.com/namazso/physmem_drivers",
+ "https://github.com/Chigusa0w0/AsusDriversPrivEscala/blob/master/DRIVER7.md",
+ "https://www.unknowncheats.me/forum/downloads.php?do=file&id=21780",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/blob/public/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md",
+ "https://github.com/tandasat/ExploitCapcom",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_vuln_drivers.yml"
],
"tags": [
@@ -29653,9 +29805,9 @@
"logsource.category": "driver_load",
"logsource.product": "windows",
"refs": [
- "https://systeminformer.sourceforge.io/",
- "https://github.com/winsiderss/systeminformer",
"https://processhacker.sourceforge.io/",
+ "https://github.com/winsiderss/systeminformer",
+ "https://systeminformer.sourceforge.io/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/driver_load/driver_load_win_process_hacker.yml"
],
"tags": [
@@ -29785,8 +29937,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/M_haggis/status/1032799638213066752",
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1",
"https://twitter.com/M_haggis/status/900741347035889665",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_binary_github_com.yml"
],
"tags": [
@@ -29880,9 +30032,9 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
+ "https://blog.bushidotoken.net/2021/04/dead-drop-resolvers-espionage-inspired.html",
"https://content.fireeye.com/apt-41/rpt-apt41",
"https://securelist.com/the-tetrade-brazilian-banking-malware/97779/",
- "https://blog.bushidotoken.net/2021/04/dead-drop-resolvers-espionage-inspired.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_dead_drop_resolvers.yml"
],
"tags": [
@@ -29979,8 +30131,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/1cf4dd51f83dcb0ebe6ade902d6157ad2dbc6ac8/atomics/T1218.001/T1218.001.md",
"https://www.splunk.com/en_us/blog/security/follina-for-protocol-handlers.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/1cf4dd51f83dcb0ebe6ade902d6157ad2dbc6ac8/atomics/T1218.001/T1218.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_hh.yml"
],
"tags": [
@@ -30106,8 +30258,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/",
"https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/",
+ "https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_regsvr32_network_activity.yml"
],
"tags": [
@@ -30366,10 +30518,10 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://twitter.com/M_haggis/status/1032799638213066752",
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
+ "https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
"https://twitter.com/M_haggis/status/900741347035889665",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_binary_susp_com.yml"
],
"tags": [
@@ -30402,8 +30554,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://ngrok.com/docs/secure-tunnels/tunnels/ssh-reverse-tunnel-agent",
"https://twitter.com/hakluke/status/1587733971814977537/photo/1",
+ "https://ngrok.com/docs/secure-tunnels/tunnels/ssh-reverse-tunnel-agent",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_ngrok_tunnel.yml"
],
"tags": [
@@ -30687,8 +30839,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://ngrok.com/",
"https://www.virustotal.com/gui/file/cca0c1182ac114b44dc52dd2058fcd38611c20bb6b5ad84710681d38212f835a/",
+ "https://ngrok.com/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_ngrok_io.yml"
],
"tags": [
@@ -30721,8 +30873,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/IMEWDBLD/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-10---windows---powershell-download",
+ "https://lolbas-project.github.io/lolbas/Binaries/IMEWDBLD/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_imewdbld.yml"
],
"tags": [
@@ -30755,8 +30907,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
"https://redcanary.com/blog/child-processes/",
+ "https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_dllhost_net_connections.yml"
],
"tags": [
@@ -30831,8 +30983,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/forensicitguy/status/1513538712986079238",
"https://news.sophos.com/en-us/2019/07/18/a-new-equation-editor-exploit-goes-commercial-as-maldoc-attacks-using-it-spike/",
+ "https://twitter.com/forensicitguy/status/1513538712986079238",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_eqnedt.yml"
],
"tags": [
@@ -30887,8 +31039,8 @@
"logsource.category": "network_connection",
"logsource.product": "windows",
"refs": [
- "https://megatools.megous.com/",
"https://www.mandiant.com/resources/russian-targeting-gov-business",
+ "https://megatools.megous.com/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/network_connection/net_connection_win_mega_nz.yml"
],
"tags": [
@@ -30988,8 +31140,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://adsecurity.org/?p=2398",
"https://stealthbits.com/blog/extracting-password-hashes-from-the-ntds-dit-file/",
+ "https://adsecurity.org/?p=2398",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_ntds_dit.yml"
],
"tags": [
@@ -31056,10 +31208,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
+ "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
"https://twitter.com/luc4m/status/1073181154126254080",
"https://twitter.com/malwrhunterteam/status/1235135745611960321",
- "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
- "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_lnk_double_extension.yml"
],
@@ -31262,11 +31414,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.whiteoaksecurity.com/blog/attacks-defenses-dumping-lsass-no-mimikatz/",
"https://medium.com/@markmotig/some-ways-to-dump-lsass-exe-c4a75fdc49bf",
- "https://github.com/helpsystems/nanodump",
- "https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml",
"https://www.google.com/search?q=procdump+lsass",
+ "https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/windows/credential_access_lsass_memdump_file_created.toml",
+ "https://www.whiteoaksecurity.com/blog/attacks-defenses-dumping-lsass-no-mimikatz/",
+ "https://github.com/helpsystems/nanodump",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_lsass_dump.yml"
],
"tags": [
@@ -31367,8 +31519,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_tool_psexec.yml"
],
"tags": [
@@ -31426,10 +31578,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
+ "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
"https://twitter.com/luc4m/status/1073181154126254080",
"https://twitter.com/malwrhunterteam/status/1235135745611960321",
- "https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles",
- "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_double_extension.yml"
],
@@ -31645,9 +31797,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/4ae9580a1a8772db87a1b6cdb0d03e5af231e966/atomics/T1137.006/T1137.006.md",
"https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence",
"Internal Research",
- "https://github.com/redcanaryco/atomic-red-team/blob/4ae9580a1a8772db87a1b6cdb0d03e5af231e966/atomics/T1137.006/T1137.006.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_office_persistence.yml"
],
"tags": [
@@ -31730,8 +31882,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae",
"https://app.any.run/tasks/76c69e2d-01e8-49d9-9aea-fb7cc0c4d3ad/",
+ "https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_executable_creation.yml"
],
"tags": [
@@ -31764,9 +31916,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://github.com/afwu/PrintNightmare",
"https://github.com/hhlxf/PrintNightmare",
"https://github.com/cube0x0/CVE-2021-1675",
- "https://github.com/afwu/PrintNightmare",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_1675_printspooler.yml"
],
"tags": [
@@ -31861,8 +32013,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/",
"https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/",
+ "https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_31979_cve_2021_33771_exploits.yml"
],
"tags": [
@@ -31898,8 +32050,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
"https://persistence-info.github.io/Data/wpbbin.html",
+ "https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_wpbbin_persistence.yml"
],
"tags": [
@@ -32117,8 +32269,8 @@
"logsource.product": "windows",
"refs": [
"https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/",
- "https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Control.cs",
"https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Output.cs",
+ "https://github.com/Kevin-Robertson/Inveigh/blob/29d9e3c3a625b3033cdaf4683efaafadcecb9007/Inveigh/Support/Control.cs",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_inveigh_artefacts.yml"
],
"tags": [
@@ -32243,11 +32395,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
+ "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
"https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
"https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer",
- "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
"https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf",
- "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_advanced_ip_scanner.yml"
],
"tags": [
@@ -32271,8 +32423,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/last-byte/PersistenceSniper",
"https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/",
+ "https://github.com/last-byte/PersistenceSniper",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_error_handler_cmd_persistence.yml"
],
"tags": [
@@ -32329,20 +32481,21 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/AlsidOfficial/WSUSpendu/",
- "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
- "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
- "https://github.com/nettitude/Invoke-PowerThIEf",
"https://github.com/PowerShellMafia/PowerSploit",
- "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
- "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
- "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/AlsidOfficial/WSUSpendu/",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
+ "https://github.com/besimorhino/powercat",
+ "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
+ "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/S3cur3Th1sSh1t/WinPwn",
+ "https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
"https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/nettitude/Invoke-PowerThIEf",
"https://github.com/samratashok/nishang",
+ "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
"https://github.com/CsEnox/EventViewer-UACBypass",
"https://github.com/NetSPI/PowerUpSQL",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_powershell_exploit_scripts.yml"
@@ -32362,7 +32515,7 @@
}
],
"uuid": "f331aa1f-8c53-4fc3-b083-cc159bc971cb",
- "value": "Malicious PowerShell Commandlets - FileCreation"
+ "value": "Malicious PowerShell Scripts - FileCreation"
},
{
"description": "Detects suspicious file type dropped by an Exchange component in IIS",
@@ -32377,9 +32530,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
"https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
"https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
+ "https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_exchange_webshell_drop_suspicious.yml"
],
"tags": [
@@ -32449,8 +32602,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/tifkin_/status/1321916444557365248",
"https://twitter.com/rbmaslen/status/1321859647091970051",
+ "https://twitter.com/tifkin_/status/1321916444557365248",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_pcre_net_temp_file.yml"
],
"tags": [
@@ -32674,8 +32827,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/horizon3ai/CVE-2021-44077/blob/b7a48e25824e8ead95e028475c7fd0e107e6e6bf/exploit.py",
"https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/",
+ "https://github.com/horizon3ai/CVE-2021-44077/blob/b7a48e25824e8ead95e028475c7fd0e107e6e6bf/exploit.py",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_44077_poc_default_files.yml"
],
"tags": [
@@ -32838,8 +32991,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/14",
"https://threathunterplaybook.com/evals/apt29/detections/6.B.1_6392C9F1-D975-4F75-8A70-433DEDD7F622.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/14",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_pfx_file_creation.yml"
],
"tags": [
@@ -32873,8 +33026,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
"https://github.com/klinix5/InstallerFileTakeOver",
+ "https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_cve_2021_41379_msi_lpe.yml"
],
"tags": [
@@ -32931,10 +33084,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
- "https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/",
"https://github.com/olafhartong/sysmon-modular/blob/fa1ae53132403d262be2bbd7f17ceea7e15e8c78/11_file_create/include_dotnet.xml",
+ "https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html",
"https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008",
+ "https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_net_cli_artefact.yml"
],
"tags": [
@@ -32967,9 +33120,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/splinter_code/status/1519075134296006662?s=12&t=DLUXH86WtcmG_AZ5gY3C6g",
"https://lolbas-project.github.io/lolbas/Binaries/Eventvwr/#execute",
"https://twitter.com/orange_8361/status/1518970259868626944?s=20&t=RFXqZjtA7tWM3HxqEH78Aw",
+ "https://twitter.com/splinter_code/status/1519075134296006662?s=12&t=DLUXH86WtcmG_AZ5gY3C6g",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_uac_bypass_eventvwr.yml"
],
"tags": [
@@ -32993,9 +33146,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
"https://en.gteltsc.vn/blog/cap-nhat-nhe-ve-lo-hong-bao-mat-0day-microsoft-exchange-dang-duoc-su-dung-de-tan-cong-cac-to-chuc-tai-viet-nam-9685.html",
"https://www.gteltsc.vn/blog/canh-bao-chien-dich-tan-cong-su-dung-lo-hong-zero-day-tren-microsoft-exchange-server-12714.html",
+ "https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_exchange_webshell_drop.yml"
],
"tags": [
@@ -33226,8 +33379,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1566.001/T1566.001.md",
"https://docs.microsoft.com/en-us/deployoffice/compat/office-file-format-reference",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1566.001/T1566.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_macro_file.yml"
],
"tags": [
@@ -33285,8 +33438,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1547.001/T1547.001.md#atomic-test-7---add-executable-shortcut-link-to-user-startup-folder",
"https://redcanary.com/blog/intelligence-insights-october-2021/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1547.001/T1547.001.md#atomic-test-7---add-executable-shortcut-link-to-user-startup-folder",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_powershell_startup_shortcuts.yml"
],
"tags": [
@@ -33436,9 +33589,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/tag/ntds-dit/",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1",
"https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
+ "https://pentestlab.blog/tag/ntds-dit/",
"https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_ntds_dit.yml"
],
@@ -33472,9 +33625,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/data/post/powershell/NTDSgrab.ps1",
"https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/modules/post/windows/gather/ntds_grabber.rb",
"https://github.com/SecureAuthCorp/impacket/blob/7d2991d78836b376452ca58b3d14daa61b67cb40/impacket/examples/secretsdump.py#L2405",
+ "https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/data/post/powershell/NTDSgrab.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_ntds_exfil_tools.yml"
],
"tags": [
@@ -33507,8 +33660,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/GhostPack/SafetyKatz",
"https://github.com/GhostPack/SafetyKatz/blob/715b311f76eb3a4c8d00a1bd29c6cd1899e450b7/SafetyKatz/Program.cs#L63",
+ "https://github.com/GhostPack/SafetyKatz",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_ghostpack_safetykatz.yml"
],
"tags": [
@@ -33541,8 +33694,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/RonnyTNL/status/1436334640617373699?s=20",
"https://twitter.com/vanitasnk/status/1437329511142420483?s=21",
+ "https://twitter.com/RonnyTNL/status/1436334640617373699?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_winword_cve_2021_40444.yml"
],
"tags": [
@@ -33700,10 +33853,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/cube0x0/CVE-2021-36934",
- "https://www.google.com/search?q=%22reg.exe+save%22+sam",
"https://github.com/FireFart/hivenightmare",
"https://github.com/search?q=CVE-2021-36934",
+ "https://github.com/cube0x0/CVE-2021-36934",
+ "https://www.google.com/search?q=%22reg.exe+save%22+sam",
"https://github.com/HuskyHacks/ShadowSteal",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_sam_dump.yml"
],
@@ -33854,10 +34007,10 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/GossiTheDog/HiveNightmare",
- "https://github.com/FireFart/hivenightmare/",
"https://twitter.com/cube0x0/status/1418920190759378944",
"https://github.com/WiredPulse/Invoke-HiveNightmare",
+ "https://github.com/GossiTheDog/HiveNightmare",
+ "https://github.com/FireFart/hivenightmare/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_hivenightmare_file_exports.yml"
],
"tags": [
@@ -33949,9 +34102,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/",
- "https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/",
"https://redcanary.com/blog/intelligence-insights-october-2021/",
+ "https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/",
+ "https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_mal_vhd_download.yml"
],
"tags": [
@@ -34051,8 +34204,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-5d46dd4ac6866b4337ec126be8cee0e115467b3e8703794ba6f6df6432c806bc",
"https://posts.specterops.io/automating-dll-hijack-discovery-81c4295904b0",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-5d46dd4ac6866b4337ec126be8cee0e115467b3e8703794ba6f6df6432c806bc",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_initial_access_dll_search_order_hijacking.yml"
],
"tags": [
@@ -34234,9 +34387,9 @@
"logsource.product": "windows",
"refs": [
"https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore",
- "https://insights.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/",
- "https://blog.emsisoft.com/en/32373/beware-new-wave-of-malware-spreads-via-iso-file-email-attachments/",
"https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/",
+ "https://blog.emsisoft.com/en/32373/beware-new-wave-of-malware-spreads-via-iso-file-email-attachments/",
+ "https://insights.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_iso_file_recent.yml"
],
"tags": "No established tags"
@@ -34411,8 +34564,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://securityaffairs.co/wordpress/133680/malware/dll-sideloading-spread-qakbot.html",
"https://twitter.com/Sam0x90/status/1552011547974696960",
+ "https://securityaffairs.co/wordpress/133680/malware/dll-sideloading-spread-qakbot.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_iso_file_mount.yml"
],
"tags": [
@@ -34423,6 +34576,53 @@
"uuid": "2f9356ae-bf43-41b8-b858-4496d83b2acb",
"value": "ISO File Created Within Temp Folders"
},
+ {
+ "description": "Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed and gets written to the file system and will be recorded in the USN Journal on the target system",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/21",
+ "falsepositive": [
+ "Unlikely"
+ ],
+ "filename": "file_event_win_psexec_service_key.yml",
+ "level": "high",
+ "logsource.category": "file_event",
+ "logsource.product": "windows",
+ "refs": [
+ "https://aboutdfir.com/the-key-to-identify-psexec/",
+ "https://twitter.com/davisrichardg/status/1616518800584704028",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_psexec_service_key.yml"
+ ],
+ "tags": [
+ "attack.lateral_movement",
+ "attack.privilege_escalation",
+ "attack.execution",
+ "attack.persistence",
+ "attack.t1136.002",
+ "attack.t1543.003",
+ "attack.t1570",
+ "attack.s0029"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "7610cada-1499-41a4-b3dd-46467b68d177",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "bf90d72c-c00b-45e3-b3aa-68560560d4c5",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "304afd73-55a5-4bb9-8c21-0b1fc84ea9e4",
+ "value": "Potential PSEXEC Remote Execution - FileCreation"
+ },
{
"description": "Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)",
"meta": {
@@ -34517,8 +34717,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://blog.malwarebytes.com/threat-intelligence/2022/04/colibri-loader-combines-task-scheduler-and-powershell-in-clever-persistence-technique/",
"https://www.joesandbox.com/analysis/465533/0/html",
+ "https://blog.malwarebytes.com/threat-intelligence/2022/04/colibri-loader-combines-task-scheduler-and-powershell-in-clever-persistence-technique/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_get_variable.yml"
],
"tags": [
@@ -34586,8 +34786,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/",
+ "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_access_susp_teams.yml"
],
"tags": [
@@ -34752,11 +34952,11 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
"https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
- "https://decoded.avast.io/martinchlumecky/png-steganography/",
- "https://github.com/Wh04m1001/SysmonEoP",
"https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992",
+ "https://decoded.avast.io/martinchlumecky/png-steganography/",
+ "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/",
+ "https://github.com/Wh04m1001/SysmonEoP",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_create_non_existent_dlls.yml"
],
"tags": [
@@ -34851,9 +35051,9 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
+ "http://addbalance.com/word/startup.htm",
"https://answers.microsoft.com/en-us/msoffice/forum/all/document-in-word-startup-folder-doesnt-open-when/44ab0932-2917-4150-8cdc-2f2cf39e86f3",
"Malware Sandbox https://app.any.run/tasks/d6fe6624-6ef8-485d-aa75-3d1bdda2a08c/",
- "http://addbalance.com/word/startup.htm",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_susp_winword_startup.yml"
],
"tags": [
@@ -34944,8 +35144,8 @@
"logsource.category": "file_event",
"logsource.product": "windows",
"refs": [
- "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows",
"https://twitter.com/cyb3rops/status/1552932770464292864",
+ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_event/file_event_win_dll_sideloading_space_path.yml"
],
"tags": [
@@ -34996,8 +35196,8 @@
"logsource.category": "file_rename",
"logsource.product": "windows",
"refs": [
- "https://blog.cyble.com/2022/08/10/onyx-ransomware-renames-its-leak-site-to-vsop/",
"https://app.any.run/tasks/d66ead5a-faf4-4437-93aa-65785afaf9e5/",
+ "https://blog.cyble.com/2022/08/10/onyx-ransomware-renames-its-leak-site-to-vsop/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_rename/file_rename_win_ransomware.yml"
],
"tags": [
@@ -35110,8 +35310,8 @@
"logsource.category": "file_delete",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/9",
"https://threathunterplaybook.com/evals/apt29/detections/4.B.4_83D62033-105A-4A02-8B75-DAB52D8D51EC.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/9",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_delete/file_delete_win_sysinternals_sdelete_file_deletion.yml"
],
"tags": [
@@ -35294,8 +35494,8 @@
"logsource.category": "file_access",
"logsource.product": "windows",
"refs": [
- "https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz",
"https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
+ "https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_access/file_access_win_credential_manager_stealing.yml"
],
"tags": [
@@ -35365,8 +35565,8 @@
"logsource.category": "file_access",
"logsource.product": "windows",
"refs": [
- "https://github.com/lclevy/firepwd",
"https://www.zscaler.com/blogs/security-research/ffdroider-stealer-targeting-social-media-platform-users",
+ "https://github.com/lclevy/firepwd",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/file/file_access/file_access_win_browser_credential_stealing.yml"
],
"tags": [
@@ -35490,8 +35690,8 @@
"logsource.category": "dns_query",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/notwhickey/status/1333900137232523264",
"https://lolbas-project.github.io/lolbas/Binaries/AppInstaller/",
+ "https://twitter.com/notwhickey/status/1333900137232523264",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_lolbin_appinstaller.yml"
],
"tags": [
@@ -35590,10 +35790,10 @@
"logsource.category": "dns_query",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-3---logmein-files-detected-test-on-windows",
"https://redcanary.com/blog/misbehaving-rats/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-6---ammyy-admin-software-execution",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-4---gotoassist-files-detected-test-on-windows",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-3---logmein-files-detected-test-on-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_remote_access_software_domains.yml"
],
"tags": [
@@ -35626,8 +35826,8 @@
