mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-07 17:52:49 +01:00
Automated update
This commit is contained in:
@@ -65,8 +65,8 @@
|
||||
"id": "60d768ca-33e8-4f34-b967-14fd7aa18a22",
|
||||
"level": "informational",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Task Created"
|
||||
},
|
||||
@@ -401,8 +401,8 @@
|
||||
"id": "4574194d-e7ca-4356-a95c-21b753a1787e",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "User Guessing"
|
||||
},
|
||||
@@ -414,8 +414,8 @@
|
||||
"id": "b2c74582-0d44-49fe-8faa-014dcdafee62",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Failed Logon - Non-Existent User"
|
||||
},
|
||||
@@ -549,8 +549,8 @@
|
||||
"id": "8afa97ce-a217-4f7c-aced-3e320a57756d",
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Logon Failure (User Does Not Exist)"
|
||||
},
|
||||
@@ -598,8 +598,8 @@
|
||||
"id": "e87bd730-df45-4ae9-85de-6c75369c5d29",
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Logon Failure (Wrong Password)"
|
||||
},
|
||||
@@ -883,8 +883,8 @@
|
||||
"id": "e4c7a334-7ecb-ef93-85dd-49185891fb7a",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Defrag Deactivation - Security"
|
||||
},
|
||||
@@ -896,8 +896,8 @@
|
||||
"id": "798c8f65-068a-0a31-009f-12739f547a2d",
|
||||
"level": "critical",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "OilRig APT Schedule Task Persistence - Security"
|
||||
},
|
||||
@@ -909,10 +909,10 @@
|
||||
"id": "82b185f4-cdcb-ba23-9fdb-dbc1a732e1a7",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "ScreenConnect User Database Modification - Security"
|
||||
},
|
||||
@@ -924,23 +924,23 @@
|
||||
"id": "74d067bc-3f42-3855-c13d-771d589cf11c",
|
||||
"level": "critical",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security"
|
||||
},
|
||||
{
|
||||
"description": "Detects any creation or modification to a windows domain group with the name \"ESX Admins\".\nThis could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor.\nVMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named \"ESX Admins\" to have full administrative access by default.\n",
|
||||
"event_ids": [
|
||||
"4727",
|
||||
"4737",
|
||||
"4754",
|
||||
"4731",
|
||||
"4727",
|
||||
"4755",
|
||||
"4756",
|
||||
"4728",
|
||||
"4754",
|
||||
"4731"
|
||||
"4728"
|
||||
],
|
||||
"id": "2a451b93-9890-5cfe-38aa-1dc4f8f0fe0a",
|
||||
"level": "high",
|
||||
@@ -957,8 +957,8 @@
|
||||
"id": "fa0084fc-2105-cdc9-c7c1-1752bbb2e4d2",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Kapeka Backdoor Scheduled Task Creation"
|
||||
},
|
||||
@@ -985,8 +985,8 @@
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "CVE-2023-23397 Exploitation Attempt"
|
||||
},
|
||||
@@ -1010,8 +1010,8 @@
|
||||
"id": "05731ce3-cfda-dbba-3792-c17794a22cf7",
|
||||
"level": "critical",
|
||||
"subcategory_guids": [
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Diamond Sleet APT Scheduled Task Creation"
|
||||
},
|
||||
@@ -1019,14 +1019,14 @@
|
||||
"description": "Hunts for known SVR-specific scheduled task names",
|
||||
"event_ids": [
|
||||
"4698",
|
||||
"4702",
|
||||
"4699"
|
||||
"4699",
|
||||
"4702"
|
||||
],
|
||||
"id": "ae16af08-e56e-414a-ceba-cb62e9f3a2ef",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor"
|
||||
},
|
||||
@@ -1057,18 +1057,18 @@
|
||||
{
|
||||
"description": "Detect access to files and shares with names and extensions used by BlueSky ransomware which could indicate a current or previous encryption attempt.",
|
||||
"event_ids": [
|
||||
"4656",
|
||||
"5145",
|
||||
"4663",
|
||||
"4656"
|
||||
"4663"
|
||||
],
|
||||
"id": "21ead34c-d2d4-2799-6318-2ff9e4aa9222",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9244-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9244-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "BlueSky Ransomware Artefacts"
|
||||
},
|
||||
@@ -1105,8 +1105,8 @@
|
||||
"id": "35890fd4-9ed3-b244-0eff-91fe61e52f8b",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potential Pass the Hash Activity"
|
||||
},
|
||||
@@ -1138,16 +1138,16 @@
|
||||
{
|
||||
"description": "Detects interactive console logons to Server Systems",
|
||||
"event_ids": [
|
||||
"4624",
|
||||
"529",
|
||||
"4625",
|
||||
"528"
|
||||
"4624",
|
||||
"528",
|
||||
"4625"
|
||||
],
|
||||
"id": "7298c707-7564-3229-7c76-ec514847d8c2",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Interactive Logon to Server Systems"
|
||||
},
|
||||
@@ -1171,8 +1171,8 @@
|
||||
"id": "68d6fb03-e325-2ed1-a429-abac7adf7ba3",
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Scheduled Task Deletion"
|
||||
},
|
||||
@@ -1185,9 +1185,9 @@
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Access To Browser Credential Files By Uncommon Applications - Security"
|
||||
},
|
||||
@@ -1247,10 +1247,10 @@
|
||||
"id": "4faa08cb-e57e-bb07-cfc2-2153a97a99bf",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "ISO Image Mounted"
|
||||
},
|
||||
@@ -1262,8 +1262,8 @@
|
||||
"id": "cd7d9f05-3bf6-21f6-6686-e602ab6d72ba",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Suspicious Scheduled Task Creation"
|
||||
},
|
||||
@@ -1326,8 +1326,8 @@
|
||||
