From 4218d726e85d4c0e7a2398b08061e8242f00d90b Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Fri, 25 Apr 2025 01:19:09 +0000 Subject: [PATCH] Sigma Rule Update (2025-04-25 01:19:03) (#41) Co-authored-by: YamatoSecurity --- config/security_rules.json | 520 ++++++++++++++++++------------------- 1 file changed, 260 insertions(+), 260 deletions(-) diff --git a/config/security_rules.json b/config/security_rules.json index 04180cf0..8875bb63 100644 --- a/config/security_rules.json +++ b/config/security_rules.json @@ -40,9 +40,9 @@ "Application" ], "event_ids": [ - "325", - "326", "327", + "326", + "325", "216" ], "id": "b8d0d560-906d-670f-cd10-32ed9179f21a", @@ -189,8 +189,8 @@ "Application" ], "event_ids": [ - "1040", - "1042" + "1042", + "1040" ], "id": "96acd930-342e-66ca-9855-1285ba8a40ed", "level": "medium", @@ -239,10 +239,10 @@ ], "event_ids": [ "868", - "882", - "867", "865", - "866" + "866", + "882", + "867" ], "id": "2ebb1619-89c0-1a11-2b58-53ef8c2cb863", "level": "high", @@ -337,10 +337,10 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1117", + "1006", "1116", "1015", - "1006" + "1117" ], "id": "c70d7033-8146-fe73-8430-90b23c296f9d", "level": "high", @@ -461,8 +461,8 @@ ], "event_ids": [ "40300", - "40302", - "40301" + "40301", + "40302" ], "id": "871bc844-4977-a864-457b-46cfba6ddb65", "level": "high", @@ -477,9 +477,9 @@ "Microsoft-Windows-AppLocker/Packaged app-Execution" ], "event_ids": [ + "8025", "8004", "8007", - "8025", "8022" ], "id": "da0e47f5-493f-9da4-b041-8eb762761118", @@ -537,10 +537,10 @@ "id": "a4504cb2-23f6-6d94-5ae6-d6013cf1d995", "level": "medium", "subcategory_guids": [ - "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030" + "0CCE921D-69AE-11D9-BED3-505054503030" ], "title": "Suspicious Multiple File Rename Or Delete Occurred" }, @@ -620,10 +620,10 @@ "id": "888d3e17-a1ed-6b11-895c-e1f9b96b35be", "level": "high", "subcategory_guids": [ - "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "Stored Credentials in Fake Files" }, @@ -650,8 +650,8 @@ "id": "428d3964-3241-1ceb-8f93-b31d8490c822", "level": "medium", "subcategory_guids": [ - "0CCE9215-69AE-11D9-BED3-505054503030", - "0CCE9217-69AE-11D9-BED3-505054503030" + "0CCE9217-69AE-11D9-BED3-505054503030", + "0CCE9215-69AE-11D9-BED3-505054503030" ], "title": "Failed Logins with Different Accounts from Single Source System" }, @@ -856,15 +856,15 @@ ], "event_ids": [ "4698", - "4624", - "4702" + "4702", + "4624" ], "id": "bc42c437-1ea8-fd0f-d964-e37a58d861fc", "level": "medium", "subcategory_guids": [ - "0CCE9226-69AE-11D9-BED3-505054503030", "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9215-69AE-11D9-BED3-505054503030" + "0CCE9215-69AE-11D9-BED3-505054503030", + "0CCE9226-69AE-11D9-BED3-505054503030" ], "title": "Remote Schtasks Creation" }, @@ -873,9 +873,9 @@ "Microsoft-Windows-DriverFrameworks-UserMode/Operational" ], "event_ids": [ - "2102", + "2100", "2003", - "2100" + "2102" ], "id": "12717514-9380-dabc-12b9-113f524ec3ac", "level": "low", @@ -1034,10 +1034,10 @@ "id": "474caaa9-3115-c838-1509-59ffb6caecfc", "level": "medium", "subcategory_guids": [ + "0CCE921F-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "SCM Database Handle Failure" }, @@ -1084,9 +1084,9 @@ "level": "medium", "subcategory_guids": [ "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030" ], "title": "Windows Defender Exclusion Registry Key - Write Access Requested" }, @@ -1114,8 +1114,8 @@ "id": "d74b03af-7e5f-bc5b-9e84-9d44af3d61b7", "level": "high", "subcategory_guids": [ - "0CCE9226-69AE-11D9-BED3-505054503030", - "0CCE9227-69AE-11D9-BED3-505054503030" + "0CCE9227-69AE-11D9-BED3-505054503030", + "0CCE9226-69AE-11D9-BED3-505054503030" ], "title": "Suspicious Scheduled Task Update" }, @@ -1129,8 +1129,8 @@ "id": "cd7d9f05-3bf6-21f6-6686-e602ab6d72ba", "level": "high", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "Suspicious Scheduled Task Creation" }, @@ -1139,14 +1139,14 @@ "sec" ], "event_ids": [ - "4738", - "5136" + "5136", + "4738" ], "id": "c9123898-04d5-2d3b-5e2b-7c0c92111480", "level": "high", "subcategory_guids": [ - "0CCE9235-69AE-11D9-BED3-505054503030", - "0CCE923C-69AE-11D9-BED3-505054503030" + "0CCE923C-69AE-11D9-BED3-505054503030", + "0CCE9235-69AE-11D9-BED3-505054503030" ], "title": "Active Directory User Backdoors" }, @@ -1189,10 +1189,10 @@ "id": "04a055ea-ffa9-540b-e1d2-d5c1bfd5bc7b", "level": "high", "subcategory_guids": [ - "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "Suspicious Teams Application Related ObjectAcess Event" }, @@ -1290,8 +1290,8 @@ "id": "1085e6d3-6691-5713-42ba-ba8933a6b2d0", "level": "low", "subcategory_guids": [ - "69979849-797A-11D9-BED3-505054503030", - "0CCE9210-69AE-11D9-BED3-505054503030" + "0CCE9210-69AE-11D9-BED3-505054503030", + "69979849-797A-11D9-BED3-505054503030" ], "title": "Unauthorized System Time Modification" }, @@ -1376,10 +1376,10 @@ "id": "c7f94c63-6fb7-9686-e2c2-2298c9f56ca9", "level": "medium", "subcategory_guids": [ + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "Potentially Suspicious AccessMask Requested From LSASS" }, @@ -1402,8 +1402,8 @@ "sec" ], "event_ids": [ - "4663", - "4656" + "4656", + "4663" ], "id": "63308dbe-54a4-9c70-cc90-6d15e10f3505", "level": "high", @@ -1533,8 +1533,8 @@ "sec" ], "event_ids": [ - "4720", - "4781" + "4781", + "4720" ], "id": "ec77919c-1169-6640-23e7-91c6f27ddc91", "level": "medium", @@ -1577,16 +1577,16 @@ "sec" ], "event_ids": [ - "4776", + "4625", "4624", - "4625" + "4776" ], "id": "8b40829b-4556-9bec-a8ad-905688497639", "level": "high", "subcategory_guids": [ + "0CCE9215-69AE-11D9-BED3-505054503030", "0CCE9217-69AE-11D9-BED3-505054503030", - "0CCE923F-69AE-11D9-BED3-505054503030", - "0CCE9215-69AE-11D9-BED3-505054503030" + "0CCE923F-69AE-11D9-BED3-505054503030" ], "title": "Hacktool Ruler" }, @@ -1601,9 +1601,9 @@ "level": "high", "subcategory_guids": [ "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030" + "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "Password Dumper Activity on LSASS" }, @@ -1668,9 +1668,9 @@ "sec" ], "event_ids": [ - "4766", "4738", - "4765" + "4765", + "4766" ], "id": "5335aea0-f1b4-e120-08b6-c80fe4bf99ad", "level": "medium", @@ -1766,15 +1766,15 @@ "sec" ], "event_ids": [ - "4663", - "4657" + "4657", + "4663" ], "id": "249d836c-8857-1b98-5d7b-050c2d34e275", "level": "high", "subcategory_guids": [ + "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030" ], "title": "Sysmon Channel Reference Deletion" @@ -1790,9 +1790,9 @@ "id": "06b8bcc0-326b-518a-3868-fe0721488fb8", "level": "medium", "subcategory_guids": [ + "0CCE921F-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "LSASS Access From Non System Account" @@ -1816,8 +1816,8 @@ "sec" ], "event_ids": [ - "1102", - "517" + "517", + "1102" ], "id": "9b14c9d8-6b61-e49f-f8a8-0836d0ad98c9", "level": "high", @@ -1863,9 +1863,9 @@ "level": "low", "subcategory_guids": [ "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "Service Registry Key Read Access Request" }, @@ -1874,16 +1874,16 @@ "sec" ], "event_ids": [ - "4656", - "4663" + "4663", + "4656" ], "id": "763d50d7-9452-0146-18a1-9ca65e3a2f73", "level": "medium", "subcategory_guids": [ "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "Azure AD Health Service Agents Registry Keys Access" }, @@ -1934,8 +1934,8 @@ "sec" ], "event_ids": [ - "4898", - "4899" + "4899", + "4898" ], "id": "3a655a7c-a830-77ad-fc8b-f054fb713304", "level": "low", @@ -2019,8 +2019,8 @@ "sec" ], "event_ids": [ - "4728", - "632" + "632", + "4728" ], "id": "26767093-828c-2f39-bdd8-d0439e87307c", "level": "low", @@ -2067,8 +2067,8 @@ "id": "6bcac9cb-eeee-9f45-c5c1-0daaf023ac12", "level": "medium", "subcategory_guids": [ - "0CCE9215-69AE-11D9-BED3-505054503030", - "0CCE9217-69AE-11D9-BED3-505054503030" + "0CCE9217-69AE-11D9-BED3-505054503030", + "0CCE9215-69AE-11D9-BED3-505054503030" ], "title": "Failed Logon From Public IP" }, @@ -2205,8 +2205,8 @@ "sec" ], "event_ids": [ - "4729", - "633" + "633", + "4729" ], "id": "6e0f860b-3678-7396-a4a3-7cf55f7bb01c", "level": "low", @@ -2279,8 +2279,8 @@ "id": "cd93b6ed-961d-ed36-92db-bd44bccda695", "level": "high", "subcategory_guids": [ - "0CCE9229-69AE-11D9-BED3-505054503030", - "0CCE9228-69AE-11D9-BED3-505054503030" + "0CCE9228-69AE-11D9-BED3-505054503030", + "0CCE9229-69AE-11D9-BED3-505054503030" ], "title": "User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'" }, @@ -2323,9 +2323,9 @@ "level": "high", "subcategory_guids": [ "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "SAM Registry Hive Handle Request" }, @@ -2411,9 +2411,9 @@ "id": "de10da38-ee60-f6a4-7d70-4d308558158b", "level": "critical", "subcategory_guids": [ - "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "WCE wceaux.dll Access" @@ -2437,16 +2437,16 @@ "sec" ], "event_ids": [ - "4625", + "4776", "4624", - "4776" + "4625" ], "id": "827aa6c1-1507-3f0a-385a-ade5251bfd71", "level": "high", "subcategory_guids": [ + "0CCE923F-69AE-11D9-BED3-505054503030", "0CCE9217-69AE-11D9-BED3-505054503030", - "0CCE9215-69AE-11D9-BED3-505054503030", - "0CCE923F-69AE-11D9-BED3-505054503030" + "0CCE9215-69AE-11D9-BED3-505054503030" ], "title": "Metasploit SMB Authentication" }, @@ -2474,8 +2474,8 @@ "id": "a25c0c49-11f8-ace9-6bbd-80cfa6e2b2d7", "level": "medium", "subcategory_guids": [ - "0CCE9228-69AE-11D9-BED3-505054503030", - "0CCE9229-69AE-11D9-BED3-505054503030" + "0CCE9229-69AE-11D9-BED3-505054503030", + "0CCE9228-69AE-11D9-BED3-505054503030" ], "title": "Potential Privileged System Service Operation - SeLoadDriverPrivilege" }, @@ -2484,8 +2484,8 @@ "sec" ], "event_ids": [ - "4743", - "4741" + "4741", + "4743" ], "id": "b607775d-e3fe-3fb8-c40e-4e52b3fbe44d", "level": "low", @@ -2505,10 +2505,10 @@ "id": "321196fe-fb10-6b13-c611-3dfe40baa1af", "level": "medium", "subcategory_guids": [ - "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030" ], "title": "Azure AD Health Monitoring Agent Registry Keys Access" }, @@ -2517,8 +2517,8 @@ "sec" ], "event_ids": [ - "5136", - "5145" + "5145", + "5136" ], "id": "01628b51-85e1-4088-9432-a11cba9f3ebd", "level": "high", @@ -2547,8 +2547,8 @@ "sec" ], "event_ids": [ - "5447", - "5449" + "5449", + "5447" ], "id": "22d4af9f-97d9-4827-7209-c451ff7f43c6", "level": "high", @@ -2622,9 +2622,9 @@ "id": "4faa08cb-e57e-bb07-cfc2-2153a97a99bf", "level": "medium", "subcategory_guids": [ + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "ISO Image Mounted" @@ -2635,9 +2635,9 @@ ], "event_ids": [ "4771", + "675", "4768", - "4769", - "675" + "4769" ], "id": "978525c2-97aa-f0e4-8c11-3cf81ea3379b", "level": "high", @@ -2858,14 +2858,14 @@ "sec" ], "event_ids": [ - "4742", - "5136" + "5136", + "4742" ], "id": "c800ccd5-5818-b0f5-1a12-f9c8bc24a433", "level": "medium", "subcategory_guids": [ - "0CCE923C-69AE-11D9-BED3-505054503030", - "0CCE9236-69AE-11D9-BED3-505054503030" + "0CCE9236-69AE-11D9-BED3-505054503030", + "0CCE923C-69AE-11D9-BED3-505054503030" ], "title": "Possible DC Shadow Attack" }, @@ -2874,18 +2874,18 @@ "sec" ], "event_ids": [ - "4656", "4663", - "4658" + "4658", + "4656" ], "id": "70c3269a-a7f2-49bd-1e28-a0921f353db7", "level": "medium", "subcategory_guids": [ - "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE9223-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9223-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "Potential Secure Deletion with SDelete" }, @@ -2894,14 +2894,14 @@ "sec" ], "event_ids": [ - "5447", - "5441" + "5441", + "5447" ], "id": "4d56e133-40b5-5b28-07b5-bab0913fc338", "level": "high", "subcategory_guids": [ - "0CCE9233-69AE-11D9-BED3-505054503030", - "0CCE9234-69AE-11D9-BED3-505054503030" + "0CCE9234-69AE-11D9-BED3-505054503030", + "0CCE9233-69AE-11D9-BED3-505054503030" ], "title": "HackTool - EDRSilencer Execution - Filter Added" }, @@ -2915,8 +2915,8 @@ "id": "5ac4b7f8-9412-f919-220c-aa8a1867b1ef", "level": "high", "subcategory_guids": [ - "0CCE9220-69AE-11D9-BED3-505054503030", - "0CCE923B-69AE-11D9-BED3-505054503030" + "0CCE923B-69AE-11D9-BED3-505054503030", + "0CCE9220-69AE-11D9-BED3-505054503030" ], "title": "Reconnaissance Activity" }, @@ -2925,17 +2925,17 @@ "sec" ], "event_ids": [ + "4657", "4656", - "4663", - "4657" + "4663" ], "id": "32337bc9-8e75-bdaf-eaf4-d3b19ee08a67", "level": "medium", "subcategory_guids": [ - "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "Processes Accessing the Microphone and Webcam" }, @@ -2988,8 +2988,8 @@ "sec" ], "event_ids": [ - "4904", - "4905" + "4905", + "4904" ], "id": "00f253a0-1035-e450-7f6e-e2291dee27ec", "level": "informational", @@ -3060,18 +3060,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ + "1018", + "1115", "1007", "1017", + "1011", + "1019", "1008", "1116", - "1011", - "1115", - "1018", - "1019", "1006", - "1010", + "1009", "1012", - "1009" + "1010" ], "id": "a1be9170-2ada-e8bb-285c-3e1ff336189e", "level": "high", @@ -3083,18 +3083,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1012", - "1009", - "1011", - "1017", "1008", - "1116", - "1006", - "1019", - "1115", "1007", + "1116", + "1009", + "1115", + "1018", + "1019", + "1006", + "1011", + "1012", "1010", - "1018" + "1017" ], "id": "22f82564-4b51-e901-bf00-ea94ff39b468", "level": "critical", @@ -3106,16 +3106,16 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1006", + "1009", + "1008", + "1018", + "1007", "1019", "1115", - "1116", - "1009", "1017", - "1008", + "1116", + "1006", "1012", - "1007", - "1018", "1010", "1011" ], @@ -3129,18 +3129,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1006", - "1018", - "1010", - "1017", - "1116", - "1011", - "1009", "1008", - "1115", - "1012", + "1017", + "1019", "1007", - "1019" + "1115", + "1010", + "1011", + "1018", + "1116", + "1009", + "1012", + "1006" ], "id": "46fc2e9f-df4e-8628-05d5-39bc97b56bab", "level": "critical", @@ -3152,18 +3152,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1115", - "1012", - "1116", "1008", - "1011", - "1007", - "1006", - "1009", "1017", - "1010", + "1011", + "1009", + "1019", + "1115", + "1007", + "1116", "1018", - "1019" + "1006", + "1010", + "1012" ], "id": "207b56b3-b44d-dcee-c171-c8f3f4eb3cf6", "level": "high", @@ -3175,18 +3175,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1007", - "1018", - "1010", - "1009", - "1116", - "1011", + "1115", "1012", "1008", - "1115", + "1011", + "1006", + "1007", "1019", - "1017", - "1006" + "1116", + "1009", + "1010", + "1018", + "1017" ], "id": "f3d20838-65fe-0575-52a9-fd41ce2a5fdd", "level": "high", @@ -3198,8 +3198,8 @@ "Microsoft-Windows-CodeIntegrity/Operational" ], "event_ids": [ - "3032", - "3035" + "3035", + "3032" ], "id": "4d4c3fb7-504c-7089-2bb3-26781191b7eb", "level": "high", @@ -3272,8 +3272,8 @@ "Microsoft-Windows-CodeIntegrity/Operational" ], "event_ids": [ - "3082", - "3083" + "3083", + "3082" ], "id": "b1f60092-6ced-8775-b5dd-ac15a042e292", "level": "high", @@ -3297,8 +3297,8 @@ "Microsoft-Windows-CodeIntegrity/Operational" ], "event_ids": [ - "3033", - "3034" + "3034", + "3033" ], "id": "f45ca591-7575-818e-9a07-7493461a33c3", "level": "low", @@ -3443,8 +3443,8 @@ ], "event_ids": [ "2071", - "2004", - "2097" + "2097", + "2004" ], "id": "ac6e5dab-06d1-5064-a91c-0eb6246d22bd", "level": "medium", @@ -3482,11 +3482,11 @@ "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" ], "event_ids": [ + "2083", "2082", - "2003", "2008", "2002", - "2083" + "2003" ], "id": "a0062bfc-2eba-05df-e231-f4a44b1317ab", "level": "low", @@ -3510,9 +3510,9 @@ "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" ], "event_ids": [ - "2004", + "2097", "2071", - "2097" + "2004" ], "id": "bf17c34a-7b9d-65a8-a143-afa9c13e1fe4", "level": "high", @@ -3551,8 +3551,8 @@ "Microsoft-Windows-Security-Mitigations*" ], "event_ids": [ - "11", - "12" + "12", + "11" ], "id": "838d17f1-63ba-03c4-f8ae-2bdfd74a6a08", "level": "high", @@ -3577,13 +3577,13 @@ "sec" ], "event_ids": [ + "4756", "4731", "4737", "4727", - "4755", - "4756", + "4728", "4754", - "4728" + "4755" ], "id": "2a451b93-9890-5cfe-38aa-1dc4f8f0fe0a", "level": "high", @@ -3629,9 +3629,9 @@ "level": "critical", "subcategory_guids": [ "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security" }, @@ -3645,10 +3645,10 @@ "id": "82b185f4-cdcb-ba23-9fdb-dbc1a732e1a7", "level": "medium", "subcategory_guids": [ - "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE9245-69AE-11D9-BED3-505054503030" + "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030" ], "title": "ScreenConnect User Database Modification - Security" }, @@ -3746,8 +3746,8 @@ "id": "fa0084fc-2105-cdc9-c7c1-1752bbb2e4d2", "level": "high", "subcategory_guids": [ - "0CCE9226-69AE-11D9-BED3-505054503030", - "0CCE9227-69AE-11D9-BED3-505054503030" + "0CCE9227-69AE-11D9-BED3-505054503030", + "0CCE9226-69AE-11D9-BED3-505054503030" ], "title": "Kapeka Backdoor Scheduled Task Creation" }, @@ -4284,18 +4284,18 @@ "sec" ], "event_ids": [ - "4656", "5145", - "4663" + "4663", + "4656" ], "id": "21ead34c-d2d4-2799-6318-2ff9e4aa9222", "level": "high", "subcategory_guids": [ - "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE9244-69AE-11D9-BED3-505054503030", "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE9244-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030" + "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "BlueSky Ransomware Artefacts" }, @@ -4708,15 +4708,15 @@ "sec" ], "event_ids": [ - "4656", - "4663" + "4663", + "4656" ], "id": "1aeb71a3-31b4-1a5e-85d8-1631c3a73d43", "level": "critical", "subcategory_guids": [ - "0CCE921D-69AE-11D9-BED3-505054503030", - "0CCE921F-69AE-11D9-BED3-505054503030", "0CCE9245-69AE-11D9-BED3-505054503030", + "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030" ], "title": "CVE-2023-23397 Exploitation Attempt" @@ -5250,8 +5250,8 @@ "Microsoft-Windows-TaskScheduler/Operational" ], "event_ids": [ - "140", "129", + "140", "141" ], "id": "51850e92-9de2-230e-98f6-5775d63df091", @@ -5264,15 +5264,15 @@ "sec" ], "event_ids": [ - "4702", "4698", + "4702", "4699" ], "id": "ae16af08-e56e-414a-ceba-cb62e9f3a2ef", "level": "high", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor" }, @@ -5314,8 +5314,8 @@ "id": "05731ce3-cfda-dbba-3792-c17794a22cf7", "level": "critical", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "Diamond Sleet APT Scheduled Task Creation" }, @@ -5564,8 +5564,8 @@ "id": "798c8f65-068a-0a31-009f-12739f547a2d", "level": "critical", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "OilRig APT Schedule Task Persistence - Security" }, @@ -5684,10 +5684,10 @@ "System" ], "event_ids": [ - "37", - "35", "36", - "38" + "35", + "38", + "37" ], "id": "8a194220-2afd-d5a9-0644-0a2d76019999", "level": "medium", @@ -5850,18 +5850,18 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "1007", - "1017", - "1011", - "1008", - "1006", - "1019", - "1018", "1012", - "1010", + "1018", "1116", "1009", - "1115" + "1115", + "1019", + "1006", + "1017", + "1010", + "1011", + "1007", + "1008" ], "id": "aef0711e-c055-e870-92bc-ea130059eed1", "level": "critical", @@ -6424,10 +6424,10 @@ "id": "7619b716-8052-6323-d9c7-87923ef591e6", "level": "low", "subcategory_guids": [ - "0CCE9245-69AE-11D9-BED3-505054503030", - "0CCE921E-69AE-11D9-BED3-505054503030", "0CCE921F-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030" + "0CCE921D-69AE-11D9-BED3-505054503030", + "0CCE921E-69AE-11D9-BED3-505054503030", + "0CCE9245-69AE-11D9-BED3-505054503030" ], "title": "Access To Browser Credential Files By Uncommon Applications - Security" }, @@ -6465,8 +6465,8 @@ "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" ], "event_ids": [ - "2005", - "2073" + "2073", + "2005" ], "id": "5d551ac6-b825-b536-7ec6-75339fc57a25", "level": "low", @@ -8605,10 +8605,10 @@ "Microsoft-Windows-Windows Defender/Operational" ], "event_ids": [ - "5012", - "5001", + "5101", "5010", - "5101" + "5001", + "5012" ], "id": "7424bd72-6b38-f5a1-7f25-4665452ec72b", "level": "high", @@ -8730,12 +8730,12 @@ "sec" ], "event_ids": [ - "4728", "633", "632", - "4729", "634", - "4730" + "4728", + "4730", + "4729" ], "id": "506379d9-8545-c010-e9a3-693119ab9261", "level": "low", @@ -8768,9 +8768,9 @@ "id": "7bd85790-c82a-56af-7127-f257e5ef6c6f", "level": "medium", "subcategory_guids": [ - "0CCE921F-69AE-11D9-BED3-505054503030", + "0CCE921D-69AE-11D9-BED3-505054503030", "0CCE921E-69AE-11D9-BED3-505054503030", - "0CCE921D-69AE-11D9-BED3-505054503030" + "0CCE921F-69AE-11D9-BED3-505054503030" ], "title": "Windows Defender Exclusion Deleted" }, @@ -11759,9 +11759,9 @@ "DNS Server" ], "event_ids": [ - "770", + "771", "150", - "771" + "770" ], "id": "40077f9e-f597-1087-0c4f-8901d1a07af4", "level": "high", @@ -11834,8 +11834,8 @@ ], "event_ids": [ "1031", - "1032", - "1034" + "1034", + "1032" ], "id": "a6878a7f-9fcd-9b29-ba67-ca05b11dc4aa", "level": "high", @@ -11970,8 +11970,8 @@ "System" ], "event_ids": [ - "56", - "50" + "50", + "56" ], "id": "19979e7a-7d1e-a8e3-2a9e-9b3ac0059fa7", "level": "medium", @@ -11997,10 +11997,10 @@ ], "event_ids": [ "20", - "217", - "16", "24", - "213" + "16", + "213", + "217" ], "id": "8f9f7490-f99e-ff64-4b60-ac3f06a2262b", "level": "informational", @@ -12397,8 +12397,8 @@ "System" ], "event_ids": [ - "7036", - "7045" + "7045", + "7036" ], "id": "cd1c0081-d0c8-369f-2ed1-dcc058b08b9c", "level": "medium", @@ -12566,8 +12566,8 @@ "System" ], "event_ids": [ - "6038", - "6039" + "6039", + "6038" ], "id": "cb063566-b04b-c7e4-316b-c69075ed08f5", "level": "medium", @@ -27172,8 +27172,8 @@ "sec" ], "event_ids": [ - "4625", "529", + "4625", "528", "4624" ], @@ -30331,8 +30331,8 @@ ], "event_ids": [ "4657", - "12", - "13" + "13", + "12" ], "id": "46595663-e666-c413-ccf4-028a618ca712", "level": "critical", @@ -31535,8 +31535,8 @@ "id": "4574194d-e7ca-4356-a95c-21b753a1787e", "level": "medium", "subcategory_guids": [ - "0CCE9217-69AE-11D9-BED3-505054503030", - "0CCE9215-69AE-11D9-BED3-505054503030" + "0CCE9215-69AE-11D9-BED3-505054503030", + "0CCE9217-69AE-11D9-BED3-505054503030" ], "title": "User Guessing" }, @@ -31792,8 +31792,8 @@ "id": "a85096da-be85-48d7-8ad5-2f957cd74daa", "level": "low", "subcategory_guids": [ - "0CCE9217-69AE-11D9-BED3-505054503030", - "0CCE9215-69AE-11D9-BED3-505054503030" + "0CCE9215-69AE-11D9-BED3-505054503030", + "0CCE9217-69AE-11D9-BED3-505054503030" ], "title": "Logon Failure (Unknown Reason)" }, @@ -32058,8 +32058,8 @@ "id": "60d768ca-33e8-4f34-b967-14fd7aa18a22", "level": "informational", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "Task Created" }, @@ -32073,8 +32073,8 @@ "id": "de5ed02e-e7b5-47a0-a35c-06a907c988e4", "level": "informational", "subcategory_guids": [ - "0CCE9227-69AE-11D9-BED3-505054503030", - "0CCE9226-69AE-11D9-BED3-505054503030" + "0CCE9226-69AE-11D9-BED3-505054503030", + "0CCE9227-69AE-11D9-BED3-505054503030" ], "title": "Task Deleted" },