"logsource.category": "dns_query",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/",
"https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/",
+ "https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/dns_query/dns_query_win_regsvr32_network_activity.yml"
],
"tags": [
@@ -36092,8 +36292,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://nsudo.m2team.org/en-us/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_whoami_as_priv_user.yml"
],
"tags": [
@@ -36226,8 +36426,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_athremotefxvgpudisablementcommand.yml"
],
"tags": [
@@ -36322,12 +36522,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/885258886428725250",
- "https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52",
- "https://twitter.com/eral4m/status/1479106975967240209",
"http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/",
- "https://twitter.com/nas_bench/status/1433344116071583746",
"https://twitter.com/eral4m/status/1479080793003671557",
+ "https://twitter.com/eral4m/status/1479106975967240209",
+ "https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52",
+ "https://twitter.com/nas_bench/status/1433344116071583746",
+ "https://twitter.com/Hexacorn/status/885258886428725250",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_activity.yml"
],
"tags": [
@@ -36460,9 +36660,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://securelist.com/my-name-is-dtrack/93338/",
"https://app.any.run/tasks/ce4deab5-3263-494f-93e3-afb2b9d79f14/",
"https://app.any.run/tasks/4bc9860d-ab51-4077-9e09-59ad346b92fd/",
+ "https://securelist.com/my-name-is-dtrack/93338/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_dtrack.yml"
],
"tags": [
@@ -36603,8 +36803,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/",
"https://lolbas-project.github.io/lolbas/Scripts/CL_LoadAssembly/",
+ "https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_cl_loadassembly.yml"
],
"tags": [
@@ -36681,8 +36881,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731620(v=ws.11)",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731620(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ntdsutil_usage.yml"
],
"tags": [
@@ -37137,9 +37337,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "Reegun J (OCBC Bank)",
"https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/",
- "Reegun J (OCBC Bank)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_msoffice.yml"
],
"tags": [
@@ -37205,9 +37405,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows",
- "https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e",
"https://github.com/netero1010/TrustedPath-UACBypass-BOF",
+ "https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e",
+ "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_uac_bypass_trustedpath.yml"
],
"tags": [
@@ -37240,8 +37440,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wfc/",
+ "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_wfc.yml"
],
"tags": [
@@ -37274,10 +37474,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_ip.yml"
],
"tags": [
@@ -37320,8 +37520,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1464566846594691073?s=20",
"https://www.matteomalvica.com/blog/2019/12/02/win-defender-atp-cred-bypass/",
+ "https://twitter.com/SBousseaden/status/1464566846594691073?s=20",
"https://twitter.com/Hexacorn/status/1420053502554951689",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_lsass_clone.yml"
],
@@ -37364,8 +37564,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/electron/rcedit",
- "https://www.virustotal.com/gui/file/02e8e8c5d430d8b768980f517b62d7792d690982b9ba0f7e04163cbc1a6e7915",
"https://security.stackexchange.com/questions/210843/is-it-possible-to-change-original-filename-of-an-exe",
+ "https://www.virustotal.com/gui/file/02e8e8c5d430d8b768980f517b62d7792d690982b9ba0f7e04163cbc1a6e7915",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rcedit_execution.yml"
],
"tags": [
@@ -37444,8 +37644,8 @@
"logsource.product": "windows",
"refs": [
"https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/",
- "https://redcanary.com/blog/raspberry-robin/",
"https://github.com/SigmaHQ/sigma/issues/1009",
+ "https://redcanary.com/blog/raspberry-robin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_shellexec_rundll_usage.yml"
],
"tags": [
@@ -37525,10 +37725,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://book.hacktricks.xyz/windows/basic-cmd-for-pentesters",
- "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)",
"https://thedfirreport.com/2021/08/16/trickbot-leads-up-to-fake-1password-installation/",
+ "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
+ "https://book.hacktricks.xyz/windows/basic-cmd-for-pentesters",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_nltest_recon.yml"
],
"tags": [
@@ -37758,8 +37958,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html",
"https://www.hybrid-analysis.com/sample/465aabe132ccb949e75b8ab9c5bda36d80cf2fd503d52b8bad54e295f28bbc21?environmentId=100",
+ "https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_shell.yml"
],
"tags": [
@@ -37833,8 +38033,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.mandiant.com/resources/blog/sharpersist-windows-persistence-toolkit",
"https://github.com/mandiant/SharPersist",
+ "https://www.mandiant.com/resources/blog/sharpersist-windows-persistence-toolkit",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_sharpersist.yml"
],
"tags": [
@@ -37884,8 +38084,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/BloodHoundAD/SharpHound",
"https://github.com/BloodHoundAD/BloodHound",
+ "https://github.com/BloodHoundAD/SharpHound",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_bloodhound.yml"
],
"tags": [
@@ -37952,8 +38152,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf",
"https://twitter.com/johnlatwc/status/1408062131321270282?s=12",
+ "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_eventconsumer_create.yml"
],
"tags": [
@@ -38191,8 +38391,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Oddvarmoe/status/1270633613449723905",
"https://hackingiscool.pl/cmdhijack-command-argument-confusion-with-path-traversal-in-cmd-exe/",
+ "https://twitter.com/Oddvarmoe/status/1270633613449723905",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_commandline_path_traversal.yml"
],
"tags": [
@@ -38375,10 +38575,10 @@
"logsource.product": "windows",
"refs": [
"https://www.cisa.gov/uscert/ncas/alerts/aa22-321a",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
- "https://isc.sans.edu/diary/22264",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
+ "https://isc.sans.edu/diary/22264",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_domain.yml"
],
"tags": [
@@ -38421,9 +38621,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/nas_bench/status/1534916659676422152",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Adplus/",
"https://twitter.com/nas_bench/status/1534915321856917506",
+ "https://twitter.com/nas_bench/status/1534916659676422152",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_adplus.yml"
],
"tags": [
@@ -38721,8 +38921,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html",
"https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign/",
+ "https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_webshell_detection.yml"
],
"tags": [
@@ -38817,8 +39017,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md#atomic-test-1---take-ownership-using-takeown-utility",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/takeown",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md#atomic-test-1---take-ownership-using-takeown-utility",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_takeown.yml"
],
"tags": [
@@ -39032,9 +39232,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.echotrail.io/insights/search/wermgr.exe",
- "https://www.trendmicro.com/en_us/research/22/j/black-basta-infiltrates-networks-via-qakbot-brute-ratel-and-coba.html",
"https://github.com/binderlabs/DirCreate2System",
+ "https://www.trendmicro.com/en_us/research/22/j/black-basta-infiltrates-networks-via-qakbot-brute-ratel-and-coba.html",
+ "https://www.echotrail.io/insights/search/wermgr.exe",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wermgr.yml"
],
"tags": "No established tags"
@@ -39123,10 +39323,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/raspberry-robin/",
"https://twitter.com/Hexacorn/status/1187143326673330176",
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-94a1964b682707e4e3f77dd61a3bfface5401d08d8cf81145f388e09614aceca",
+ "https://redcanary.com/blog/raspberry-robin/",
"https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-94a1964b682707e4e3f77dd61a3bfface5401d08d8cf81145f388e09614aceca",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_odbcconf.yml"
],
"tags": [
@@ -39193,8 +39393,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)",
"https://ss64.com/nt/dsacls.html",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dsacls_abuse_permissions.yml"
],
"tags": [
@@ -39261,10 +39461,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult",
"https://unit42.paloaltonetworks.com/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
"https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1615/T1615.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_gpresult.yml"
],
"tags": [
@@ -39324,8 +39524,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://strontic.github.io/xcyclopedia/library/stordiag.exe-1F08FC87C373673944F6A7E8B18CD845.html",
"https://twitter.com/eral4m/status/1451112385041911809",
+ "https://strontic.github.io/xcyclopedia/library/stordiag.exe-1F08FC87C373673944F6A7E8B18CD845.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_stordiag_execution.yml"
],
"tags": [
@@ -39358,11 +39558,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/wmiexec.py",
"https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/smbexec.py",
"https://www.elastic.co/guide/en/security/current/suspicious-cmd-execution-via-wmi.html",
- "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/dcomexec.py",
"https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/atexec.py",
- "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/wmiexec.py",
+ "https://github.com/SecureAuthCorp/impacket/blob/8b1a99f7c715702eafe3f24851817bb64721b156/examples/dcomexec.py",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_impacket_lateralization.yml"
],
"tags": [
@@ -39526,9 +39726,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti_shadowcopy.yml"
],
"tags": [
@@ -39696,8 +39896,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Runexehelper/",
"https://twitter.com/0gtweet/status/1206692239839289344",
+ "https://lolbas-project.github.io/lolbas/Binaries/Runexehelper/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_runexehelper.yml"
],
"tags": [
@@ -39789,9 +39989,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/ClearskySec/status/960924755355369472",
"https://www.reverse.it/sample/e3399d4802f9e6d6d539e3ae57e7ea9a54610a7c4155a6541df8e94d67af086e?environmentId=100",
"https://researchcenter.paloaltonetworks.com/2018/02/unit42-sofacy-attacks-multiple-government-entities/",
+ "https://twitter.com/ClearskySec/status/960924755355369472",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_sofacy.yml"
],
"tags": [
@@ -39859,8 +40059,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md#atomic-test-26---disable-windows-defender-with-dism",
"https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md#atomic-test-26---disable-windows-defender-with-dism",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dsim_remove.yml"
],
"tags": [
@@ -39884,8 +40084,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/",
"https://www.vmray.com/analyses/5ad401c3a568/report/overview.html",
+ "https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_muddywater_dnstunnel.yml"
],
"tags": [
@@ -39951,8 +40151,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://ss64.com/vb/cscript.html",
"https://twitter.com/sblmsrsn/status/1456613494783160325?s=20",
+ "https://ss64.com/vb/cscript.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_registration_via_cscript.yml"
],
"tags": [
@@ -39985,8 +40185,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/Azure/Azure-Sentinel/blob/7e6aa438e254d468feec061618a7877aa528ee9f/Hunting%20Queries/Microsoft%20365%20Defender/Ransomware/DEV-0270/Email%20data%20exfiltration%20via%20PowerShell.yaml",
"https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/",
+ "https://github.com/Azure/Azure-Sentinel/blob/7e6aa438e254d468feec061618a7877aa528ee9f/Hunting%20Queries/Microsoft%20365%20Defender/Ransomware/DEV-0270/Email%20data%20exfiltration%20via%20PowerShell.yaml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_email_exfil_via_powershell.yml"
],
"tags": [
@@ -40033,8 +40233,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-3---port-scan-nmap-for-windows",
"https://nmap.org/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-3---port-scan-nmap-for-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_nmap_zenmap.yml"
],
"tags": [
@@ -40058,8 +40258,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
"https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/powercfg-command-line-options",
+ "https://blogs.vmware.com/security/2022/11/batloader-the-evasive-downloader-malware.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powercfg.yml"
],
"tags": [
@@ -40083,9 +40283,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.poweradmin.com/paexec/",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
"https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
+ "https://www.poweradmin.com/paexec/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexex_paexec_escalate_system.yml"
],
"tags": [
@@ -40105,6 +40305,39 @@
"uuid": "8834e2f7-6b4b-4f09-8906-d2276470ee23",
"value": "PsExec/PAExec Escalation to LOCAL SYSTEM"
},
+ {
+ "description": "Detects execution of rundll32 where the DLL being called is stored in an Alternate Data Stream (ADS).",
+ "meta": {
+ "author": "Harjot Singh, '@cyb3rjy0t'",
+ "creation_date": "2023/01/21",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_ads_stored_dll_execution_rundll32.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Rundll32",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_ads_stored_dll_execution_rundll32.yml"
+ ],
+ "tags": [
+ "attack.defense_evasion",
+ "attack.t1564.004"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "f2857333-11d4-45bf-b064-2c28d8525be5",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "9248c7e1-2bf3-4661-a22c-600a8040b446",
+ "value": "Potential Rundll32 Execution With DLL Stored In ADS"
+ },
{
"description": "Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)",
"meta": {
@@ -40118,8 +40351,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b",
"https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets",
+ "https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_sysprep_appdata.yml"
],
"tags": [
@@ -40220,13 +40453,13 @@
"logsource.product": "windows",
"refs": [
"https://github.com/keyboardcrunch/SentinelOne-ATTACK-Queries/blob/6a228d23eefe963ca81f2d52f94b815f61ef5ee0/Tactics/DefenseEvasion.md#t1055-process-injection",
+ "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://twitter.com/gN3mes1s/status/941315826107510784",
+ "https://reaqta.com/2017/12/mavinject-microsoft-injector/",
+ "https://github.com/SigmaHQ/sigma/issues/3742",
"https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
- "https://github.com/SigmaHQ/sigma/issues/3742",
- "https://reaqta.com/2017/12/mavinject-microsoft-injector/",
- "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_mavinject.yml"
],
"tags": [
@@ -40268,9 +40501,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Shells/Invoke-PowerShellTcpOneLine.ps1",
+ "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_reverse_shell_connection.yml"
],
"tags": [
@@ -40362,9 +40595,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.dfirnotes.net/portproxy_detection/",
"https://adepts.of0x.cc/netsh-portproxy-code/",
"https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html",
+ "https://www.dfirnotes.net/portproxy_detection/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netsh_port_fwd.yml"
],
"tags": [
@@ -40530,8 +40763,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virusradar.com/en/Win32_Kasidet.AD/description",
"https://www.hybrid-analysis.com/sample/07e789f4f2f3259e7559fdccb36e96814c2dbff872a21e1fa03de9ee377d581f?environmentId=100",
+ "https://www.virusradar.com/en/Win32_Kasidet.AD/description",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netsh_fw_add_susp_image.yml"
],
"tags": [
@@ -40564,8 +40797,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1207671369963646976",
"https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/",
+ "https://twitter.com/SBousseaden/status/1207671369963646976",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_wocao.yml"
],
"tags": [
@@ -40652,12 +40885,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
"https://twitter.com/andythevariable/status/1576953781581144064?s=20&t=QiJILvK4ZiBdR8RJe24u-A",
- "https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e",
- "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set",
- "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_spawning_control.yml",
+ "https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e",
+ "https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbins_by_office_applications.yml"
],
"tags": [
@@ -40810,8 +41043,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md",
"https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_service_path_modification.yml"
],
"tags": [
@@ -40836,9 +41069,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://dfironthemountain.wordpress.com/2018/12/06/locked-file-access-using-esentutl-exe/",
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://room362.com/post/2013/2013-06-10-volume-shadow-copy-ntdsdit-domain-hashes-remotely-part-1/",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://dfironthemountain.wordpress.com/2018/12/06/locked-file-access-using-esentutl-exe/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_copying_sensitive_files_with_credential_data.yml"
],
"tags": [
@@ -40882,8 +41115,8 @@
"logsource.product": "windows",
"refs": [
"https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browser-extension-sharpext/",
- "https://twitter.com/max_mal_/status/1542461200797163522",
"https://github.com/pr0xylife/Qakbot/blob/4f0795d79dabee5bc9dd69f17a626b48852e7869/Qakbot_AA_23.06.2022.txt",
+ "https://twitter.com/max_mal_/status/1542461200797163522",
"https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_curl_download.yml"
],
@@ -40941,9 +41174,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)",
- "https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/using-dsacls-to-check-ad-object-permissions#password-spraying-anyone",
"https://ss64.com/nt/dsacls.html",
+ "https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/using-dsacls-to-check-ad-object-permissions#password-spraying-anyone",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771151(v=ws.11)",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dsacls_password_spray.yml"
],
"tags": [
@@ -41027,8 +41260,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/h3v0x/CVE-2021-26084_Confluence",
"https://nvd.nist.gov/vuln/detail/CVE-2021-26084",
+ "https://github.com/h3v0x/CVE-2021-26084_Confluence",
"https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_atlassian_confluence_cve_2021_26084_exploit.yml"
],
@@ -41104,8 +41337,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2020/10/08/ryuks-return/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker",
+ "https://thedfirreport.com/2020/10/08/ryuks-return/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_proc_create.yml"
],
"tags": [
@@ -41139,8 +41372,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/0gtweet/status/1588815661085917186?cxt=HHwWhIDUyaDbzYwsAAAA",
- "https://www.elastic.co/guide/en/security/current/microsoft-iis-service-account-password-dumped.html",
"https://www.netspi.com/blog/technical/network-penetration-testing/decrypting-iis-passwords-to-break-out-of-the-dmz-part-2/",
+ "https://www.elastic.co/guide/en/security/current/microsoft-iis-service-account-password-dumped.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_iis_service_account_password_dumped.yml"
],
"tags": [
@@ -41266,10 +41499,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://youtu.be/5mqid-7zp8k?t=2481",
"https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/",
- "https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
+ "https://youtu.be/5mqid-7zp8k?t=2481",
+ "https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mailboxexport_share.yml"
],
"tags": [
@@ -41423,8 +41656,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_felamos/status/1204705548668555264",
"https://bohops.com/2019/08/19/dotnet-core-a-vector-for-awl-bypass-defense-evasion/",
+ "https://twitter.com/_felamos/status/1204705548668555264",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dotnet/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dotnet.yml"
],
@@ -41581,8 +41814,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/klsecservices/Publications/blob/657deb6a6eb6e00669afd40173f425fb49682eaa/Incident-Response-Analyst-Report-2020.pdf",
"https://sourceforge.net/projects/mouselock/",
+ "https://github.com/klsecservices/Publications/blob/657deb6a6eb6e00669afd40173f425fb49682eaa/Incident-Response-Analyst-Report-2020.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mouse_lock.yml"
],
"tags": [
@@ -41607,8 +41840,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.echotrail.io/insights/search/wusa.exe/",
"https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html",
+ "https://www.echotrail.io/insights/search/wusa.exe/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wusa_susp_cap_extraction_from_susp_paths.yml"
],
"tags": [
@@ -41697,8 +41930,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/OTRF/detection-hackathon-apt29/issues/17",
"https://threathunterplaybook.com/evals/apt29/detections/7.B.4_C10730EA-6345-4934-AA0F-B0EFCA0C4BA6.html",
+ "https://github.com/OTRF/detection-hackathon-apt29/issues/17",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_webdav_client_execution.yml"
],
"tags": [
@@ -41754,8 +41987,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/TheDFIRReport/status/1423361119926816776?s=20",
"https://support.anydesk.com/Automatic_Deployment",
+ "https://twitter.com/TheDFIRReport/status/1423361119926816776?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_anydesk_silent_install.yml"
],
"tags": [
@@ -41856,8 +42089,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
+ "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_rundll32_dllregisterserver.yml"
],
"tags": [
@@ -41970,9 +42203,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120",
"https://twitter.com/filip_dragovic/status/1590104354727436290",
"https://twitter.com/filip_dragovic/status/1590052248260055041",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sysmon_exploitation.yml"
],
"tags": "No established tags"
@@ -42027,8 +42260,8 @@
"logsource.product": "windows",
"refs": [
"https://app.any.run/tasks/b12cccf3-1c22-4e28-9d3e-c7a6062f3914/",
- "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://app.any.run/tasks/7ca5661d-a67b-43ec-98c1-dd7a8103c256/",
+ "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_mustangpanda.yml"
],
"tags": [
@@ -42061,8 +42294,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1511415432888131586?s=20&t=DvVrzeZ1OcGiWowbhPV8Lg",
"https://twitter.com/mrd0x/status/1511489821247684615",
+ "https://twitter.com/mrd0x/status/1511415432888131586?s=20&t=DvVrzeZ1OcGiWowbhPV8Lg",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_dumpminitool.yml"
],
"tags": [
@@ -42096,8 +42329,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection",
"https://securelist.com/muddywater/88059/",
+ "https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_file_characteristics.yml"
],
"tags": [
@@ -42130,9 +42363,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/51e7185c-52d7-4efb-ac0d-e86340053473/",
- "https://app.any.run/tasks/65a79440-373a-4725-8d74-77db9f2abda4/",
"https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
+ "https://app.any.run/tasks/65a79440-373a-4725-8d74-77db9f2abda4/",
+ "https://app.any.run/tasks/51e7185c-52d7-4efb-ac0d-e86340053473/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_crime_maze_ransomware.yml"
],
"tags": [
@@ -42206,10 +42439,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/ReaQta/status/1222548288731217921",
"https://eqllib.readthedocs.io/en/latest/analytics/532b5ed4-7930-11e9-8f5c-d46d6d62a49e.html",
"https://www.activecyber.us/activelabs/windows-uac-bypass",
"https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
+ "https://twitter.com/ReaQta/status/1222548288731217921",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_wsreset.yml"
],
"tags": [
@@ -42243,9 +42476,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@malwaredancer/lockergoga-input-arguments-ipc-communication-and-others-bd4e5a7ba80a",
"https://www.carbonblack.com/blog/tau-threat-intelligence-notification-lockergoga-ransomware/",
"https://blog.f-secure.com/analysis-of-lockergoga-ransomware/",
+ "https://medium.com/@malwaredancer/lockergoga-input-arguments-ipc-communication-and-others-bd4e5a7ba80a",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mal_lockergoga_ransomware.yml"
],
"tags": [
@@ -42341,8 +42574,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/vysecurity/status/977198418354491392",
"https://github.com/vysecurity/Aggressor-VYSEC/blob/0d61c80387b9432dab64b8b8a9fb52d20cfef80e/ping.cna",
+ "https://twitter.com/vysecurity/status/977198418354491392",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ping_hex_ip.yml"
],
"tags": [
@@ -42601,8 +42834,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OtherMSBinaries/Sqltoolsps.yml",
"https://twitter.com/pabraeken/status/993298228840992768",
+ "https://github.com/LOLBAS-Project/LOLBAS/blob/8283d8d91552213ded165fd36deb6cb9534cb443/yml/OtherMSBinaries/Sqltoolsps.yml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_sqltoolsps_bin.yml"
],
"tags": [
@@ -42712,15 +42945,15 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
+ "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/",
+ "https://github.com/Neo23x0/Raccine#the-process",
+ "https://blog.talosintelligence.com/2017/05/wannacry.html",
"https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100",
"https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadmin-exe-now/",
- "https://blog.talosintelligence.com/2017/05/wannacry.html",
- "https://github.com/Neo23x0/Raccine#the-process",
- "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/",
"https://github.com/Neo23x0/Raccine/blob/20a569fa21625086433dcce8bb2765d0ea08dcb6/yara/gen_ransomware_command_lines.yar",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
"https://redcanary.com/blog/intelligence-insights-october-2021/",
+ "https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_shadow_copies_deletion.yml"
],
"tags": [
@@ -42755,9 +42988,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
"https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
"https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location.yml"
],
"tags": [
@@ -42781,9 +43014,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://isc.sans.edu/diary/22264",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download.yml"
],
"tags": [
@@ -42826,8 +43059,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://eqllib.readthedocs.io/en/latest/analytics/1ec33c93-3d0b-4a28-8014-dbdaae5c60ae.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_data_compressed_with_rar.yml"
],
"tags": [
@@ -42993,10 +43226,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/980659399495741441",
"https://lolbas-project.github.io/lolbas/Scripts/Manage-bde/",
"https://twitter.com/JohnLaTwC/status/1223292479270600706",
"https://gist.github.com/bohops/735edb7494fe1bd1010d67823842b712",
+ "https://twitter.com/bohops/status/980659399495741441",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1216/T1216.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_manage_bde_lolbas.yml"
],
@@ -43097,9 +43330,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bryon_/status/975835709587075072",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Sqlps/",
"https://docs.microsoft.com/en-us/sql/tools/sqlps-utility?view=sql-server-ver15",
+ "https://twitter.com/bryon_/status/975835709587075072",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_sqlps_bin.yml"
],
"tags": [
@@ -43299,8 +43532,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/search/metadata%253ACube0x0/files",
"https://github.com/cube0x0",
+ "https://www.virustotal.com/gui/search/metadata%253ACube0x0/files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_cube0x0_tools.yml"
],
"tags": "No established tags"
@@ -43321,8 +43554,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://twitter.com/swisscom_csirt/status/1331634525722521602?s=20",
+ "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_trickbot_wermgr.yml"
],
"tags": [
@@ -43355,10 +43588,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Rcsi/",
"https://twitter.com/Z3Jpa29z/status/1317545798981324801",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Csi/",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Rcsi/",
+ "https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_csi.yml"
],
"tags": [
@@ -43597,8 +43830,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-6---hostname-discovery-windows",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/hostname",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-6---hostname-discovery-windows",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_hostname.yml"
],
"tags": [
@@ -43622,10 +43855,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/",
- "https://twitter.com/hFireF0X/status/897640081053364225",
- "https://github.com/hfiref0x/UACME",
"https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
+ "https://twitter.com/hFireF0X/status/897640081053364225",
+ "https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/",
+ "https://github.com/hfiref0x/UACME",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cmstp_com_object_access.yml"
],
"tags": [
@@ -43695,8 +43928,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://svch0st.medium.com/stats-from-hunting-cobalt-strike-beacons-c17e56255f9b",
"https://twitter.com/x86matthew/status/1505476263464607744?s=12",
+ "https://svch0st.medium.com/stats-from-hunting-cobalt-strike-beacons-c17e56255f9b",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_parents.yml"
],
"tags": "No established tags"
@@ -43769,9 +44002,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://twitter.com/AdamTheAnalyst/status/1483497517119590403",
"https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_defender_exclusion.yml"
],
"tags": [
@@ -43796,10 +44029,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/Neo23x0/DLLRunner",
+ "https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/",
"https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/",
"https://twitter.com/cyb3rops/status/1186631731543236608",
- "https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/",
+ "https://github.com/Neo23x0/DLLRunner",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_by_ordinal.yml"
],
"tags": [
@@ -44077,8 +44310,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_remove_windows_defender_definition_files.yml"
],
"tags": [
@@ -44102,8 +44335,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://streamable.com/q2dsji",
"https://twitter.com/j0nh4t/status/1429049506021138437",
+ "https://streamable.com/q2dsji",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_razorinstaller_explorer.yml"
],
"tags": [
@@ -44168,8 +44401,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://docs.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps",
+ "https://learn.microsoft.com/en-us/windows/wsl/install-on-server",
"https://learn.microsoft.com/en-us/windows/win32/projfs/enabling-windows-projected-file-system",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_windowsoptionalfeature.yml"
],
@@ -44374,8 +44607,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
"https://redcanary.com/blog/child-processes/",
+ "https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dllhost_no_cli.yml"
],
"tags": [
@@ -44386,6 +44619,33 @@
"uuid": "e7888eb1-13b0-4616-bd99-4bc0c2b054b9",
"value": "Dllhost Process With No CommandLine"
},
+ {
+ "description": "Detects usage of the \"Import-Module\" cmdlet to load the \"Microsoft.ActiveDirectory.Management.dl\" DLL. Which is often used by attackers to perform AD enumeration.",
+ "meta": {
+ "author": "frack113",
+ "creation_date": "2023/01/22",
+ "falsepositive": [
+ "Legitimate use of the library for administrative activity"
+ ],
+ "filename": "proc_creation_win_powershell_active_directory_module_dll_import.yml",
+ "level": "medium",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://github.com/samratashok/ADModule",
+ "https://twitter.com/cyb3rops/status/1617108657166061568?s=20",
+ "https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/active-directory-enumeration-with-ad-module-without-rsat-or-admin-privileges",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_active_directory_module_dll_import.yml"
+ ],
+ "tags": [
+ "attack.reconnaissance",
+ "attack.discovery",
+ "attack.impact"
+ ]
+ },
+ "uuid": "70bc5215-526f-4477-963c-a47a5c9ebd12",
+ "value": "Potential Active Directory Enumeration Using AD Module - ProcCreation"
+ },
{
"description": "Detects the use of Setres.exe to set the screen resolution and then potentially launch a file named \"choice\" (with any executable extension such as \".cmd\" or \".exe\") from the current execution path",
"meta": {
@@ -44399,10 +44659,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Setres/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731033(v=ws.11)",
- "https://strontic.github.io/xcyclopedia/library/setres.exe-0E30E4C09637D7A128A37B59A3BC4D09.html",
"https://twitter.com/0gtweet/status/1583356502340870144",
+ "https://lolbas-project.github.io/lolbas/Binaries/Setres/",
+ "https://strontic.github.io/xcyclopedia/library/setres.exe-0E30E4C09637D7A128A37B59A3BC4D09.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_setres.yml"
],
"tags": [
@@ -44443,11 +44703,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/",
"https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware",
"https://labs.sentinelone.com/egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone",
- "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a",
"https://www.splunk.com/en_us/blog/security/darkside-ransomware-splunk-threat-update-and-detections.html",
+ "https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a",
+ "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rclone_execution.yml"
],
"tags": [
@@ -44480,9 +44740,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cmd_shadowcopy_access.yml"
],
"tags": [
@@ -44516,8 +44776,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/c_APT_ure/status/939475433711722497",
- "https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html",
"https://twitter.com/haroonmeer/status/939099379834658817",
+ "https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_builtin_commands_recon.yml"
],
"tags": [
@@ -44900,8 +45160,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/dez_/status/1560101453150257154",
"https://forensafe.com/blogs/typedpaths.html",
+ "https://twitter.com/dez_/status/1560101453150257154",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_persistence_typed_paths.yml"
],
"tags": [
@@ -44957,8 +45217,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/swagkarna/Defeat-Defender-V1.2.0",
"https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/",
+ "https://github.com/swagkarna/Defeat-Defender-V1.2.0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_reg_defender_tampering.yml"
],
"tags": [
@@ -45112,8 +45372,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/Kevin-Robertson/Inveigh",
"https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/",
+ "https://github.com/Kevin-Robertson/Inveigh",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_inveigh.yml"
],
"tags": [
@@ -45146,8 +45406,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)",
+ "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_gallium.yml"
],
"tags": [
@@ -45189,8 +45449,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blog.osarmor.com/319/onenote-attachment-delivers-asyncrat-malware/",
"https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml",
+ "https://blog.osarmor.com/319/onenote-attachment-delivers-asyncrat-malware/",
"https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmiprvse_susp_child_processes.yml"
],
@@ -45308,8 +45568,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html",
"https://www.hybrid-analysis.com/sample/465aabe132ccb949e75b8ab9c5bda36d80cf2fd503d52b8bad54e295f28bbc21?environmentId=100",
+ "https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_outlook_shell.yml"
],
"tags": [
@@ -45544,11 +45804,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/",
"https://twitter.com/JohnLaTwC/status/835149808817991680",
+ "https://lolbas-project.github.io/lolbas/Binaries/Certutil/",
+ "https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/",
"https://blogs.technet.microsoft.com/pki/2006/11/30/basic-crl-checking-with-certutil/",
"https://twitter.com/egre55/status/1087685529016193025",
- "https://lolbas-project.github.io/lolbas/Binaries/Certutil/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_certutil_command.yml"
],
"tags": [
@@ -45597,8 +45857,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/b8a94d2f-dc75-4630-9d73-1edc6bd26fff.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/b8a94d2f-dc75-4630-9d73-1edc6bd26fff.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_net_enum.yml"
],
"tags": [
@@ -45624,8 +45884,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "Internal Research",
"https://tools.thehacker.recipes/mimikatz/modules",
+ "Internal Research",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_system_user_anomaly.yml"
],
"tags": "No established tags"
@@ -45790,8 +46050,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-FodHelperBypass.ps1#L64",
"https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-FodHelperBypass.ps1#L64",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_empire_uac_bypass.yml"
],
"tags": [
@@ -45859,10 +46119,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_uncommon_targetfolder.yml"
],
"tags": [
@@ -46074,10 +46334,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/",
"https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
- "https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder.yml"
],
"tags": [
@@ -46153,8 +46413,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://hunter2.gitbook.io/darthsidious/other/war-stories/domain-admin-in-30-minutes",
"https://pentestlab.blog/2017/04/13/hot-potato/",
+ "https://hunter2.gitbook.io/darthsidious/other/war-stories/domain-admin-in-30-minutes",
"https://github.com/ohpe/juicy-potato",
"https://hunter2.gitbook.io/darthsidious/execution/responder-with-ntlm-relay-and-empire",
"https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
@@ -46225,8 +46485,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.revshells.com/",
"https://nmap.org/ncat/",
+ "https://www.revshells.com/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netcat_execution.yml"
],
@@ -46294,8 +46554,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil",
- "https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63",
"https://abuse.io/lockergoga.txt",
+ "https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_etw_trace_evasion.yml"
],
"tags": [
@@ -46321,10 +46581,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
+ "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191",
"https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/resolver.py#L178",
"https://github.com/EmpireProject/Empire/blob/c2ba61ca8d2031dad0cfc1d5770ba723e8b710db/lib/common/helpers.py#L165",
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191",
- "https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_empire_launch.yml"
],
"tags": [
@@ -46383,9 +46643,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos",
"https://research.nccgroup.com/2021/01/12/abusing-cloud-services-to-fly-under-the-radar/",
"https://twitter.com/EricaZelic/status/1614075109827874817",
+ "https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos",
"https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Sysinternals/PsLogList",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psloglist.yml"
],
@@ -46522,9 +46782,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://isc.sans.edu/diary/22264",
- "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
"https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/",
+ "https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin",
+ "https://isc.sans.edu/diary/22264",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_ext.yml"
],
"tags": [
@@ -46692,11 +46952,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Hexacorn/status/885570278637678592",
- "https://twitter.com/vysecurity/status/885545634958385153",
- "https://twitter.com/Hexacorn/status/885553465417756673",
- "https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html",
"http://www.windowsinspired.com/understanding-the-command-line-string-and-arguments-received-by-a-windows-program/",
+ "https://twitter.com/Hexacorn/status/885570278637678592",
+ "https://twitter.com/Hexacorn/status/885553465417756673",
+ "https://twitter.com/vysecurity/status/885545634958385153",
+ "https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_cli_escape.yml"
],
"tags": [
@@ -46786,9 +47046,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/winsiderss/systeminformer",
- "https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/",
"https://processhacker.sourceforge.io/",
+ "https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/",
+ "https://github.com/winsiderss/systeminformer",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_process_hacker.yml"
],
"tags": "No established tags"
@@ -47056,8 +47316,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/yosqueoy/ditsnap",
"https://thedfirreport.com/2020/06/21/snatch-ransomware/",
+ "https://github.com/yosqueoy/ditsnap",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ditsnap.yml"
],
"tags": [
@@ -47124,8 +47384,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://ss64.com/nt/for.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md",
+ "https://ss64.com/nt/for.html",
"https://ss64.com/ps/foreach-object.htmll",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_network_scan_loop.yml"
],
@@ -47257,8 +47517,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1482/T1482.md",
"https://github.com/dsnezhkov/TruffleSnout",
+ "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1482/T1482.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_trufflesnout.yml"
],
"tags": [
@@ -47325,9 +47585,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/oulusoyum/status/1191329746069655553",
"https://twitter.com/mattifestation/status/1196390321783025666",
"https://lolbas-project.github.io/lolbas/Binaries/Tttracer/",
+ "https://twitter.com/oulusoyum/status/1191329746069655553",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_tttracer_mod_load.yml"
],
"tags": [
@@ -47369,9 +47629,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/10/31/follina-exploit-leads-to-domain-compromise/",
- "https://redcanary.com/threat-detection-report/threats/qbot/",
"https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
+ "https://redcanary.com/threat-detection-report/threats/qbot/",
+ "https://thedfirreport.com/2022/10/31/follina-exploit-leads-to-domain-compromise/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_esentutl_webcache.yml"
],
"tags": [
@@ -47404,9 +47664,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
- "https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/",
"https://lolbas-project.github.io/lolbas/Binaries/Findstr/",
+ "https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/",
+ "https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_findstr.yml"
],
"tags": [
@@ -47456,10 +47716,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.softpedia.com/get/Antivirus/Removal-Tools/ithurricane-PowerTool.shtml",
- "https://www.trendmicro.com/en_us/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html",
"https://twitter.com/gbti_sa/status/1249653895900602375?lang=en",
+ "https://www.softpedia.com/get/Antivirus/Removal-Tools/ithurricane-PowerTool.shtml",
"https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/",
+ "https://www.trendmicro.com/en_us/research/22/i/play-ransomware-s-attack-playbook-unmasks-it-as-another-hive-aff.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powertool_execution.yml"
],
"tags": [
@@ -47527,8 +47787,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl/",
"https://twitter.com/nas_bench/status/1535431474429808642",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_wsl.yml"
],
"tags": [
@@ -47713,8 +47973,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/previous-versions/office/troubleshoot/office-developer/automate-word-create-file-using-visual-basic",
"https://github.com/med0x2e/vba2clr",
+ "https://learn.microsoft.com/en-us/previous-versions/office/troubleshoot/office-developer/automate-word-create-file-using-visual-basic",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_office_svchost_child.yml"
],
"tags": [
@@ -47762,8 +48022,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Devtoolslauncher/",
"https://twitter.com/_felamos/status/1179811992841797632",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Devtoolslauncher/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_devtoolslauncher.yml"
],
"tags": [
@@ -47830,9 +48090,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
"https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
+ "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regini.yml"
],
"tags": [
@@ -47889,8 +48149,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html",
"https://twitter.com/blackorbird/status/1140519090961825792",
+ "https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_double_extension.yml"
],
"tags": [
@@ -48290,8 +48550,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.virustotal.com/gui/file/a63376ee1dba76361df73338928e528ca5b20171ea74c24581605366dcaa0104/behavior",
"https://twitter.com/ShadowChasing1/status/1552595370961944576",
+ "https://www.virustotal.com/gui/file/a63376ee1dba76361df73338928e528ca5b20171ea74c24581605366dcaa0104/behavior",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_net_use.yml"
],
"tags": [
@@ -48324,8 +48584,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100",
"https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100",
+ "https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_cve_2017_8759.yml"
],
"tags": [
@@ -48490,8 +48750,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/",
"https://github.com/Neo23x0/Raccine/blob/20a569fa21625086433dcce8bb2765d0ea08dcb6/yara/mal_revil.yar",
+ "https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_base64_reflective_assembly_load.yml"
],
"tags": [
@@ -48535,8 +48795,8 @@
"logsource.product": "windows",
"refs": [
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks-create",
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks-change",
"http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/schtasks-change",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_schtasks_schedule_type.yml"
],
"tags": [
@@ -48569,8 +48829,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md#atomic-test-6---dlp-evasion-via-sensitive-data-in-vba-macro-over-http",
+ "https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_char_in_cmd.yml"
],
"tags": [
@@ -48645,9 +48905,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1",
- "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
"https://github.com/nccgroup/redsnarf/blob/35949b30106ae543dc6f2bc3f1be10c6d9a8d40e/redsnarf.py",
+ "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
+ "https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_unquoted_service_search.yml"
],
"tags": [
@@ -48705,12 +48965,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2020/05/08/adfind-recon/",
- "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
- "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
- "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
+ "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
"https://www.joeware.net/freetools/tools/adfind/",
+ "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
+ "https://thedfirreport.com/2020/05/08/adfind-recon/",
+ "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_adfind.yml"
],
"tags": [
@@ -49018,8 +49278,8 @@
"logsource.product": "windows",
"refs": [
"https://labs.sentinelone.com/the-anatomy-of-an-apt-attack-and-cobaltstrike-beacons-encoded-configuration/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://ss64.com/bash/rar.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rar_flags.yml"
],
"tags": [
@@ -49182,8 +49442,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
"https://github.com/klinix5/InstallerFileTakeOver",
+ "https://www.zerodayinitiative.com/advisories/ZDI-21-1308/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_lpe_cve_2021_41379.yml"
],
"tags": [
@@ -49252,8 +49512,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://docs.microsoft.com/pt-br/windows/win32/secauthz/sid-strings",
+ "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_service_dacl_modification.yml"
],
"tags": [
@@ -49417,8 +49677,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
"https://persistence-info.github.io/Data/wpbbin.html",
+ "https://grzegorztworek.medium.com/using-uefi-to-inject-executable-files-into-bitlocker-protected-drives-8ff4ca59c94c",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wpbbin_persistence.yml"
],
"tags": [
@@ -49478,13 +49738,13 @@
"logsource.product": "windows",
"refs": [
"https://github.com/keyboardcrunch/SentinelOne-ATTACK-Queries/blob/6a228d23eefe963ca81f2d52f94b815f61ef5ee0/Tactics/DefenseEvasion.md#t1055-process-injection",
+ "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
"https://twitter.com/gN3mes1s/status/941315826107510784",
+ "https://reaqta.com/2017/12/mavinject-microsoft-injector/",
+ "https://github.com/SigmaHQ/sigma/issues/3742",
"https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.004/T1056.004.md",
- "https://github.com/SigmaHQ/sigma/issues/3742",
- "https://reaqta.com/2017/12/mavinject-microsoft-injector/",
- "https://twitter.com/Hexacorn/status/776122138063409152",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_mavinject_process_injection.yml"
],
"tags": [
@@ -49649,12 +49909,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Other/Advanced%20IP%20Scanner",
+ "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
+ "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
"https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html",
"https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer",
- "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/",
- "https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Other/Advanced%20IP%20Scanner",
"https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf",
- "https://labs.f-secure.com/blog/prelude-to-ransomware-systembc",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_advanced_ip_scanner.yml"
],
"tags": [
@@ -49679,8 +49939,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/med0x2e/status/1520402518685200384",
"https://github.com/elastic/detection-rules/blob/dd224fb3f81d0b4bf8593c5f02a029d647ba2b2d/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml",
+ "https://twitter.com/med0x2e/status/1520402518685200384",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ntlmrelay.yml"
],
"tags": [
@@ -49739,8 +49999,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://labs.sentinelone.com/meteorexpress-mysterious-wiper-paralyzes-iranian-trains-with-epic-troll",
"https://blog.malwarebytes.com/threat-intelligence/2021/08/new-variant-of-konni-malware-used-in-campaign-targetting-russia/",
+ "https://labs.sentinelone.com/meteorexpress-mysterious-wiper-paralyzes-iranian-trains-with-epic-troll",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_expand_cabinet_files.yml"
],
"tags": [
@@ -49864,9 +50124,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/win32/wmisdk/mofcomp",
- "https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/",
"https://github.com/The-DFIR-Report/Sigma-Rules/blob/75260568a7ffe61b2458ca05f6f25914efb44337/win_mofcomp_execution.yml",
+ "https://thedfirreport.com/2022/07/11/select-xmrig-from-sqlserver/",
+ "https://docs.microsoft.com/en-us/windows/win32/wmisdk/mofcomp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_mofcomp_execution.yml"
],
"tags": [
@@ -49899,9 +50159,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blog.viettelcybersecurity.com/saml-show-stopper/",
- "https://github.com/horizon3ai/CVE-2022-47966/blob/3a51c6b72ebbd87392babd955a8fbeaee2090b35/CVE-2022-47966.py",
"https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/",
+ "https://github.com/horizon3ai/CVE-2022-47966/blob/3a51c6b72ebbd87392babd955a8fbeaee2090b35/CVE-2022-47966.py",
+ "https://blog.viettelcybersecurity.com/saml-show-stopper/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_manageengine_pattern.yml"
],
"tags": "No established tags"
@@ -50016,9 +50276,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.fortiguard.com/threat-signal-report/4718?s=09",
"https://lolbas-project.github.io/lolbas/Binaries/Regasm/",
"https://lolbas-project.github.io/lolbas/Binaries/Regsvcs/",
- "https://www.fortiguard.com/threat-signal-report/4718?s=09",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_regasm.yml"
],
"tags": [
@@ -50051,10 +50311,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/defaultnamehere/cookie_crimes/",
- "https://www.mdsec.co.uk/2022/10/analysing-lastpass-part-1/",
"https://github.com/wunderwuzzi23/firefox-cookiemonster",
"https://yoroi.company/wp-content/uploads/2022/05/EternityGroup_report_compressed.pdf",
+ "https://www.mdsec.co.uk/2022/10/analysing-lastpass-part-1/",
+ "https://github.com/defaultnamehere/cookie_crimes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_browser_remote_debugging.yml"
],
"tags": [
@@ -50160,11 +50420,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
"https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks",
- "https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
- "https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/",
+ "https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
"https://twitter.com/christophetd/status/1164506034720952320",
+ "https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/",
+ "https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant.yml"
],
"tags": [
@@ -50198,8 +50458,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/c4732632-9c1d-4980-9fa8-1d98c93f918e.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/c4732632-9c1d-4980-9fa8-1d98c93f918e.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bootconf_mod.yml"
],
"tags": [
@@ -50358,8 +50618,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.joesandbox.com/analysis/514608/0/html#324415FF7D8324231381BAD48A052F85DF04",
"https://www.welivesecurity.com/2022/01/18/donot-go-do-not-respawn/",
+ "https://www.joesandbox.com/analysis/514608/0/html#324415FF7D8324231381BAD48A052F85DF04",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_schtasks_env_folder.yml"
],
"tags": [
@@ -50392,8 +50652,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://docs.microsoft.com/pt-br/windows/win32/secauthz/sid-strings",
+ "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_service_dacl_modification_set_service.yml"
],
"tags": [
@@ -50475,9 +50735,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
"https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/",
"https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wab_unusual_parents.yml"
],
"tags": [
@@ -50501,8 +50761,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/",
"http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/",
+ "https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_plugx_susp_exe_locations.yml"
],
"tags": [
@@ -50527,8 +50787,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
"https://bazaar.abuse.ch/sample/6f3aa9362d72e806490a8abce245331030d1ab5ac77e400dd475748236a6cc81/",
+ "https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_install_reg_debugger_backdoor.yml"
],
"tags": [
@@ -50586,9 +50846,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/210b4ea4-12fc-11e9-8d76-4d6bb837cda4.html",
"https://eqllib.readthedocs.io/en/latest/analytics/1e1ef6be-12fc-11e9-8d76-4d6bb837cda4.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/210b4ea4-12fc-11e9-8d76-4d6bb837cda4.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lsass_dump.yml"
],
"tags": [
@@ -50654,8 +50914,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/c28cabc8-a19f-40f3-a78b-cae506a5c0d4",
"https://app.any.run/tasks/cfc8870b-ccd7-4210-88cf-a8087476a6d0",
+ "https://app.any.run/tasks/c28cabc8-a19f-40f3-a78b-cae506a5c0d4",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_attrib_system_susp_paths.yml"
],
"tags": [
@@ -50721,8 +50981,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1?environmentId=100",
"https://securelist.com/schroedingers-petya/78870/",
+ "https://www.hybrid-analysis.com/sample/64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1?environmentId=100",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_notpetya.yml"
],
"tags": [
@@ -50808,8 +51068,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
"https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html",
+ "https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_renamed_binary.yml"
],
"tags": [
@@ -50918,8 +51178,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
"https://github.com/redcanaryco/atomic-red-team/blob/a8e3cf63e97b973a25903d3df9fd55da6252e564/atomics/T1112/T1112.md",
+ "https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lsa_disablerestrictedadmin.yml"
],
"tags": [
@@ -50943,8 +51203,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation",
"https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment",
+ "https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation",
"https://eqllib.readthedocs.io/en/latest/analytics/aed95fc6-5e3f-49dc-8b35-06508613f979.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003/T1003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_grabbing_sensitive_hives_via_reg.yml"
@@ -50996,12 +51256,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2020/05/08/adfind-recon/",
- "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
- "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
- "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md",
+ "https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
"https://www.joeware.net/freetools/tools/adfind/",
+ "https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/",
+ "https://thedfirreport.com/2020/05/08/adfind-recon/",
+ "https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_adfind_usage.yml"
],
"tags": [
@@ -51044,10 +51304,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.securitynewspaper.com/2016/11/23/technical-teardown-exploit-malware-hwp-files/",
- "https://en.wikipedia.org/wiki/Hangul_(word_processor)",
"https://www.hybrid-analysis.com/search?query=context:74940dcc5b38f9f9b1a0fea760d344735d7d91b610e6d5bd34533dd0153402c5&from_sample=5db135000388385a7644131f&block_redirect=1",
+ "https://www.securitynewspaper.com/2016/11/23/technical-teardown-exploit-malware-hwp-files/",
"https://twitter.com/cyberwar_15/status/1187287262054076416",
+ "https://en.wikipedia.org/wiki/Hangul_(word_processor)",
"https://blog.alyac.co.kr/1901",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hwp_exploits.yml"
],
@@ -51158,8 +51418,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/kagancapar/status/1515219358234161153",
"https://github.com/kagancapar/CVE-2022-29072",
+ "https://twitter.com/kagancapar/status/1515219358234161153",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_7zip_cve_2022_29072.yml"
],
"tags": [
@@ -51249,9 +51509,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Cdb/",
"https://twitter.com/nas_bench/status/1534957360032120833",
"https://web.archive.org/web/20170715043507/http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Cdb/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_cdb.yml"
],
"tags": [
@@ -51384,8 +51644,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_remote_service.yml"
],
"tags": [
@@ -51453,8 +51713,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_workflow_compiler.yml"
],
"tags": [
@@ -51530,8 +51790,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/d0dad62dbcae9c60c519368e82c196a3db577055/atomics/T1124/T1124.md",
"https://blogs.blackberry.com/en/2022/05/dirty-deeds-done-dirt-cheap-russian-rat-offers-backdoor-bargains",
+ "https://github.com/redcanaryco/atomic-red-team/blob/d0dad62dbcae9c60c519368e82c196a3db577055/atomics/T1124/T1124.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_w32tm.yml"
],
"tags": [
@@ -51848,9 +52108,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
"https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html",
"https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/",
+ "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_driverquery_recon.yml"
],
"tags": [
@@ -51873,10 +52133,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76",
"https://twitter.com/d1r4c/status/1279042657508081664",
- "https://curl.se/docs/manpage.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-19---curl-upload-file",
+ "https://curl.se/docs/manpage.html",
+ "https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_curl_fileupload.yml"
],
"tags": [
@@ -51951,8 +52211,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/SBousseaden/status/1451237393017839616",
"https://github.com/Tylous/ZipExec",
+ "https://twitter.com/SBousseaden/status/1451237393017839616",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_zipexec.yml"
],
"tags": [
@@ -52132,8 +52392,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/11/29/continuing-the-bazar-ransomware-story/",
"https://blog.talosintelligence.com/2021/10/threat-hunting-in-large-datasets-by.html",
+ "https://thedfirreport.com/2021/11/29/continuing-the-bazar-ransomware-story/",
"https://guides.lib.umich.edu/c.php?g=282942&p=1885348",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_image.yml"
],
@@ -52167,8 +52427,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/lateral-movement-winrm-wmi/",
"https://twitter.com/bohops/status/994405551751815170",
+ "https://redcanary.com/blog/lateral-movement-winrm-wmi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_winrm_execution.yml"
],
"tags": [
@@ -52228,10 +52488,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/",
- "https://www.elastic.co/guide/en/security/current/remote-file-copy-to-a-hidden-share.html",
- "https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view",
"https://twitter.com/SBousseaden/status/1211636381086339073",
+ "https://www.elastic.co/guide/en/security/current/remote-file-copy-to-a-hidden-share.html",
+ "https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/",
+ "https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_copy_lateral_movement.yml"
],
"tags": [
@@ -52335,8 +52595,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/",
"https://github.com/sensepost/impersonate",
+ "https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_impersonate_tool.yml"
],
"tags": [
@@ -52378,8 +52638,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/set-service?view=powershell-7.2",
+ "https://twitter.com/Alh4zr3d/status/1580925761996828672",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_using_set_service_to_hide_services.yml"
],
"tags": [
@@ -52620,8 +52880,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/",
"https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/",
+ "https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/",
"https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cobaltstrike_bloopers_modules.yml"
],
@@ -52884,8 +53144,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
"https://twitter.com/_JohnHammond/status/1531672601067675648",
+ "https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
"https://twitter.com/nao_sec/status/1530196847679401984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msdt.yml"
],
@@ -52985,10 +53245,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/GadixCRK/status/1369313704869834753?s=20",
- "https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3",
"https://twitter.com/BleepinComputer/status/1372218235949617161",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
+ "https://twitter.com/GadixCRK/status/1369313704869834753?s=20",
+ "https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3",
"https://blog.truesec.com/2021/03/07/exchange-zero-day-proxylogon-and-hafnium/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_hafnium.yml"
],
@@ -53023,9 +53283,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md#atomic-test-7---create-a-process-using-wmi-query-and-an-encoded-command",
"https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-raindrop-malware",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md#atomic-test-7---create-a-process-using-wmi-query-and-an-encoded-command",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_unc2452_ps.yml"
],
"tags": [
@@ -53190,10 +53450,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows/compatibility/ntvdm-and-16-bit-app-support",
- "https://app.any.run/tasks/93fe92fa-8b2b-4d92-8c09-a841aed2e793/",
"https://support.microsoft.com/fr-fr/topic/an-ms-dos-based-program-that-uses-the-ms-dos-protected-mode-interface-crashes-on-a-computer-that-is-running-windows-7-5dc739ea-987b-b458-15e4-d28d5cca63c7",
+ "https://docs.microsoft.com/en-us/windows/compatibility/ntvdm-and-16-bit-app-support",
"https://app.any.run/tasks/214094a7-0abc-4a7b-a564-1b757faed79d/",
+ "https://app.any.run/tasks/93fe92fa-8b2b-4d92-8c09-a841aed2e793/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_16bit_application.yml"
],
"tags": [
@@ -53284,8 +53544,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://strontic.github.io/xcyclopedia/library/pnputil.exe-60EDC5E6BDBAEE441F2E3AEACD0340D2.html",
"https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/pnputil-command-syntax",
+ "https://strontic.github.io/xcyclopedia/library/pnputil.exe-60EDC5E6BDBAEE441F2E3AEACD0340D2.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_driver_installed_by_pnputil.yml"
],
"tags": [
@@ -53444,8 +53704,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/",
+ "https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_appx_execution.yml"
],
"tags": [
@@ -53580,9 +53840,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1562.001/T1562.001.md",
"https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1112/T1112.md",
"https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_reg_add.yml"
],
"tags": [
@@ -53700,8 +53960,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/3.B.2_C36B49B5-DF58-4A34-9FE9-56189B9DEFEA.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/6",
+ "https://threathunterplaybook.com/evals/apt29/detections/3.B.2_C36B49B5-DF58-4A34-9FE9-56189B9DEFEA.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_high_integrity_sdclt.yml"
],
"tags": [
@@ -54385,8 +54645,8 @@
"logsource.product": "windows",
"refs": [
"https://nodejs.org/api/cli.html",
- "https://www.sprocketsecurity.com/resources/crossing-the-log4j-horizon-a-vulnerability-with-no-return",
"https://www.rapid7.com/blog/post/2022/01/18/active-exploitation-of-vmware-horizon-servers/",
+ "https://www.sprocketsecurity.com/resources/crossing-the-log4j-horizon-a-vulnerability-with-no-return",
"http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_node_abuse.yml"
],
@@ -54490,8 +54750,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100",
"https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw",
+ "https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_exploit_cve_2017_11882.yml"
],
"tags": [
@@ -54534,8 +54794,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware",
"https://docs.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior",
+ "https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_fsutil_symlinkevaluation.yml"
],
"tags": [
@@ -54624,10 +54884,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://adsecurity.org/?p=2604",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-7.1",
"https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.1",
"https://thedfirreport.com/2021/11/01/from-zero-to-domain-admin/",
- "https://adsecurity.org/?p=2604",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_set_policies_to_unsecure_level.yml"
],
"tags": [
@@ -54660,9 +54920,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
"https://twitter.com/0gtweet/status/1602644163824156672?s=20&t=kuxbUnZPltpvFPZdCrqPXA",
"https://twitter.com/pabraeken/status/990717080805789697",
+ "https://lolbas-project.github.io/lolbas/Binaries/Runonce/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_runonce_execution.yml"
],
"tags": [
@@ -54778,12 +55038,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/",
- "https://twitter.com/Hexacorn/status/1224848930795552769",
- "https://twitter.com/SBousseaden/status/1167417096374050817",
"https://twitter.com/Wietze/status/1542107456507203586",
- "https://twitter.com/shantanukhande/status/1229348874298388484",
+ "https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/",
+ "https://twitter.com/SBousseaden/status/1167417096374050817",
"https://twitter.com/pythonresponder/status/1385064506049630211?s=21",
+ "https://twitter.com/shantanukhande/status/1229348874298388484",
+ "https://twitter.com/Hexacorn/status/1224848930795552769",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_process_dump_rundll32_comsvcs.yml"
],
"tags": [
@@ -54819,16 +55079,16 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
- "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
- "https://twitter.com/_xpn_/status/1268712093928378368",
"https://github.com/dotnet/runtime/blob/ee2355c801d892f2894b0f7b14a20e6cc50e0e54/docs/design/coreclr/jit/viewing-jit-dumps.md#setting-configuration-variables",
- "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"http://managed670.rssing.com/chan-5590147/all_p1.html",
+ "https://github.com/dotnet/runtime/blob/7abe42dc1123722ed385218268bb9fe04556e3d3/src/coreclr/src/inc/clrconfig.h#L33-L39",
"https://github.com/dotnet/runtime/search?p=1&q=COMPlus_&unscoped_q=COMPlus_",
- "https://bunnyinside.com/?term=f71e8cb9c76a",
+ "https://github.com/dotnet/runtime/blob/f62e93416a1799aecc6b0947adad55a0d9870732/src/coreclr/src/inc/clrconfigvalues.h#L35-L38",
"https://social.msdn.microsoft.com/Forums/vstudio/en-US/0878832e-39d7-4eaf-8e16-a729c4c40975/what-can-i-use-e13c0d23ccbc4e12931bd9cc2eee27e4-for?forum=clr",
+ "https://bunnyinside.com/?term=f71e8cb9c76a",
+ "https://twitter.com/_xpn_/status/1268712093928378368",
"https://i.blackhat.com/EU-21/Wednesday/EU-21-Teodorescu-Veni-No-Vidi-No-Vici-Attacks-On-ETW-Blind-EDRs.pdf",
+ "https://github.com/dotnet/runtime/blob/4f9ae42d861fcb4be2fcd5d3d55d5f227d30e723/docs/coding-guidelines/clr-jit-coding-conventions.md#1412-disabling-code",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_etw_modification_cmdline.yml"
],
"tags": [
@@ -54961,8 +55221,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/",
+ "https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_trickbot_recon_activity.yml"
],
"tags": [
@@ -55086,8 +55346,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/offsecginger/koadic/blob/457f9a3ff394c989cdb4c599ab90eb34fb2c762c/data/stager/js/stdlib.js",
"https://blog.f-secure.com/hunting-for-koadic-a-com-based-rootkit/",
+ "https://github.com/offsecginger/koadic/blob/457f9a3ff394c989cdb4c599ab90eb34fb2c762c/data/stager/js/stdlib.js",
"https://unit42.paloaltonetworks.com/unit42-sofacy-groups-parallel-attacks/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_koadic.yml"
],
@@ -55204,8 +55464,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1071.001/T1071.001.md#atomic-test-2---malicious-user-agents---cmd",
"https://curl.se/docs/manpage.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1071.001/T1071.001.md#atomic-test-2---malicious-user-agents---cmd",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_curl_useragent.yml"
],
"tags": [
@@ -55294,9 +55554,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
"https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html",
"https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/",
+ "https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_driverquery_usage.yml"
],
"tags": [
@@ -55319,9 +55579,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/Azure/Azure-Sentinel/blob/43e9be273dca321295190bfc4902858e009d4a35/Detections/MultipleDataSources/SOURGUM_IOC.yaml",
"https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/",
"https://www.virustotal.com/gui/file/c299063e3eae8ddc15839767e83b9808fd43418dc5a1af7e4f44b97ba53fbd3d/detection",
- "https://github.com/Azure/Azure-Sentinel/blob/43e9be273dca321295190bfc4902858e009d4a35/Detections/MultipleDataSources/SOURGUM_IOC.yaml",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_sourgrum.yml"
],
"tags": [
@@ -55363,8 +55623,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell",
+ "https://www.elastic.co/guide/en/security/current/volume-shadow-copy-deletion-via-powershell.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_shadowcopy_deletion_via_powershell.yml"
],
"tags": [
@@ -55397,10 +55657,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh875578(v=ws.11)",
"https://lolbas-project.github.io/lolbas/Binaries/Rpcping/",
- "https://twitter.com/vysecurity/status/873181705024266241",
"https://twitter.com/vysecurity/status/974806438316072960",
+ "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh875578(v=ws.11)",
+ "https://twitter.com/vysecurity/status/873181705024266241",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rpcping.yml"
],
"tags": [
@@ -55433,8 +55693,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bopin2020/status/1366400799199272960",
"https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
+ "https://twitter.com/bopin2020/status/1366400799199272960",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml"
],
"tags": [
@@ -55511,8 +55771,8 @@
"logsource.product": "windows",
"refs": [
"https://github.com/jpillora/chisel/",
- "https://blog.sekoia.io/lucky-mouse-incident-response-to-detection-engineering/",
"https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/",
+ "https://blog.sekoia.io/lucky-mouse-incident-response-to-detection-engineering/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_chisel_usage.yml"
],
"tags": [
@@ -55602,8 +55862,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/993497996179492864",
"https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OtherBinaries/VBoxDrvInst.yml",
+ "https://twitter.com/pabraeken/status/993497996179492864",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_vboxdrvinst.yml"
],
"tags": [
@@ -55660,8 +55920,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.youtube.com/watch?v=Ie831jF0bb0",
"https://twitter.com/_xpn_/status/1491557187168178176",
+ "https://www.youtube.com/watch?v=Ie831jF0bb0",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_trolleyexpress_procdump.yml"
],
"tags": [
@@ -55703,9 +55963,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://rvsec0n.wordpress.com/2020/01/24/malwares-that-bypass-windows-defender/",
- "https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/",
+ "https://rvsec0n.wordpress.com/2020/01/24/malwares-that-bypass-windows-defender/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_disable_defender_av_security_monitoring.yml"
],
"tags": [
@@ -55955,8 +56215,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/3gstudent/PasswordFilter/tree/master/PasswordFilter",
"https://pentestlab.blog/2020/02/10/credential-access-password-filter-dll/",
+ "https://github.com/3gstudent/PasswordFilter/tree/master/PasswordFilter",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_credential_access_via_password_filter.yml"
],
"tags": [
@@ -56123,8 +56383,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/ProtocolHandler/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/ProtocolHandler/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_protocolhandler_download.yml"
],
"tags": [
@@ -56258,10 +56518,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/81f3c28c-c686-425d-8a2b-a98198d244e1/",
- "https://app.any.run/tasks/e13ab713-64cf-4b23-ad93-6dceaa5429ac/",
"https://app.any.run/tasks/84fc9b4a-ea2b-47b1-8aa6-9014402dfb56/",
+ "https://app.any.run/tasks/e13ab713-64cf-4b23-ad93-6dceaa5429ac/",
"https://app.any.run/tasks/97f875e8-0e08-4328-815f-055e971ba754/",
+ "https://app.any.run/tasks/81f3c28c-c686-425d-8a2b-a98198d244e1/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_emotet.yml"
],
"tags": [
@@ -56297,9 +56557,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
"https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
+ "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_net_recon.yml"
],
"tags": [
@@ -56392,9 +56652,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
"https://www.intrinsec.com/apt27-analysis/",
+ "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_snapins_hafnium.yml"
],
"tags": [
@@ -56470,8 +56730,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/HiwinCN/HTran",
"https://github.com/cw1997/NATBypass",
+ "https://github.com/HiwinCN/HTran",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_htran.yml"
],
"tags": [
@@ -56505,8 +56765,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/9e5b12c4912c07562aec7500447b11fa3e17e254/atomics/T1529/T1529.md",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdown",
+ "https://github.com/redcanaryco/atomic-red-team/blob/9e5b12c4912c07562aec7500447b11fa3e17e254/atomics/T1529/T1529.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_logoff.yml"
],
"tags": [
@@ -56539,8 +56799,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/",
"https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5",
+ "https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/",
"https://lolbas-project.github.io/lolbas/Binaries/Verclsid/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_verclsid_runs_com.yml"
],
@@ -56717,9 +56977,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://app.any.run/tasks/8b9a571b-bcc1-4783-ba32-df4ba623b9c0/",
"https://www.joesandbox.com/analysis/411752/0/html#7048BB9A06B8F2DD9D24C77F389D7B2B58D2",
"https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html",
- "https://app.any.run/tasks/8b9a571b-bcc1-4783-ba32-df4ba623b9c0/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_mal_darkside_ransomware.yml"
],
"tags": [
@@ -56863,8 +57123,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf",
"https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)",
+ "https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_netsh_fw_add.yml"
],
"tags": [
@@ -56931,8 +57191,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/GelosSnake/status/934900723426439170",
"https://asec.ahnlab.com/en/39828/",
+ "https://twitter.com/GelosSnake/status/934900723426439170",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_system_exe_anomaly.yml"
],
"tags": [
@@ -56989,10 +57249,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
- "https://twitter.com/Cyb3rWard0g/status/1453123054243024897",
"https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/",
"https://github.com/antonioCoco/RogueWinRM",
+ "https://twitter.com/Cyb3rWard0g/status/1453123054243024897",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_child_process_as_system_.yml"
],
"tags": [
@@ -57025,11 +57285,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b",
- "https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/",
- "https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/",
- "https://www.joesandbox.com/analysis/443736/0/html",
"https://community.sophos.com/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers",
+ "https://www.joesandbox.com/analysis/443736/0/html",
+ "https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/",
+ "https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b",
+ "https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_revil_kaseya.yml"
],
"tags": [
@@ -57087,8 +57347,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
"https://www.cobaltstrike.com/help-windows-executable",
+ "https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
"https://redcanary.com/threat-detection-report/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cobaltstrike_load_by_rundll32.yml"
],
@@ -57201,9 +57461,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.picussecurity.com/resource/blog/how-to-detect-parent-pid-ppid-spoofing-attacks",
"https://www.ired.team/offensive-security/defense-evasion/parent-process-id-ppid-spoofing",
"https://pentestlab.blog/2020/02/24/parent-pid-spoofing/",
- "https://www.picussecurity.com/resource/blog/how-to-detect-parent-pid-ppid-spoofing-attacks",
"https://www.virustotal.com/gui/search/filename%253A*spoof*%2520filename%253A*ppid*/files",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_selectmyparent.yml"
],
@@ -57237,10 +57497,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/splinter_code/status/1483815103279603714",
"https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/",
- "https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
"https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
+ "https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
+ "https://twitter.com/splinter_code/status/1483815103279603714",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_advancedrun_priv_user.yml"
],
"tags": "No established tags"
@@ -57261,9 +57521,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Dnscmd/",
"https://docs.microsoft.com/en-us/azure/dns/dns-zones-records",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd",
+ "https://lolbas-project.github.io/lolbas/Binaries/Dnscmd/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_dnscmd_discovery.yml"
],
"tags": [
@@ -57364,8 +57624,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-20---powershell-invoke-known-malicious-cmdlets",
"https://unit42.paloaltonetworks.com/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-20---powershell-invoke-known-malicious-cmdlets",
"https://mikefrobbins.com/2017/06/15/simple-obfuscation-with-powershell-using-base64-encoding/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_powershell_encode.yml"
],
@@ -57432,8 +57692,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
"https://lolbas-project.github.io/lolbas/Binaries/Atbroker/",
+ "http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_atbroker.yml"
],
"tags": [
@@ -57501,9 +57761,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/fireeye/DueDLLigence",
"https://www.fireeye.com/blog/threat-research/2019/10/staying-hidden-on-the-endpoint-evading-detection-with-shellcode.html",
"https://lolbas-project.github.io/lolbas/Binaries/Rasautou/",
- "https://github.com/fireeye/DueDLLigence",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_rasautou_dll_execution.yml"
],
"tags": [
@@ -57622,8 +57882,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/",
"https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/",
+ "https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_iss_module_install.yml"
],
"tags": [
@@ -57647,9 +57907,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control",
- "https://cybercryptosec.medium.com/covid-19-cyber-infection-c615ead7c29",
"https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware/",
+ "https://cybercryptosec.medium.com/covid-19-cyber-infection-c615ead7c29",
+ "https://learn.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_conhost_option.yml"
],
"tags": [
@@ -57933,10 +58193,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/defaultnamehere/cookie_crimes/",
- "https://embracethered.com/blog/posts/2020/cookie-crimes-on-mirosoft-edge/",
- "https://embracethered.com/blog/posts/2020/chrome-spy-remote-control/",
"https://mango.pdf.zone/stealing-chrome-cookies-without-a-password",
+ "https://embracethered.com/blog/posts/2020/chrome-spy-remote-control/",
+ "https://embracethered.com/blog/posts/2020/cookie-crimes-on-mirosoft-edge/",
+ "https://github.com/defaultnamehere/cookie_crimes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_chromium_headless_debugging.yml"
],
"tags": [
@@ -58048,8 +58308,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://pentestlab.blog/2017/03/30/weak-service-permissions/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_using_sc_to_change_sevice_image_path_by_non_admin.yml"
],
"tags": [
@@ -58075,8 +58335,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://paste.cryptolaemus.com/emotet/2020/12/22/emotet-malware-IoCs_12-22-20.html",
"https://cyber.wtf/2021/11/15/guess-whos-back/",
+ "https://paste.cryptolaemus.com/emotet/2020/12/22/emotet-malware-IoCs_12-22-20.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_emotet_rundll32_execution.yml"
],
"tags": [
@@ -58133,8 +58393,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://threathunterplaybook.com/evals/apt29/detections/3.B.2_C36B49B5-DF58-4A34-9FE9-56189B9DEFEA.html",
"https://github.com/OTRF/detection-hackathon-apt29/issues/6",
+ "https://threathunterplaybook.com/evals/apt29/detections/3.B.2_C36B49B5-DF58-4A34-9FE9-56189B9DEFEA.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sdclt_child_process.yml"
],
"tags": [
@@ -58191,8 +58451,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.joesandbox.com/analysis/476188/1/iochtml",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444",
+ "https://www.joesandbox.com/analysis/476188/1/iochtml",
"https://twitter.com/neonprimetime/status/1435584010202255375",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_control_cve_2021_40444.yml"
],
@@ -58261,8 +58521,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://unit42.paloaltonetworks.com/unit-42-title-gamaredon-group-toolset-evolution",
"https://www.ria.ee/sites/default/files/content-editors/kuberturve/tale_of_gamaredon_infection.pdf",
+ "https://unit42.paloaltonetworks.com/unit-42-title-gamaredon-group-toolset-evolution",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_gamaredon_ultravnc.yml"
],
"tags": [
@@ -58287,9 +58547,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-fe98e74189873d6df72a15df2eaa0315c59ba9cdaca93ecd68afc4ea09194ef2",
"https://lolbas-project.github.io/lolbas/Binaries/Certoc/",
"https://twitter.com/sblmsrsn/status/1445758411803480072?s=20",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-fe98e74189873d6df72a15df2eaa0315c59ba9cdaca93ecd68afc4ea09194ef2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_certoc_execution.yml"
],
"tags": [
@@ -58356,8 +58616,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Ie4uinit/",
"https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/",
+ "https://lolbas-project.github.io/lolbas/Binaries/Ie4uinit/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_ie4uinit.yml"
],
"tags": [
@@ -58390,8 +58650,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100",
+ "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sysmon_uac_bypass_eventvwr.yml"
],
"tags": [
@@ -58652,8 +58912,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
"https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/network-provider-settings-removed-in-place-upgrade",
+ "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_new_network_provider.yml"
],
"tags": [
@@ -58686,8 +58946,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://hausec.com/2021/07/26/cobalt-strike-and-tradecraft/",
+ "https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cobaltstrike_process_patterns.yml"
],
"tags": [
@@ -58864,10 +59124,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
- "https://github.com/ThreatHuntingProject/ThreatHunting/blob/cb22598bb70651f88e0285abc8d835757d2cb596/hunts/suspicious_process_creation_via_windows_event_logs.md",
"https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses",
+ "https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/",
"https://github.com/mbevilacqua/appcompatprocessor/blob/6c847937c5a836e2ce2fe2b915f213c345a3c389/AppCompatSearch.txt",
+ "https://github.com/ThreatHuntingProject/ThreatHunting/blob/cb22598bb70651f88e0285abc8d835757d2cb596/hunts/suspicious_process_creation_via_windows_event_logs.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_execution_path.yml"
],
"tags": [
@@ -58891,8 +59151,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-to-knock-them-down/",
"https://www.fortinet.com/content/dam/fortinet/assets/analyst-reports/ar-qakbot.pdf",
+ "https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-to-knock-them-down/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msra_process_injection.yml"
],
"tags": [
@@ -59066,8 +59326,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://securelist.com/apt-slingshot/84312/",
"https://twitter.com/cyb3rops/status/972186477512839170",
+ "https://securelist.com/apt-slingshot/84312/",
"https://github.com/adamcaudill/EquationGroupLeak/search?utf8=%E2%9C%93&q=dll_u&type=",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_equationgroup_dll_u_load.yml"
],
@@ -59102,9 +59362,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/",
"https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/",
"http://www.xuetr.com/",
+ "https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_pchunter.yml"
],
"tags": "No established tags"
@@ -59126,13 +59386,13 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://cybleinc.com/2021/02/15/ngrok-platform-abused-by-hackers-to-deliver-a-new-wave-of-phishing-attacks/",
- "https://www.virustotal.com/gui/file/58d21840d915aaf4040ceb89522396124c82f325282f805d1085527e1e2ccfa1/detection",
- "https://twitter.com/xorJosh/status/1598646907802451969",
- "https://www.softwaretestinghelp.com/how-to-use-ngrok/",
"https://ngrok.com/docs",
- "https://stackoverflow.com/questions/42442320/ssh-tunnel-to-ngrok-and-initiate-rdp",
"https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html",
+ "https://twitter.com/xorJosh/status/1598646907802451969",
+ "https://www.virustotal.com/gui/file/58d21840d915aaf4040ceb89522396124c82f325282f805d1085527e1e2ccfa1/detection",
+ "https://stackoverflow.com/questions/42442320/ssh-tunnel-to-ngrok-and-initiate-rdp",
+ "https://www.softwaretestinghelp.com/how-to-use-ngrok/",
+ "https://cybleinc.com/2021/02/15/ngrok-platform-abused-by-hackers-to-deliver-a-new-wave-of-phishing-attacks/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ngrok_pua.yml"
],
"tags": [
@@ -59212,10 +59472,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/",
- "https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
+ "https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_fsharp_interpreters.yml"
],
"tags": [
@@ -59299,9 +59559,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/pabraeken/status/995837734379032576",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msdeploy/",
"https://twitter.com/pabraeken/status/999090532839313408",
+ "https://twitter.com/pabraeken/status/995837734379032576",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msdeploy.yml"
],
"tags": [
@@ -59334,8 +59594,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/",
+ "https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_teams_suspicious_command_line_cred_access.yml"
],
"tags": [
@@ -59451,9 +59711,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340",
"https://twitter.com/bohops/status/1477717351017680899?s=12",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/AccCheckConsole/",
+ "https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml"
],
"tags": [
@@ -59571,10 +59831,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment?slide=43",
- "https://github.com/carlospolop/PEASS-ng/blob/fa0f2e17fbc1d86f1fd66338a40e665e7182501d/winPEAS/winPEASbat/winPEAS.bat",
- "https://www.youtube.com/watch?v=JGs-aKf2OtU&ab_channel=OFFZONEMOSCOW",
"https://github.com/gladiatx0r/Powerless/blob/04f553bbc0c65baf4e57344deff84e3f016e6b51/Powerless.bat",
+ "https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment?slide=43",
+ "https://www.youtube.com/watch?v=JGs-aKf2OtU&ab_channel=OFFZONEMOSCOW",
+ "https://github.com/carlospolop/PEASS-ng/blob/fa0f2e17fbc1d86f1fd66338a40e665e7182501d/winPEAS/winPEASbat/winPEAS.bat",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_accesschk_usage_after_priv_escalation.yml"
],
"tags": [
@@ -59675,9 +59935,9 @@
"logsource.product": "windows",
"refs": [
"https://blog.sygnia.co/kaseya-ransomware-supply-chain-attack",
+ "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
"https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf",
"https://www.acronis.com/en-us/blog/posts/lockbit-ransomware/",
- "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ping_del.yml"
],
"tags": [
@@ -59962,8 +60222,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bopin2020/status/1366400799199272960",
"https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/",
+ "https://twitter.com/bopin2020/status/1366400799199272960",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml"
],
"tags": [
@@ -60088,9 +60348,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/GhostPack/Rubeus",
- "https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/",
"https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html",
+ "https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/",
+ "https://github.com/GhostPack/Rubeus",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_rubeus.yml"
],
"tags": [
@@ -60126,8 +60386,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/2e0647b7-eb86-4f72-904b-d2d0ecac07d1/",
"https://twitter.com/killamjr/status/1179034907932315648",
+ "https://app.any.run/tasks/2e0647b7-eb86-4f72-904b-d2d0ecac07d1/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_qbot.yml"
],
"tags": [
@@ -60202,11 +60462,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/4d2e7fc1-af0b-4915-89aa-03d25ba7805e.html",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1007/T1007.md#atomic-test-2---system-service-discovery---netexe",
- "https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/",
- "https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html",
"https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html",
+ "https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1007/T1007.md#atomic-test-2---system-service-discovery---netexe",
+ "https://eqllib.readthedocs.io/en/latest/analytics/4d2e7fc1-af0b-4915-89aa-03d25ba7805e.html",
+ "https://eqllib.readthedocs.io/en/latest/analytics/e61f557c-a9d0-4c25-ab5b-bbc46bb24deb.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_net_execution.yml"
],
"tags": [
@@ -60377,8 +60637,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://nsudo.m2team.org/en-us/",
"https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/",
+ "https://nsudo.m2team.org/en-us/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_tool_nsudo_execution.yml"
],
"tags": [
@@ -60446,9 +60706,9 @@
"logsource.product": "windows",
"refs": [
"https://gist.githubusercontent.com/bohops/0cc6586f205f3691e04a1ebf1806aabd/raw/baf7b29891bb91e76198e30889fbf7d6642e8974/calc_exe.inf",
- "https://twitter.com/Z3Jpa29z/status/1313742350292746241?s=20",
- "https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf",
"https://lolbas-project.github.io/lolbas/Libraries/Setupapi/",
+ "https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf",
+ "https://twitter.com/Z3Jpa29z/status/1313742350292746241?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_rundll32_setupapi_installhinfsection.yml"
],
"tags": [
@@ -60641,8 +60901,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/",
"https://github.com/Neo23x0/Raccine/blob/20a569fa21625086433dcce8bb2765d0ea08dcb6/yara/mal_revil.yar",
+ "https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_base64_load.yml"
],
"tags": [
@@ -60854,8 +61114,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/",
"https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html",
+ "https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_regsvr32_anomalies.yml"
],
"tags": [
@@ -60890,9 +61150,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
- "https://twitter.com/MichalKoczwara/status/1553634816016498688",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-8---windows---disable-the-sr-scheduled-task",
+ "https://twitter.com/MichalKoczwara/status/1553634816016498688",
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_schtasks_disable.yml"
],
"tags": [
@@ -60992,8 +61252,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_st0pp3r_/status/1560072680887525378",
"https://twitter.com/Oddvarmoe/status/993383596244258816",
+ "https://twitter.com/_st0pp3r_/status/1560072680887525378",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml"
],
"tags": [
@@ -61127,8 +61387,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222088214581825540",
+ "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222095371175911424",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_dctask64_proc_inject.yml"
],
@@ -61262,9 +61522,9 @@
"logsource.product": "windows",
"refs": [
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/VisualUiaVerifyNative/",
- "https://bohops.com/2020/10/15/exploring-the-wdac-microsoft-recommended-block-rules-visualuiaverifynative/",
- "https://github.com/MicrosoftDocs/windows-itpro-docs/commit/937db704b9148e9cee7c7010cad4d00ce9c4fdad",
"https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules",
+ "https://github.com/MicrosoftDocs/windows-itpro-docs/commit/937db704b9148e9cee7c7010cad4d00ce9c4fdad",
+ "https://bohops.com/2020/10/15/exploring-the-wdac-microsoft-recommended-block-rules-visualuiaverifynative/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_visualuiaverifynative.yml"
],
"tags": [
@@ -61330,8 +61590,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://redcanary.com/blog/raspberry-robin/",
+ "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_rundll32_parent_explorer.yml"
],
"tags": [
@@ -61431,9 +61691,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md",
"https://github.com/swagkarna/Defeat-Defender-V1.2.0",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh750728(v=ws.11)",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.001/T1222.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_file_permission_modifications.yml"
],
"tags": [
@@ -61526,9 +61786,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html",
"https://lolbas-project.github.io/lolbas/Binaries/Cmstp/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.003/T1218.003.md",
+ "https://eqllib.readthedocs.io/en/latest/analytics/e584f1a1-c303-4885-8a66-21360c90995b.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_cmstp.yml"
],
"tags": [
@@ -61571,9 +61831,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://twitter.com/AdamTheAnalyst/status/1483497517119590403",
"https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_defender_base64.yml"
],
"tags": [
@@ -61597,8 +61857,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://jpcertcc.github.io/ToolAnalysisResultSheet",
+ "https://www.jpcert.or.jp/english/pub/sr/ir_research.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_tool_psexec.yml"
],
"tags": [
@@ -61831,8 +62091,8 @@
"logsource.product": "windows",
"refs": [
"https://medium.com/falconforce/falconfriday-detecting-uac-bypasses-0xff16-86c2a9107abf",
- "https://github.com/hfiref0x/UACME",
"https://lolbas-project.github.io/lolbas/Binaries/Wsreset/",
+ "https://github.com/hfiref0x/UACME",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_uac_bypass_wsreset_integrity_level.yml"
],
"tags": [
@@ -62300,8 +62560,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redcanary.com/threat-detection-report/threats/qbot/",
"https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/",
+ "https://redcanary.com/threat-detection-report/threats/qbot/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_reg_defender_exclusion.yml"
],
"tags": [
@@ -62325,8 +62585,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html",
"https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign-v1.pdf",
+ "https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sticky_keys_unauthenticated_privileged_cmd_access.yml"
],
"tags": [
@@ -62350,8 +62610,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/",
"https://app.any.run/tasks/33d37fdf-158d-4930-aa68-813e1d5eb8ba/",
+ "https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_evilnum_jul20.yml"
],
"tags": [
@@ -62588,10 +62848,10 @@
"logsource.product": "windows",
"refs": [
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.001/T1070.001.md",
- "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil",
- "https://jdhnet.wordpress.com/2017/12/19/changing-the-location-of-the-windows-event-logs/",
- "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
"https://gist.github.com/fovtran/ac0624983c7722e80a8f5a4babb170ee",
+ "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil",
+ "https://eqllib.readthedocs.io/en/latest/analytics/5b223758-07d6-4100-9e11-238cfdd0fe97.html",
+ "https://jdhnet.wordpress.com/2017/12/19/changing-the-location-of-the-windows-event-logs/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_eventlog_clear.yml"
],
"tags": [
@@ -62906,8 +63166,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.bluetangle.dev/2022/08/fastening-seatbelt-on-threat-hunting.html",
"https://github.com/GhostPack/Seatbelt",
+ "https://www.bluetangle.dev/2022/08/fastening-seatbelt-on-threat-hunting.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_pua_seatbelt.yml"
],
"tags": [
@@ -63076,9 +63336,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
- "https://app.any.run/tasks/c4117d9a-f463-461a-b90f-4cd258746798/",
"https://app.any.run/tasks/f420d295-0457-4e9b-9b9e-6732be227583/",
+ "https://app.any.run/tasks/c4117d9a-f463-461a-b90f-4cd258746798/",
+ "https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/",
"https://twitter.com/nao_sec/status/1530196847679401984",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sdiagnhost_susp_child.yml"
],
@@ -63289,10 +63549,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/splinter_code/status/1483815103279603714",
"https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/",
- "https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
"https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/",
+ "https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3",
+ "https://twitter.com/splinter_code/status/1483815103279603714",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_advancedrun.yml"
],
"tags": "No established tags"
@@ -63313,8 +63573,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md",
"https://web.archive.org/web/20180331144337/https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_new_service_creation.yml"
],
"tags": [
@@ -63372,8 +63632,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=66",
"https://2019.offzone.moscow/ru/report/hunting-for-powershell-abuses/",
+ "https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=66",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_powershell_cmdline_reversed_strings.yml"
],
"tags": [
@@ -63408,8 +63668,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/1cf4dd51f83dcb0ebe6ade902d6157ad2dbc6ac8/atomics/T1218.001/T1218.001.md",
"https://www.splunk.com/en_us/blog/security/follina-for-protocol-handlers.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/1cf4dd51f83dcb0ebe6ade902d6157ad2dbc6ac8/atomics/T1218.001/T1218.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hh_chm_http.yml"
],
"tags": [
@@ -63442,8 +63702,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti_7zip.yml"
],
"tags": [
@@ -63642,8 +63902,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/shantanu561993/SharpChisel",
"https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-an-iranian-state-sponsored-threat-actor/",
+ "https://github.com/shantanu561993/SharpChisel",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_sharp_chisel_usage.yml"
],
"tags": [
@@ -63703,10 +63963,10 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/mattifestation/status/1326228491302563846",
- "https://docs.microsoft.com/en-us/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script",
- "http://blog.sevagas.com/?Hacking-around-HTA-files",
- "https://0x00sec.org/t/clientside-exploitation-in-2018-how-pentesting-has-changed/7356",
"https://medium.com/tsscyber/pentesting-and-hta-bypassing-powershell-constrained-language-mode-53a42856c997",
+ "http://blog.sevagas.com/?Hacking-around-HTA-files",
+ "https://docs.microsoft.com/en-us/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script",
+ "https://0x00sec.org/t/clientside-exploitation-in-2018-how-pentesting-has-changed/7356",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_mshta_execution.yml"
],
"tags": [
@@ -63894,8 +64154,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/harr0ey/status/991670870384021504",
"https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OSBinaries/Openwith.yml",
+ "https://twitter.com/harr0ey/status/991670870384021504",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_openwith.yml"
],
"tags": [
@@ -63928,9 +64188,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://redacted.com/blog/bianlian-ransomware-gang-gives-it-a-go/",
"https://www.trellix.com/en-sg/about/newsroom/stories/threat-labs/lockergoga-ransomware-family-used-in-targeted-attacks.html",
"https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/",
+ "https://redacted.com/blog/bianlian-ransomware-gang-gives-it-a-go/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_net_default_accounts_manipulation.yml"
],
"tags": [
@@ -63963,8 +64223,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.015/T1546.015.md",
"https://nasbench.medium.com/a-deep-dive-into-rundll32-exe-642344b41e90",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.015/T1546.015.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_rundll32_registered_com_objects.yml"
],
"tags": [
@@ -64388,8 +64648,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.001/T1218.001.md",
"https://eqllib.readthedocs.io/en/latest/analytics/b25aa548-7937-11e9-8f5c-d46d6d62a49e.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.001/T1218.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hh_chm.yml"
],
"tags": [
@@ -64472,8 +64732,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md",
+ "https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_service_modification.yml"
],
"tags": [
@@ -64497,8 +64757,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit",
"https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d",
+ "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_secedit.yml"
],
"tags": [
@@ -64672,9 +64932,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://community.spiceworks.com/topic/2195015-batch-script-to-uninstall-symantec-endpoint-protection",
- "https://www.exploit-db.com/exploits/37525",
"https://community.broadcom.com/symantecenterprise/communities/community-home/digestviewer/viewthread?MessageKey=6ce94b67-74e1-4333-b16f-000b7fd874f0&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=digestviewer",
+ "https://www.exploit-db.com/exploits/37525",
+ "https://community.spiceworks.com/topic/2195015-batch-script-to-uninstall-symantec-endpoint-protection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_taskkill_sep.yml"
],
"tags": [
@@ -64696,8 +64956,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/malwrhunterteam/status/1372536434125512712/photo/2",
"https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set",
+ "https://twitter.com/malwrhunterteam/status/1372536434125512712/photo/2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_bcdedit.yml"
],
"tags": [
@@ -64911,10 +65171,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
- "https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions",
"https://twitter.com/cglyer/status/1355171195654709249",
"https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/",
+ "https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions",
+ "https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_wmic_security_product_uninstall.yml"
],
"tags": [
@@ -65011,11 +65271,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/DataSvcUtil/",
- "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/how-to-add-a-data-service-reference-wcf-data-services",
- "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/generating-the-data-service-client-library-wcf-data-services",
"https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe",
+ "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/generating-the-data-service-client-library-wcf-data-services",
+ "https://lolbas-project.github.io/lolbas/Binaries/DataSvcUtil/",
"https://gist.github.com/teixeira0xfffff/837e5bfed0d1b0a29a7cb1e5dbdd9ca6",
+ "https://docs.microsoft.com/en-us/dotnet/framework/data/wcf/how-to-add-a-data-service-reference-wcf-data-services",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_data_exfiltration_by_using_datasvcutil.yml"
],
"tags": [
@@ -65153,8 +65413,8 @@
"logsource.product": "windows",
"refs": [
"https://lolbas-project.github.io/lolbas/Binaries/Psr/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560.001/T1560.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psr_capture_screenshots.yml"
],
"tags": [
@@ -65201,11 +65461,11 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/",
"https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/",
"https://eqllib.readthedocs.io/en/latest/analytics/03e231a6-74bc-467a-acb1-e5676b0fb55e.html",
- "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1482/T1482.md",
- "https://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/",
+ "https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_trust_discovery.yml"
],
"tags": [
@@ -65289,8 +65549,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)",
+ "https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_apt_gallium_sha1.yml"
],
"tags": [
@@ -65376,9 +65636,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.poweradmin.com/paexec/",
"https://docs.microsoft.com/en-us/sysinternals/downloads/psexec",
"https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html",
+ "https://www.poweradmin.com/paexec/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_psexex_paexec_flags.yml"
],
"tags": [
@@ -65411,8 +65671,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/e1fe6a62-bce8-4323-a49a-63795d9afd5d/",
"https://twitter.com/1ZRR4H/status/1534259727059787783",
+ "https://app.any.run/tasks/e1fe6a62-bce8-4323-a49a-63795d9afd5d/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_archiver_iso_phishing.yml"
],
"tags": [
@@ -65436,8 +65696,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/",
"https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/",
+ "https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/",
"https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_cobaltstrike_bloopers_cmd.yml"
],
@@ -65572,10 +65832,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/",
"https://app.any.run/tasks/388d5802-aa48-4826-b069-250420504758/",
- "https://app.any.run/tasks/8e22486b-5edc-4cef-821c-373e945f296c/",
+ "https://app.any.run/tasks/62bb01ae-25a4-4180-b278-8e464a90b8d7/",
"https://inquest.net/blog/2018/06/22/a-look-at-formbook-stealer",
+ "https://app.any.run/tasks/8e22486b-5edc-4cef-821c-373e945f296c/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_formbook.yml"
],
"tags": [
@@ -65609,8 +65869,8 @@
"logsource.product": "windows",
"refs": [
"http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html",
- "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
"https://www.ired.team/offensive-security/lateral-movement/t1076-rdp-hijacking-for-lateral-movement",
+ "https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_tscon_localsystem.yml"
],
"tags": [
@@ -65676,8 +65936,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/_st0pp3r_/status/1583914244344799235",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec",
+ "https://twitter.com/_st0pp3r_/status/1583914244344799235",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218.007/T1218.007.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msiexec_install_quiet.yml"
],
@@ -65770,8 +66030,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://o365blog.com/aadinternals/",
"https://github.com/Gerenios/AADInternals",
+ "https://o365blog.com/aadinternals/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_aadinternals_cmdlets_execution.yml"
],
"tags": [
@@ -65798,9 +66058,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=41",
"https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=42",
- "https://learn.microsoft.com/en-us/dotnet/api/microsoft.hpc.scheduler.store.cx509enrollmentwebclassfactoryclass?view=hpc-sdk-5.1.6115",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_x509enrollment.yml"
],
"tags": "No established tags"
@@ -65886,7 +66146,7 @@
"value": "Rundll32 UNC Path Execution"
},
{
- "description": "Detects non-interactive PowerShell activity by looking at powershell.exe with not explorer.exe as a parent.",
+ "description": "Detects non-interactive PowerShell activity by looking at powershell.exe with a non user process such as \"explorer.exe\" as a parent.",
"meta": {
"author": "Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements)",
"creation_date": "2019/09/12",
@@ -65916,7 +66176,7 @@
}
],
"uuid": "f4bbd493-b796-416e-bbf2-121235348529",
- "value": "Non Interactive PowerShell"
+ "value": "Non Interactive PowerShell Process Spawned"
},
{
"description": "Detects execution of renamed paexec via imphash and executable product string",
@@ -66019,8 +66279,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222088214581825540",
+ "https://twitter.com/gN3mes1s/status/1222095963789111296",
"https://twitter.com/gN3mes1s/status/1222095371175911424",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_renamed_dctask64.yml"
],
@@ -66071,8 +66331,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Remote/",
"https://blog.thecybersecuritytutor.com/Exeuction-AWL-Bypass-Remote-exe-LOLBin/",
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Remote/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml"
],
"tags": [
@@ -66185,8 +66445,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_wmic_reconnaissance.yml"
],
"tags": [
@@ -66219,8 +66479,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Ilasm/",
"https://www.echotrail.io/insights/search/ilasm.exe",
+ "https://lolbas-project.github.io/lolbas/Binaries/Ilasm/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_ilasm.yml"
],
"tags": [
@@ -66437,9 +66697,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://bidouillesecurity.com/disable-windows-defender-in-powershell/",
"https://github.com/gordonbay/Windows-On-Reins/blob/e587ac7a0407847865926d575e3c46f68cf7c68d/wor.ps1",
"https://vms.drweb.fr/virus/?i=24144899",
- "https://bidouillesecurity.com/disable-windows-defender-in-powershell/",
"https://twitter.com/JohnLaTwC/status/1415295021041979392",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_reg_disable_sec_services.yml"
],
@@ -66464,8 +66724,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/certutil",
"https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/certutil",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_certutil_encode.yml"
],
"tags": [
@@ -66724,8 +66984,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1119/T1119.md",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_automated_collection.yml"
],
"tags": [
@@ -66784,8 +67044,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdown",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdown",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_shutdown.yml"
],
"tags": [
@@ -66892,9 +67152,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Te/",
"https://twitter.com/pabraeken/status/993298228840992768",
"https://docs.microsoft.com/en-us/windows-hardware/drivers/taef/",
- "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Te/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_use_of_te_bin.yml"
],
"tags": [
@@ -66947,8 +67207,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/chcp",
"https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware/",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/chcp",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_codepage_lookup.yml"
],
"tags": [
@@ -67065,10 +67325,10 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/bohops/status/1276357235954909188?s=12",
- "https://twitter.com/nas_bench/status/1535322450858233858",
- "https://securityboulevard.com/2019/09/deobfuscating-ostap-trickbots-34000-line-javascript-downloader/",
"https://twitter.com/CyberRaiju/status/1273597319322058752",
+ "https://securityboulevard.com/2019/09/deobfuscating-ostap-trickbots-34000-line-javascript-downloader/",
+ "https://twitter.com/nas_bench/status/1535322450858233858",
+ "https://twitter.com/bohops/status/1276357235954909188?s=12",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_explorer_break_proctree.yml"
],
"tags": [
@@ -67092,9 +67352,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/",
"https://twitter.com/lefterispan/status/1286259016436514816",
- "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml"
],
@@ -67262,8 +67522,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://pentestlab.blog/2020/07/06/indirect-command-execution/",
"https://lolbas-project.github.io/lolbas/Binaries/Forfiles/",
+ "https://pentestlab.blog/2020/07/06/indirect-command-execution/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_forfiles.yml"
],
"tags": [
@@ -67354,13 +67614,13 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/rapid7/metasploit-framework/blob/d297adcebb5c1df6fe30b12ca79b161deb71571c/data/post/powershell/NTDSgrab.ps1",
"https://github.com/zcgonvh/NTDSDumpEx",
- "https://pentestlab.blog/tag/ntds-dit/",
- "https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1",
+ "https://github.com/rapid7/metasploit-framework/blob/d297adcebb5c1df6fe30b12ca79b161deb71571c/data/post/powershell/NTDSgrab.ps1",
"https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1",
+ "https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Gather/Copy-VSS.ps1",
"https://www.n00py.io/2022/03/manipulating-user-passwords-without-mimikatz/",
"https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration",
+ "https://pentestlab.blog/tag/ntds-dit/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_ntds.yml"
],
"tags": [
@@ -67393,9 +67653,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/sql/tools/sqlcmd-utility?view=sql-server-ver15",
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
+ "https://docs.microsoft.com/en-us/sql/tools/sqlcmd-utility?view=sql-server-ver15",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_conti_sqlcmd.yml"
],
"tags": [
@@ -67428,12 +67688,12 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/rundll32",
- "https://www.cobaltstrike.com/help-opsec",
"https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regsvr32",
- "https://docs.microsoft.com/en-us/dotnet/framework/tools/regsvcs-exe-net-services-installation-tool#feedback",
"https://twitter.com/CyberRaiju/status/1251492025678983169",
+ "https://www.cobaltstrike.com/help-opsec",
+ "https://docs.microsoft.com/en-us/dotnet/framework/tools/regsvcs-exe-net-services-installation-tool#feedback",
"https://docs.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/rundll32",
"https://blog.malwarebytes.com/malwarebytes-news/2020/10/kraken-attack-abuses-wer-service/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_bad_opsec_sacrificial_processes.yml"
],
@@ -67501,9 +67761,9 @@
"logsource.product": "windows",
"refs": [
"https://www.infosecmatter.com/crackmapexec-module-library/?cmem=mssql-mimikatz",
+ "https://www.mandiant.com/resources/telegram-malware-iranian-espionage",
"https://www.infosecmatter.com/crackmapexec-module-library/?cmem=smb-pe_inject",
"https://mpgn.gitbook.io/crackmapexec/smb-protocol/authentication/checking-credentials-local",
- "https://www.mandiant.com/resources/telegram-malware-iranian-espionage",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_crackmapexec_flags.yml"
],
"tags": "No established tags"
@@ -67615,8 +67875,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/",
"https://securityxploded.com/",
+ "https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_hack_secutyxploded.yml"
],
"tags": [
@@ -67650,8 +67910,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments",
+ "https://thedfirreport.com/2022/09/26/bumblebee-round-two/",
"https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml"
],
@@ -67811,8 +68071,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Pcwrun/",
"https://twitter.com/pabraeken/status/991335019833708544",
+ "https://lolbas-project.github.io/lolbas/Binaries/Pcwrun/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_pcwrun.yml"
],
"tags": [
@@ -67949,9 +68209,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md",
"https://www.joeware.net/freetools/tools/adfind/",
"https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_adfind_enumeration.yml"
],
"tags": [
@@ -67997,8 +68257,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/scrcons-exe-rare-child-process.html",
"https://redcanary.com/blog/child-processes/",
+ "https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/scrcons-exe-rare-child-process.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_script_event_consumer_spawn.yml"
],
"tags": [
@@ -68158,8 +68418,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/",
"https://github.com/malcomvetter/CSExec",
+ "https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_csexec.yml"
],
"tags": [
@@ -68201,9 +68461,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
- "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
"https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f",
+ "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/regini",
+ "https://lolbas-project.github.io/lolbas/Binaries/Regini/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_regini_ads.yml"
],
"tags": [
@@ -68295,8 +68555,8 @@
"logsource.product": "windows",
"refs": [
"https://twitter.com/Alh4zr3d/status/1580925761996828672",
- "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://blog.talosintelligence.com/2021/10/threat-hunting-in-large-datasets-by.html",
+ "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_using_sc_to_hide_sevices.yml"
],
"tags": [
@@ -68322,9 +68582,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://isc.sans.edu/diary/More+Data+Exfiltration/25698",
"https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#inside-the-registry",
"https://github.com/HyperSine/how-does-MobaXterm-encrypt-password",
+ "https://isc.sans.edu/diary/More+Data+Exfiltration/25698",
"https://github.com/synacktiv/Radmin3-Password-Cracker/blob/acfc87393e4b7c06353973a14a6c7126a51f36ac/regkey.txt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_enumeration_for_credentials_cli.yml"
],
@@ -68445,8 +68705,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html",
"https://github.com/sensepost/ruler",
+ "https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_outlook.yml"
],
"tags": [
@@ -68534,20 +68794,21 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
- "https://github.com/HarmJ0y/DAMP",
- "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
- "https://adsecurity.org/?p=2921",
- "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
- "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
"https://github.com/calebstewart/CVE-2021-1675",
"https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1",
- "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
- "https://github.com/DarkCoderSc/PowerRunAsSystem/",
- "https://github.com/samratashok/nishang",
+ "https://github.com/besimorhino/powercat",
+ "https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1",
+ "https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/",
"https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1",
- "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/HarmJ0y/DAMP",
"https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1",
+ "https://github.com/DarkCoderSc/PowerRunAsSystem/",
+ "https://adsecurity.org/?p=2921",
+ "https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1",
+ "https://github.com/samratashok/nishang",
+ "https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/",
+ "https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries",
+ "https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malicious_cmdlets.yml"
],
"tags": [
@@ -68875,9 +69136,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://github.com/GossiTheDog/ThreatHunting/blob/e85884abbf05d5b41efc809ea6532b10b45bd05c/AdvancedHuntingQueries/DogWalk-DiagCab",
"https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd",
"https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-9015912909545e72ed42cbac4d1e96295e8964579c406d23fd9c47a8091576a0",
- "https://github.com/GossiTheDog/ThreatHunting/blob/e85884abbf05d5b41efc809ea6532b10b45bd05c/AdvancedHuntingQueries/DogWalk-DiagCab",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_msdt_diagcab.yml"
],
"tags": [
@@ -68910,9 +69171,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
+ "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/",
"https://twitter.com/lefterispan/status/1286259016436514816",
- "https://twitter.com/jseerden/status/1247985304667066373/photo/1",
"https://docs.microsoft.com/en-us/mem/intune/apps/intune-management-extension",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml"
],
@@ -69117,9 +69378,9 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://www.bleepingcomputer.com/startups/RpcSs.exe-14544.html",
"https://twitter.com/cyb3rops/status/1514217991034097664",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809",
+ "https://www.bleepingcomputer.com/startups/RpcSs.exe-14544.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_rpcss_anomalies.yml"
],
"tags": [
@@ -69161,8 +69422,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/harr0ey/status/992008180904419328",
"https://lolbas-project.github.io/lolbas/OtherMSBinaries/Dxcap/",
+ "https://twitter.com/harr0ey/status/992008180904419328",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_lolbin_susp_dxcap.yml"
],
"tags": [
@@ -69263,8 +69524,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/mrd0x/status/1511489821247684615",
"https://twitter.com/mrd0x/status/1511415432888131586",
+ "https://twitter.com/mrd0x/status/1511489821247684615",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_proc_dump_susp_dumpminitool.yml"
],
"tags": [
@@ -69447,8 +69708,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://mobile.twitter.com/0gtweet/status/1564131230941122561",
"https://strontic.github.io/xcyclopedia/library/DeviceEnroller.exe-24BEF0D6B0ECED36BB41831759FDE18D.html",
+ "https://mobile.twitter.com/0gtweet/status/1564131230941122561",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_deviceenroller_evasion.yml"
],
"tags": [
@@ -69459,6 +69720,28 @@
"uuid": "e173ad47-4388-4012-ae62-bd13f71c18a8",
"value": "DLL Sideloading via DeviceEnroller.exe"
},
+ {
+ "description": "Detects potential exploitation attempt of undocumented Windows Server Pre Auth Remote Code Execution (RCE)",
+ "meta": {
+ "author": "Florian Roth, Nasreddine Bencherchali",
+ "creation_date": "2023/01/21",
+ "falsepositive": [
+ "Unknown"
+ ],
+ "filename": "proc_creation_win_susp_win_server_undocumented_rce.yml",
+ "level": "high",
+ "logsource.category": "process_creation",
+ "logsource.product": "windows",
+ "refs": [
+ "https://twitter.com/hackerfantastic/status/1616455335203438592?s=20",
+ "https://twitter.com/YanZiShuang/status/1616777483646533632?s=20&t=TQT9tUuPbQJai4v6HtsOQw",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_susp_win_server_undocumented_rce.yml"
+ ],
+ "tags": "No established tags"
+ },
+ "uuid": "6d5b8176-d87d-4402-8af4-53aee9db7b5d",
+ "value": "Potential Exploitation Attempt Of Undocumented WindowsServer RCE"
+ },
{
"description": "An adversary may use Radmin Viewer Utility to remotely control Windows device",
"meta": {
@@ -69498,8 +69781,8 @@
"logsource.category": "process_creation",
"logsource.product": "windows",
"refs": [
- "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://www.virustotal.com/gui/file/03e9b8c2e86d6db450e5eceec057d7e369ee2389b9daecaf06331a95410aa5f8/detection",
+ "https://twitter.com/vxunderground/status/1423336151860002816?s=20",
"https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation/proc_creation_win_malware_conti.yml"
],
"tags": [
@@ -69624,8 +69907,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.nextron-systems.com/?s=antivirus",
- "https://www.virustotal.com/gui/file/a4edfbd42595d5bddb442c82a02cf0aaa10893c1bf79ea08b9ce576f82749448",
"https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619",
+ "https://www.virustotal.com/gui/file/a4edfbd42595d5bddb442c82a02cf0aaa10893c1bf79ea08b9ce576f82749448",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_password_dumper.yml"
],
"tags": [
@@ -69675,9 +69958,9 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675",
"https://twitter.com/mvelazco/status/1410291741241102338",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527",
+ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_printernightmare_cve_2021_34527.yml"
],
"tags": [
@@ -69734,9 +70017,9 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.virustotal.com/gui/file/d9669f7e3eb3a9cdf6a750eeb2ba303b5ae148a43e36546896f1d1801e912466",
- "https://www.virustotal.com/gui/file/8f8daabe1c8ceb5710949283818e16c4aa8059bf2ce345e2f2c90b8692978424",
"https://www.nextron-systems.com/?s=antivirus",
+ "https://www.virustotal.com/gui/file/8f8daabe1c8ceb5710949283818e16c4aa8059bf2ce345e2f2c90b8692978424",
+ "https://www.virustotal.com/gui/file/d9669f7e3eb3a9cdf6a750eeb2ba303b5ae148a43e36546896f1d1801e912466",
"https://www.virustotal.com/gui/file/925b0b28472d4d79b4bf92050e38cc2b8f722691c713fc28743ac38551bc3797",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_exploiting.yml"
],
@@ -69779,8 +70062,8 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/",
"https://www.nextron-systems.com/?s=antivirus",
+ "https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_hacktool.yml"
],
"tags": [
@@ -69813,16 +70096,16 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
- "https://www.nextron-systems.com/?s=antivirus",
- "https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection",
"https://www.virustotal.com/gui/file/b219f7d3c26f8bad7e175934cd5eda4ddb5e3983503e94ff07d39c0666821b7e/detection",
"https://github.com/tennc/webshell",
- "https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection",
- "https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection",
"https://www.virustotal.com/gui/file/13ae8bfbc02254b389ab052aba5e1ba169b16a399d9bc4cb7414c4a73cd7dc78/detection",
"https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection",
+ "https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection",
"https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection",
+ "https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection",
"https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection",
+ "https://www.nextron-systems.com/?s=antivirus",
+ "https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_webshell.yml"
],
"tags": [
@@ -69846,11 +70129,11 @@
"logsource.category": "antivirus",
"logsource.product": "No established product",
"refs": [
+ "https://www.virustotal.com/gui/file/20179093c59bca3acc6ce9a4281e8462f577ffd29fd7bf51cf2a70d106062045",
"https://www.virustotal.com/gui/file/69fe77dd558e281621418980040e2af89a2547d377d0f2875502005ce22bc95c",
+ "https://www.virustotal.com/gui/file/c312c05ddbd227cbb08958876df2b69d0f7c1b09e5689eb9d93c5b357f63eff7",
"https://www.nextron-systems.com/?s=antivirus",
"https://www.virustotal.com/gui/file/43b0f7872900bd234975a0877744554f4f355dc57505517abd1ef611e1ce6916",
- "https://www.virustotal.com/gui/file/c312c05ddbd227cbb08958876df2b69d0f7c1b09e5689eb9d93c5b357f63eff7",
- "https://www.virustotal.com/gui/file/20179093c59bca3acc6ce9a4281e8462f577ffd29fd7bf51cf2a70d106062045",
"https://www.virustotal.com/gui/file/554db97ea82f17eba516e6a6fdb9dc04b1d25580a1eb8cb755eeb260ad0bd61d",
"https://github.com/SigmaHQ/sigma/tree/master/rules/category/antivirus/av_ransomware.yml"
],
@@ -70006,9 +70289,9 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://okta.github.io/okta-help/en/prod/Content/Topics/Security/threat-insight/configure-threatinsight-system-log.htm",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_security_threat_detected.yml"
],
"tags": "No established tags"
@@ -70029,8 +70312,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_user_account_locked_out.yml"
],
"tags": [
@@ -70063,8 +70346,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_api_token_revoked.yml"
],
"tags": [
@@ -70087,8 +70370,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_policy_rule_modified_or_deleted.yml"
],
"tags": [
@@ -70111,8 +70394,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_unauthorized_access_to_app.yml"
],
"tags": [
@@ -70135,8 +70418,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_application_sign_on_policy_modified_or_deleted.yml"
],
"tags": [
@@ -70146,6 +70429,30 @@
"uuid": "8f668cc4-c18e-45fe-ad00-624a981cf88a",
"value": "Okta Application Sign-On Policy Modified or Deleted"
},
+ {
+ "description": "Detects when a new admin role assignment is created. Which could be a sign of privilege escalation or persistence",
+ "meta": {
+ "author": "Nikita Khalimonenkov",
+ "creation_date": "2023/01/19",
+ "falsepositive": [
+ "Legitimate creation of a new admin role assignment"
+ ],
+ "filename": "okta_admin_role_assignment_created.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "okta",
+ "refs": [
+ "https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_admin_role_assignment_created.yml"
+ ],
+ "tags": [
+ "attack.persistence"
+ ]
+ },
+ "uuid": "139bdd4b-9cd7-49ba-a2f4-744d0a8f5d8c",
+ "value": "Okta Admin Role Assignment Created"
+ },
{
"description": "Detects when an the Administrator role is assigned to an user or group.",
"meta": {
@@ -70159,8 +70466,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_admin_role_assigned_to_user_or_group.yml"
],
"tags": [
@@ -70193,8 +70500,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_application_modified_or_deleted.yml"
],
"tags": [
@@ -70217,8 +70524,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_network_zone_deactivated_or_deleted.yml"
],
"tags": [
@@ -70241,8 +70548,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_api_token_created.yml"
],
"tags": [
@@ -70265,8 +70572,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_mfa_reset_or_deactivated.yml"
],
"tags": [
@@ -70303,8 +70610,8 @@
"logsource.category": "No established category",
"logsource.product": "okta",
"refs": [
- "https://developer.okta.com/docs/reference/api/event-types/",
"https://developer.okta.com/docs/reference/api/system-log/",
+ "https://developer.okta.com/docs/reference/api/event-types/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta/okta_policy_modified_or_deleted.yml"
],
"tags": [
@@ -70487,11 +70794,11 @@
"logsource.category": "No established category",
"logsource.product": "m365",
"refs": [
- "https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/wp-m-unc2452-2021-000343-01.pdf",
- "https://o365blog.com/post/aadbackdoor/",
+ "https://www.sygnia.co/golden-saml-advisory",
"https://www.splunk.com/en_us/blog/security/a-golden-saml-journey-solarwinds-continued.html",
"https://us-cert.cisa.gov/ncas/alerts/aa21-008a",
- "https://www.sygnia.co/golden-saml-advisory",
+ "https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/wp-m-unc2452-2021-000343-01.pdf",
+ "https://o365blog.com/post/aadbackdoor/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/m365/microsoft365_new_federated_domain_added.yml"
],
"tags": [
@@ -70787,6 +71094,122 @@
"uuid": "0f2468a2-5055-4212-a368-7321198ee706",
"value": "Activity from Infrequent Country"
},
+ {
+ "description": "Detects when a user creates action secret for the organization, environment, codespaces or repository.",
+ "meta": {
+ "author": "Muhammad Faisal",
+ "creation_date": "2023/01/20",
+ "falsepositive": [
+ "This detection cloud be noisy depending on the environment. It is recommended to keep a check on the new secrets when created and validate the \"actor\"."
+ ],
+ "filename": "github_new_secret_created.yml",
+ "level": "low",
+ "logsource.category": "No established category",
+ "logsource.product": "github",
+ "refs": [
+ "https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/github/github_new_secret_created.yml"
+ ],
+ "tags": [
+ "attack.t1078",
+ "attack.t1078.004"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "f232fa7a-025c-4d43-abc7-318e81a73d65",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "f9405037-bc97-4eb7-baba-167dad399b83",
+ "value": "Github New Secret Created"
+ },
+ {
+ "description": "Detects delete action in the Github audit logs for codespaces, environment, project and repo.",
+ "meta": {
+ "author": "Muhammad Faisal",
+ "creation_date": "2023/01/19",
+ "falsepositive": [
+ "Validate the deletion activity is permitted. The \"actor\" field need to be validated."
+ ],
+ "filename": "github_delete_action_invoked.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "github",
+ "refs": [
+ "https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/github/github_delete_action_invoked.yml"
+ ],
+ "tags": [
+ "attack.impact",
+ "attack.t1213.003"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "cff94884-3b1c-4987-a70b-6d5643c621c3",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "16a71777-0b2e-4db7-9888-9d59cb75200b",
+ "value": "Github Delete Action Invoked"
+ },
+ {
+ "description": "Detects when an organization member or outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.",
+ "meta": {
+ "author": "Muhammad Faisal",
+ "creation_date": "2023/01/20",
+ "falsepositive": [
+ "Validate the actor if permitted to access the repo.",
+ "Validate the Multifactor Authentication changes."
+ ],
+ "filename": "github_outside_collaborator_detected.yml",
+ "level": "medium",
+ "logsource.category": "No established category",
+ "logsource.product": "github",
+ "refs": [
+ "https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions",
+ "https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/requiring-two-factor-authentication-in-your-organization",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/github/github_outside_collaborator_detected.yml"
+ ],
+ "tags": [
+ "attack.t1098.001",
+ "attack.t1213.003",
+ "attack.t1098.003"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "8a2f40cf-8325-47f9-96e4-b1ca4c7389bd",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "cff94884-3b1c-4987-a70b-6d5643c621c3",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ },
+ {
+ "dest-uuid": "2dbbdcd5-92cf-44c0-aea2-fe24783a6bc3",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "eaa9ac35-1730-441f-9587-25767bde99d7",
+ "value": "Github Outside Collaborator Detected"
+ },
{
"description": "Identifies when a DNS Zone is modified or deleted in Google Cloud.",
"meta": {
@@ -70897,10 +71320,10 @@
"logsource.category": "No established category",
"logsource.product": "gcp",
"refs": [
+ "https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging",
+ "https://kubernetes.io/docs/reference/access-authn-authz/rbac/",
"https://github.com/elastic/detection-rules/pull/1267",
"https://kubernetes.io/docs/reference/kubernetes-api/authorization-resources/cluster-role-v1/#ClusterRole",
- "https://kubernetes.io/docs/reference/access-authn-authz/rbac/",
- "https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging",
"https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gcp/gcp_kubernetes_rolebinding.yml"
],
@@ -70950,8 +71373,8 @@
"logsource.product": "gcp",
"refs": [
"https://kubernetes.io/docs/concepts/workloads/controllers/job/",
- "https://cloud.google.com/kubernetes-engine/docs",
"https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
+ "https://cloud.google.com/kubernetes-engine/docs",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gcp/gcp_kubernetes_cronjob.yml"
],
"tags": [
@@ -71206,8 +71629,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION_FROM_WHITELIST",
+ "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION",
"https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_application_removed.yml"
],
@@ -71313,8 +71736,8 @@
"logsource.category": "No established category",
"logsource.product": "google_workspace",
"refs": [
- "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings#ENFORCE_STRONG_AUTHENTICATION",
"https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings?hl=en#ALLOW_STRONG_AUTHENTICATION",
+ "https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings#ENFORCE_STRONG_AUTHENTICATION",
"https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/gworkspace/gworkspace_mfa_disabled.yml"
],
@@ -71418,12 +71841,12 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://github.com/elastic/detection-rules/pull/1145/files",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLogging.html",
+ "https://github.com/elastic/detection-rules/pull/1145/files",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketWebsite.html",
- "https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_Operations.html",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_RestoreObject.html",
+ "https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html",
"https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_s3_data_management_tampering.yml"
],
@@ -71567,8 +71990,8 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py",
"https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html",
+ "https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_ecs_task_definition_backdoor.yml"
],
"tags": [
@@ -72150,9 +72573,9 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
+ "https://github.com/Lifka/hacking-resources/blob/c2ae355d381bd0c9f0b32c4ead049f44e5b1573f/cloud-hacking-cheat-sheets.md",
"https://securitycafe.ro/2022/12/14/aws-enumeration-part-ii-practical-enumeration/",
"https://jamesonhacking.blogspot.com/2020/12/pivoting-to-private-aws-s3-buckets.html",
- "https://github.com/Lifka/hacking-resources/blob/c2ae355d381bd0c9f0b32c4ead049f44e5b1573f/cloud-hacking-cheat-sheets.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_enum_buckets.yml"
],
"tags": [
@@ -72291,8 +72714,8 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://github.com/elastic/detection-rules/pull/1213",
"https://docs.aws.amazon.com/STS/latest/APIReference/API_GetSessionToken.html",
+ "https://github.com/elastic/detection-rules/pull/1213",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_sts_getsessiontoken_misuse.yml"
],
"tags": [
@@ -72383,9 +72806,9 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://docs.aws.amazon.com/Route53/latest/APIReference/API_domains_DisableDomainTransferLock.html",
"https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml",
"https://docs.aws.amazon.com/Route53/latest/APIReference/API_Operations_Amazon_Route_53.html",
+ "https://docs.aws.amazon.com/Route53/latest/APIReference/API_domains_DisableDomainTransferLock.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_route_53_domain_transferred_lock_disabled.yml"
],
"tags": [
@@ -72523,8 +72946,8 @@
"logsource.category": "No established category",
"logsource.product": "aws",
"refs": [
- "https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html",
"https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/",
+ "https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/aws/aws_passed_role_to_glue_development_endpoint.yml"
],
"tags": [
@@ -73598,11 +74021,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_cluster_created_or_deleted.yml"
],
"tags": [
@@ -74537,11 +74960,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_secret_or_config_object_access.yml"
],
"tags": [
@@ -74599,11 +75022,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_role_access.yml"
],
"tags": [
@@ -74745,11 +75168,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_container_registry_created_or_deleted.yml"
],
"tags": [
@@ -74805,8 +75228,8 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_events_deleted.yml"
],
"tags": [
@@ -74874,10 +75297,10 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://kubernetes.io/docs/concepts/workloads/controllers/job/",
- "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
"https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/",
+ "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_cronjob.yml"
],
"tags": [
@@ -74960,11 +75383,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_rolebinding_modified_or_deleted.yml"
],
"tags": [
@@ -75525,11 +75948,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_network_policy_change.yml"
],
"tags": [
@@ -75554,11 +75977,11 @@
"logsource.category": "No established category",
"logsource.product": "azure",
"refs": [
- "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://attack.mitre.org/matrices/enterprise/cloud/",
+ "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
+ "https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/",
"https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1",
- "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure/azure_kubernetes_service_account_modified_or_deleted.yml"
],
"tags": [
@@ -75691,8 +76114,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/jhencinski/status/1102695118455349248",
"https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/",
+ "https://twitter.com/jhencinski/status/1102695118455349248",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_bitsadmin_susp_tld.yml"
],
"tags": [
@@ -75805,8 +76228,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/",
- "https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
"https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
+ "https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_exchange_owassrf_poc_exploitation.yml"
],
"tags": [
@@ -76016,8 +76439,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/",
+ "https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/",
"https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_telegram_api.yml"
],
@@ -76102,11 +76525,11 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://networkraptor.blogspot.com/2015/01/user-agent-strings.html",
- "https://perishablepress.com/blacklist/ua-2013.txt",
- "https://www.bluecoat.com/en-gb/security-blog/2015-05-05/know-your-agents",
"http://www.botopedia.org/search?searchword=scan&searchphrase=all",
+ "https://networkraptor.blogspot.com/2015/01/user-agent-strings.html",
"http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules",
+ "https://www.bluecoat.com/en-gb/security-blog/2015-05-05/know-your-agents",
+ "https://perishablepress.com/blacklist/ua-2013.txt",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_malware.yml"
],
"tags": [
@@ -76182,8 +76605,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://rclone.org/",
"https://www.kroll.com/en/insights/publications/cyber/new-m365-business-email-compromise-attacks-with-rclone",
+ "https://rclone.org/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ua_rclone.yml"
],
"tags": [
@@ -76316,8 +76739,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/craiu/status/1167358457344925696",
"https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html",
+ "https://twitter.com/craiu/status/1167358457344925696",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_ios_implant.yml"
],
"tags": [
@@ -76495,8 +76918,8 @@
"logsource.category": "proxy",
"logsource.product": "No established product",
"refs": [
- "https://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap",
"https://promos.mcafee.com/en-US/PDF/MTMW_Report.pdf",
+ "https://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap",
"https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/",
"https://www.spamhaus.org/statistics/tlds/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/proxy/proxy_download_susp_tlds_blacklist.yml"
@@ -76973,8 +77396,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://paper.seebug.org/1495/",
"https://twitter.com/wugeej/status/1369476795255320580",
+ "https://paper.seebug.org/1495/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_21978_vmware_view_planner_exploit.yml"
],
"tags": [
@@ -77070,10 +77493,10 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
- "https://mraddon.blog/2017/03/20/confluence-trick-to-create-pages-from-blueprint-templates/",
- "https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md",
"https://github.com/TesterCC/exp_poc_library/blob/master/exp_poc/CVE-2021-26084_Confluence_OGNL_injection/CVE-2021-26084.md",
+ "https://mraddon.blog/2017/03/20/confluence-trick-to-create-pages-from-blueprint-templates/",
+ "https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html",
+ "https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_26084_confluence_rce_exploit.yml"
],
"tags": [
@@ -77139,8 +77562,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/",
+ "https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_exploitation_hafnium.yml"
],
"tags": [
@@ -77173,8 +77596,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/",
"https://www.anquanke.com/post/id/226029",
+ "https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_solarwinds_supernova_webshell.yml"
],
"tags": [
@@ -77235,8 +77658,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://dmaasland.github.io/posts/citrix.html",
"https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/",
+ "https://dmaasland.github.io/posts/citrix.html",
"https://support.citrix.com/article/CTX276688",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_8193_8195_citrix_exploit.yml"
],
@@ -77327,10 +77750,10 @@
"logsource.product": "No established product",
"refs": [
"https://twitter.com/Al1ex4/status/1382981479727128580",
- "https://twitter.com/sec715/status/1373472323538362371",
- "https://github.com/murataydemir/CVE-2021-27905",
"https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/",
+ "https://github.com/murataydemir/CVE-2021-27905",
"https://mp.weixin.qq.com/s?__biz=Mzg3NDU2MTg0Ng==&mid=2247484117&idx=1&sn=2fdab8cbe4b873f8dd8abb35d935d186",
+ "https://twitter.com/sec715/status/1373472323538362371",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_27905_apache_solr_exploit.yml"
],
"tags": [
@@ -77364,9 +77787,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.yang99.top/index.php/archives/82/",
"https://github.com/vnhacker1337/CVE-2022-27925-PoC",
"https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/",
+ "https://www.yang99.top/index.php/archives/82/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_27925_exploit.yml"
],
"tags": [
@@ -77400,10 +77823,10 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/_0xf4n9x_/status/1572052954538192901",
"https://www.rapid7.com/blog/post/2022/09/20/cve-2022-36804-easily-exploitable-vulnerability-in-atlassian-bitbucket-server-and-data-center/",
- "https://blog.assetnote.io/2022/09/14/rce-in-bitbucket-server/",
"https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html",
+ "https://twitter.com/_0xf4n9x_/status/1572052954538192901",
+ "https://blog.assetnote.io/2022/09/14/rce-in-bitbucket-server/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_36804_atlassian_bitbucket_command_injection.yml"
],
"tags": [
@@ -77464,8 +77887,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/",
- "https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
"https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw",
+ "https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_owassrf_poc_exploitation.yml"
],
"tags": [
@@ -77694,10 +78117,10 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/",
+ "https://support.f5.com/csp/article/K52145254",
"https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/",
"https://twitter.com/yorickkoster/status/1279709009151434754",
- "https://support.f5.com/csp/article/K52145254",
+ "https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_5902_f5_bigip.yml"
],
"tags": [
@@ -77731,8 +78154,8 @@
"logsource.product": "No established product",
"refs": [
"https://www.vmware.com/security/advisories/VMSA-2021-0002.html",
- "https://swarm.ptsecurity.com/unauth-rce-vmware",
"https://f5.pm/go-59627.html",
+ "https://swarm.ptsecurity.com/unauth-rce-vmware",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_21972_vsphere_unauth_rce_exploit.yml"
],
"tags": [
@@ -77798,9 +78221,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf",
- "https://github.com/0xf4n9x/CVE-2022-46169",
"https://github.com/rapid7/metasploit-framework/pull/17407",
+ "https://github.com/0xf4n9x/CVE-2022-46169",
+ "https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_46169_cacti_exploitation_attempt.yml"
],
"tags": [
@@ -77834,11 +78257,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/tangxiaofeng7/apache-log4j-poc",
"https://github.com/YfryTchsGD/Log4jAttackSurface",
- "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
- "https://news.ycombinator.com/item?id=29504755",
"https://www.lunasec.io/docs/blog/log4j-zero-day/",
+ "https://news.ycombinator.com/item?id=29504755",
+ "https://github.com/tangxiaofeng7/apache-log4j-poc",
+ "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
"https://twitter.com/shutingrz/status/1469255861394866177?s=21",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_44228_log4j_fields.yml"
],
@@ -77930,10 +78353,10 @@
"logsource.product": "No established product",
"refs": [
"https://www.rapid7.com/blog/post/2021/09/02/active-exploitation-of-confluence-server-cve-2021-26084/",
- "https://twitter.com/httpvoid0x2f/status/1532924261035384832",
- "https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/",
"https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md",
"https://medium.com/geekculture/text4shell-exploit-walkthrough-ebc02a01f035",
+ "https://twitter.com/httpvoid0x2f/status/1532924261035384832",
+ "https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_java_payload_in_access_logs.yml"
],
"tags": [
@@ -78153,9 +78576,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/xmendez/wfuzz/blob/1b695ee9a87d66a7d7bf6cae70d60a33fae51541/docs/user/basicusage.rst",
- "https://github.com/lanmaster53/recon-ng/blob/9e907dfe09fce2997f0301d746796408e01a60b7/recon/core/base.py#L92",
"https://github.com/wpscanteam/wpscan/blob/196fbab5b1ce3870a43515153d4f07878a89d410/lib/wpscan/browser.rb",
+ "https://github.com/lanmaster53/recon-ng/blob/9e907dfe09fce2997f0301d746796408e01a60b7/recon/core/base.py#L92",
+ "https://github.com/xmendez/wfuzz/blob/1b695ee9a87d66a7d7bf6cae70d60a33fae51541/docs/user/basicusage.rst",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_susp_useragents.yml"
],
"tags": [
@@ -78288,9 +78711,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
+ "https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://youtu.be/5mqid-7zp8k?t=2231",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
- "https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_proxyshell.yml"
],
"tags": [
@@ -78323,9 +78746,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
+ "https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://youtu.be/5mqid-7zp8k?t=2231",
"https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html",
- "https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_exchange_proxyshell_successful.yml"
],
"tags": [
@@ -78348,8 +78771,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://community.rsa.com/community/products/netwitness/blog/2019/02/19/web-shells-and-netwitness-part-3",
"https://github.com/sensepost/reGeorg",
+ "https://community.rsa.com/community/products/netwitness/blog/2019/02/19/web-shells-and-netwitness-part-3",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_webshell_regeorg.yml"
],
"tags": [
@@ -78373,11 +78796,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/tangxiaofeng7/apache-log4j-poc",
"https://github.com/YfryTchsGD/Log4jAttackSurface",
- "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
- "https://news.ycombinator.com/item?id=29504755",
"https://www.lunasec.io/docs/blog/log4j-zero-day/",
+ "https://news.ycombinator.com/item?id=29504755",
+ "https://github.com/tangxiaofeng7/apache-log4j-poc",
+ "https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b",
"https://twitter.com/shutingrz/status/1469255861394866177?s=21",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_44228_log4j.yml"
],
@@ -78398,6 +78821,41 @@
"uuid": "5ea8faa8-db8b-45be-89b0-151b84c82702",
"value": "Log4j RCE CVE-2021-44228 Generic"
},
+ {
+ "description": "Detects potential exploitation attempts that target the Centos Web Panel 7 Unauthenticated Remote Code Execution CVE-2022-44877",
+ "meta": {
+ "author": "Nasreddine Bencherchali",
+ "creation_date": "2023/01/20",
+ "falsepositive": [
+ "Web vulnerability scanners"
+ ],
+ "filename": "web_cve_2022_44877_exploitation_attempt.yml",
+ "level": "high",
+ "logsource.category": "webserver",
+ "logsource.product": "No established product",
+ "refs": [
+ "https://www.rapid7.com/blog/post/2023/01/19/etr-exploitation-of-control-web-panel-cve-2022-44877/",
+ "https://seclists.org/fulldisclosure/2023/Jan/1",
+ "https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2022_44877_exploitation_attempt.yml"
+ ],
+ "tags": [
+ "attack.initial_access",
+ "attack.t1190",
+ "cve.2022.44877"
+ ]
+ },
+ "related": [
+ {
+ "dest-uuid": "3f886f2a-874f-4333-b794-aa6075009b1c",
+ "tags": [
+ "estimative-language:likelihood-probability=\"almost-certain\""
+ ],
+ "type": "related-to"
+ }
+ ],
+ "uuid": "1b2eeb27-949b-4704-8bfa-d8e5cfa045a1",
+ "value": "Potential Centos Web Panel Exploitation Attempt - CVE-2022-44877"
+ },
{
"description": "Detects the exploitation of the Confluence vulnerability described in CVE-2019-3398",
"meta": {
@@ -78477,8 +78935,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.tenable.com/security/research/tra-2021-13",
"https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild",
+ "https://www.tenable.com/security/research/tra-2021-13",
"https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_20090_2021_20091_arcadyan_router_exploit.yml"
],
@@ -78514,8 +78972,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/",
"https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/",
+ "https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_28188_terramaster_rce_exploit.yml"
],
"tags": [
@@ -78616,11 +79074,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://twitter.com/ptswarm/status/1445376079548624899",
- "https://nvd.nist.gov/vuln/detail/CVE-2021-41773",
"https://github.com/projectdiscovery/nuclei-templates/blob/9d2889356eebba661c8407038e430759dfd4ec31/cves/2021/CVE-2021-41773.yaml",
+ "https://twitter.com/ptswarm/status/1445376079548624899",
"https://twitter.com/h4x0r_dz/status/1445401960371429381",
"https://twitter.com/bl4sty/status/1445462677824761878",
+ "https://nvd.nist.gov/vuln/detail/CVE-2021-41773",
"https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2021_41773_apache_path_traversal.yml"
],
@@ -78654,9 +79112,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://vk9-sec.com/hfs-code-execution-cve-2014-6287/",
"https://www.exploit-db.com/exploits/39161",
"https://github.com/Twigonometry/Cybersecurity-Notes/blob/c875b0f52df7d2c7a870e75e1f0c2679d417931d/Writeups/Hack%20the%20Box/Boxes/Optimum/10%20-%20Website.md",
+ "https://vk9-sec.com/hfs-code-execution-cve-2014-6287/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2014_6287_hfs_rce.yml"
],
"tags": [
@@ -78691,9 +79149,9 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/lijiejie/IIS_shortname_Scanner",
"https://www.exploit-db.com/exploits/19525",
"https://github.com/projectdiscovery/nuclei-templates/blob/9d2889356eebba661c8407038e430759dfd4ec31/fuzzing/iis-shortname.yaml",
+ "https://github.com/lijiejie/IIS_shortname_Scanner",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_iis_tilt_shortname_scan.yml"
],
"tags": [
@@ -78759,8 +79217,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter",
"https://twitter.com/aboul3la/status/1286012324722155525",
+ "https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2020_3452_cisco_asa_ftd.yml"
],
"tags": [
@@ -78873,11 +79331,11 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://github.com/x1sec/CVE-2019-19781/blob/25f7ab97275b2d41800bb3414dac8ca3a78af7e5/CVE-2019-19781-DFIR.md",
- "https://support.citrix.com/article/CTX267679",
- "https://support.citrix.com/article/CTX267027",
- "https://twitter.com/mpgn_x64/status/1216787131210829826",
"https://isc.sans.edu/diary/25686",
+ "https://twitter.com/mpgn_x64/status/1216787131210829826",
+ "https://github.com/x1sec/CVE-2019-19781/blob/25f7ab97275b2d41800bb3414dac8ca3a78af7e5/CVE-2019-19781-DFIR.md",
+ "https://support.citrix.com/article/CTX267027",
+ "https://support.citrix.com/article/CTX267679",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_cve_2019_19781_citrix_exploit.yml"
],
"tags": [
@@ -78944,8 +79402,8 @@
"logsource.category": "webserver",
"logsource.product": "No established product",
"refs": [
- "https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection",
"https://github.com/payloadbox/ssti-payloads",
+ "https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection",
"https://github.com/SigmaHQ/sigma/tree/master/rules/web/web_ssti_in_access_logs.yml"
],
"tags": "No established tags"
@@ -79058,8 +79516,8 @@
"logsource.category": "file_event",
"logsource.product": "macos",
"refs": [
- "https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.014/T1546.014.md",
+ "https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/file_event/file_event_macos_emond_launch_daemon.yml"
],
"tags": [
@@ -79256,8 +79714,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://wojciechregula.blog/post/macos-red-teaming-initial-access-via-applescript-url/",
"https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-7f541fbc4a4a28a92970e8bf53effea5bd934604429112c920affb457f5b2685",
+ "https://wojciechregula.blog/post/macos-red-teaming-initial-access-via-applescript-url/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_susp_execution_macos_script_editor.yml"
],
"tags": [
@@ -79532,8 +79990,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset",
"https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-f5deb07688e1a8dec9530bc3071967b2da5c16b482e671812b864c37beb28f08",
+ "https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_xcsset_malware_infection.yml"
],
"tags": [
@@ -79863,8 +80321,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md",
"https://scriptingosx.com/2018/08/user-interaction-from-bash-scripts/",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_gui_input_capture.yml"
],
"tags": [
@@ -79922,8 +80380,8 @@
"logsource.product": "macos",
"refs": [
"https://www.microsoft.com/security/blog/2022/02/02/the-evolution-of-a-mac-trojan-updateagents-progression/",
- "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-c68a1fcbf7a3f80c87225d7fdc031f691e9f3b6a14a36754be00762bfe6eae97",
"https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset",
+ "https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-c68a1fcbf7a3f80c87225d7fdc031f691e9f3b6a14a36754be00762bfe6eae97",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_wizardupdate_malware_infection.yml"
],
"tags": [
@@ -80036,8 +80494,8 @@
"logsource.category": "process_creation",
"logsource.product": "macos",
"refs": [
- "https://gist.github.com/Capybara/6228955",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1555.001/T1555.001.md",
+ "https://gist.github.com/Capybara/6228955",
"https://github.com/SigmaHQ/sigma/tree/master/rules/macos/process_creation/proc_creation_macos_creds_from_keychain.yml"
],
"tags": [
@@ -80095,10 +80553,10 @@
"logsource.category": "No established category",
"logsource.product": "qualys",
"refs": [
+ "https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://community.qualys.com/docs/DOC-6406-reporting-toolbox-focused-search-lists",
"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
- "https://www.cisecurity.org/controls/cis-controls-list/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/default_credentials_usage.yml"
],
"tags": "No established tags"
@@ -80117,9 +80575,9 @@
"logsource.category": "No established category",
"logsource.product": "qualys",
"refs": [
- "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/host_without_firewall.yml"
],
"tags": "No established tags"
@@ -80140,9 +80598,9 @@
"logsource.category": "No established category",
"logsource.product": "No established product",
"refs": [
- "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
- "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
"https://www.cisecurity.org/controls/cis-controls-list/",
+ "https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf",
+ "https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf",
"https://github.com/SigmaHQ/sigma/tree/master/rules/compliance/netflow_cleartext_protocols.yml"
],
"tags": "No established tags"
@@ -80506,8 +80964,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://linux.die.net/man/1/xclip",
"https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/",
+ "https://linux.die.net/man/1/xclip",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_clipboard_collection.yml"
],
"tags": [
@@ -80555,9 +81013,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://man7.org/linux/man-pages/man8/kmod.8.html",
"https://linux.die.net/man/8/insmod",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.006/T1547.006.md",
+ "https://man7.org/linux/man-pages/man8/kmod.8.html",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_load_module_insmod.yml"
],
"tags": [
@@ -80616,8 +81074,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/berdav/CVE-2021-4034",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034",
+ "https://github.com/berdav/CVE-2021-4034",
"https://access.redhat.com/security/cve/CVE-2021-4034",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_cve_2021_4034.yml"
],
@@ -80651,9 +81109,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://imagemagick.org/",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1113/T1113.md",
"https://linux.die.net/man/1/import",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1113/T1113.md",
+ "https://imagemagick.org/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_screencapture_import.yml"
],
"tags": [
@@ -80677,8 +81135,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md",
"https://firewalld.org/documentation/man-pages/firewall-cmd.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_disable_system_firewall.yml"
],
"tags": [
@@ -80735,9 +81193,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://int0x33.medium.com/day-44-linux-capabilities-privilege-escalation-via-openssl-with-selinux-enabled-and-enforced-74d2bec02099",
"https://man7.org/linux/man-pages/man8/getcap.8.html",
"https://mn3m.info/posts/suid-vs-capabilities/",
+ "https://int0x33.medium.com/day-44-linux-capabilities-privilege-escalation-via-openssl-with-selinux-enabled-and-enforced-74d2bec02099",
"https://www.hackingarticles.in/linux-privilege-escalation-using-capabilities/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_capabilities_discovery.yml"
],
@@ -81435,8 +81893,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/Neo23x0/auditd/blob/master/audit.rules",
"https://twitter.com/0xm1rch/status/1600857731073654784?s=20&t=MdrBPqv4hnBEfAJBayMCZA",
+ "https://github.com/Neo23x0/auditd/blob/master/audit.rules",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_debugfs_usage.yml"
],
"tags": [
@@ -81470,9 +81928,9 @@
"logsource.product": "linux",
"refs": [
"https://man7.org/linux/man-pages/man1/passwd.1.html",
- "https://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntu",
- "https://linux.die.net/man/1/chage",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1201/T1201.md",
+ "https://linux.die.net/man/1/chage",
+ "https://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntu",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_password_policy_discovery.yml"
],
"tags": [
@@ -81597,10 +82055,10 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/T1056.001.md",
- "https://access.redhat.com/articles/4409591#audit-record-types-2",
- "https://linux.die.net/man/8/pam_tty_audit",
"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/T1056.001.md",
+ "https://linux.die.net/man/8/pam_tty_audit",
+ "https://access.redhat.com/articles/4409591#audit-record-types-2",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_keylogging_with_pam_d.yml"
],
"tags": [
@@ -81700,8 +82158,8 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
- "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files",
"https://access.redhat.com/articles/4409591#audit-record-types-2",
+ "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files",
"https://www.youtube.com/watch?v=VmvY5SQm5-Y&ab_channel=M45C07",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/auditd/lnx_auditd_create_account.yml"
],
@@ -82006,9 +82464,9 @@
"logsource.category": "No established category",
"logsource.product": "linux",
"refs": [
+ "https://linux.die.net/man/8/useradd",
"https://github.com/redcanaryco/atomic-red-team/blob/25acadc0b43a07125a8a5b599b28bbc1a91ffb06/atomics/T1136.001/T1136.001.md#atomic-test-5---create-a-new-user-in-linux-with-root-uid-and-gid",
"https://digital.nhs.uk/cyber-alerts/2018/cc-2825",
- "https://linux.die.net/man/8/useradd",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/builtin/lnx_privileged_user_creation.yml"
],
"tags": [
@@ -82759,8 +83217,8 @@
"logsource.category": "file_event",
"logsource.product": "linux",
"refs": [
- "https://research.splunk.com/endpoint/linux_doas_conf_file_creation/",
"https://www.makeuseof.com/how-to-install-and-use-doas/",
+ "https://research.splunk.com/endpoint/linux_doas_conf_file_creation/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/file_event/file_event_lnx_doas_conf_creation.yml"
],
"tags": [
@@ -82793,8 +83251,8 @@
"logsource.category": "network_connection",
"logsource.product": "linux",
"refs": [
- "https://ngrok.com/docs/secure-tunnels/tunnels/ssh-reverse-tunnel-agent",
"https://twitter.com/hakluke/status/1587733971814977537/photo/1",
+ "https://ngrok.com/docs/secure-tunnels/tunnels/ssh-reverse-tunnel-agent",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/network_connection/net_connection_lnx_ngrok_tunnel.yml"
],
"tags": [
@@ -83239,8 +83697,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md",
+ "https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_susp_chmod_directories.yml"
],
"tags": [
@@ -83349,11 +83807,11 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76",
"https://twitter.com/d1r4c/status/1279042657508081664",
- "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-19---curl-upload-file",
- "https://curl.se/docs/manpage.html",
"https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html",
+ "https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76",
+ "https://curl.se/docs/manpage.html",
+ "https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-19---curl-upload-file",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_susp_curl_fileupload.yml"
],
"tags": [
@@ -83419,9 +83877,9 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://linuxize.com/post/how-to-delete-group-in-linux/",
- "https://www.cyberciti.biz/faq/linux-remove-user-command/",
"https://linux.die.net/man/8/userdel",
+ "https://www.cyberciti.biz/faq/linux-remove-user-command/",
+ "https://linuxize.com/post/how-to-delete-group-in-linux/",
"https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_userdel.yml"
],
@@ -83741,8 +84199,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://github.com/sleventyeleven/linuxprivchecker/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md",
+ "https://github.com/sleventyeleven/linuxprivchecker/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_susp_history_recon.yml"
],
"tags": [
@@ -83927,9 +84385,9 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://linuxize.com/post/how-to-delete-group-in-linux/",
- "https://www.cyberciti.biz/faq/linux-remove-user-command/",
"https://linux.die.net/man/8/groupdel",
+ "https://www.cyberciti.biz/faq/linux-remove-user-command/",
+ "https://linuxize.com/post/how-to-delete-group-in-linux/",
"https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_groupdel.yml"
],
@@ -83997,8 +84455,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://github.com/carlospolop/PEASS-ng",
"https://github.com/diego-treitos/linux-smart-enumeration",
+ "https://github.com/carlospolop/PEASS-ng",
"https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_capa_discovery.yml"
],
@@ -84313,8 +84771,8 @@
"logsource.product": "linux",
"refs": [
"https://gtfobins.github.io/gtfobins/nohup/",
- "https://www.computerhope.com/unix/unohup.htm",
"https://en.wikipedia.org/wiki/Nohup",
+ "https://www.computerhope.com/unix/unohup.htm",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_nohup.yml"
],
"tags": "No established tags"
@@ -84471,8 +84929,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://research.splunk.com/endpoint/linux_doas_tool_execution/",
"https://www.makeuseof.com/how-to-install-and-use-doas/",
+ "https://research.splunk.com/endpoint/linux_doas_tool_execution/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_doas_execution.yml"
],
"tags": [
@@ -84505,8 +84963,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://github.com/sleventyeleven/linuxprivchecker/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md",
+ "https://github.com/sleventyeleven/linuxprivchecker/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_susp_history_delete.yml"
],
"tags": [
@@ -84605,8 +85063,8 @@
"logsource.category": "process_creation",
"logsource.product": "linux",
"refs": [
- "https://attack.mitre.org/techniques/T1548/001/",
"https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.001/T1548.001.md",
+ "https://attack.mitre.org/techniques/T1548/001/",
"https://github.com/SigmaHQ/sigma/tree/master/rules/linux/process_creation/proc_creation_lnx_setgid_setuid.yml"
],
"tags": [
@@ -84769,5 +85227,5 @@
"value": "Security Software Discovery - Linux"
}
],
- "version": 20230120
+ "version": 20230123
}