"id": "a25c0c49-11f8-ace9-6bbd-80cfa6e2b2d7",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9228-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9229-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9229-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9228-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potential Privileged System Service Operation - SeLoadDriverPrivilege"
|
||||
},
|
||||
@@ -1357,15 +1357,15 @@
|
||||
"description": "Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.",
|
||||
"event_ids": [
|
||||
"4768",
|
||||
"675",
|
||||
"4769",
|
||||
"4771",
|
||||
"675"
|
||||
"4771"
|
||||
],
|
||||
"id": "978525c2-97aa-f0e4-8c11-3cf81ea3379b",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9240-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9242-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9242-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9240-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Kerberos Manipulation"
|
||||
},
|
||||
@@ -1384,8 +1384,8 @@
|
||||
{
|
||||
"description": "Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.\n",
|
||||
"event_ids": [
|
||||
"6281",
|
||||
"5038"
|
||||
"5038",
|
||||
"6281"
|
||||
],
|
||||
"id": "4f738466-2a14-5842-1eb3-481614770a49",
|
||||
"level": "informational",
|
||||
@@ -1438,8 +1438,8 @@
|
||||
"id": "93c95eee-748a-e1db-18a5-f40035167086",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE923B-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9220-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9220-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "AD Privileged Users or Groups Reconnaissance"
|
||||
},
|
||||
@@ -1482,14 +1482,14 @@
|
||||
{
|
||||
"description": "Detects DCShadow via create new SPN",
|
||||
"event_ids": [
|
||||
"5136",
|
||||
"4742"
|
||||
"4742",
|
||||
"5136"
|
||||
],
|
||||
"id": "c800ccd5-5818-b0f5-1a12-f9c8bc24a433",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9236-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030"
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9236-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Possible DC Shadow Attack"
|
||||
},
|
||||
@@ -1502,10 +1502,10 @@
|
||||
"id": "c7f94c63-6fb7-9686-e2c2-2298c9f56ca9",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potentially Suspicious AccessMask Requested From LSASS"
|
||||
},
|
||||
@@ -1524,16 +1524,16 @@
|
||||
{
|
||||
"description": "This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent.\nThis detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\\SOFTWARE\\Microsoft\\Microsoft Online\\Reporting\\MonitoringAgent.\n",
|
||||
"event_ids": [
|
||||
"4663",
|
||||
"4656"
|
||||
"4656",
|
||||
"4663"
|
||||
],
|
||||
"id": "321196fe-fb10-6b13-c611-3dfe40baa1af",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Azure AD Health Monitoring Agent Registry Keys Access"
|
||||
},
|
||||
@@ -1576,8 +1576,8 @@
|
||||
{
|
||||
"description": "Detect lateral movement using GPO scheduled task, usually used to deploy ransomware at scale",
|
||||
"event_ids": [
|
||||
"5136",
|
||||
"5145"
|
||||
"5145",
|
||||
"5136"
|
||||
],
|
||||
"id": "01628b51-85e1-4088-9432-a11cba9f3ebd",
|
||||
"level": "high",
|
||||
@@ -1705,27 +1705,27 @@
|
||||
"id": "249d836c-8857-1b98-5d7b-050c2d34e275",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Sysmon Channel Reference Deletion"
|
||||
},
|
||||
{
|
||||
"description": "Potential adversaries accessing the microphone and webcam in an endpoint.",
|
||||
"event_ids": [
|
||||
"4663",
|
||||
"4657",
|
||||
"4656"
|
||||
"4656",
|
||||
"4663"
|
||||
],
|
||||
"id": "32337bc9-8e75-bdaf-eaf4-d3b19ee08a67",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Processes Accessing the Microphone and Webcam"
|
||||
},
|
||||
@@ -1739,8 +1739,8 @@
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "SysKey Registry Keys Access"
|
||||
@@ -1810,8 +1810,8 @@
|
||||
{
|
||||
"description": "Detects activity when a member is removed from a security-enabled global group",
|
||||
"event_ids": [
|
||||
"4729",
|
||||
"633"
|
||||
"633",
|
||||
"4729"
|
||||
],
|
||||
"id": "6e0f860b-3678-7396-a4a3-7cf55f7bb01c",
|
||||
"level": "low",
|
||||
@@ -1932,8 +1932,8 @@
|
||||
{
|
||||
"description": "Detects activity when a member is added to a security-enabled global group",
|
||||
"event_ids": [
|
||||
"632",
|
||||
"4728"
|
||||
"4728",
|
||||
"632"
|
||||
],
|
||||
"id": "26767093-828c-2f39-bdd8-d0439e87307c",
|
||||
"level": "low",
|
||||
@@ -1957,16 +1957,16 @@
|
||||
{
|
||||
"description": "Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host",
|
||||
"event_ids": [
|
||||
"4663",
|
||||
"4656"
|
||||
"4656",
|
||||
"4663"
|
||||
],
|
||||
"id": "de10da38-ee60-f6a4-7d70-4d308558158b",
|
||||
"level": "critical",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "WCE wceaux.dll Access"
|
||||
},
|
||||
@@ -1990,10 +1990,10 @@
|
||||
"id": "04a055ea-ffa9-540b-e1d2-d5c1bfd5bc7b",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Suspicious Teams Application Related ObjectAcess Event"
|
||||
},
|
||||
@@ -2017,8 +2017,8 @@
|
||||
"id": "d74b03af-7e5f-bc5b-9e84-9d44af3d61b7",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Suspicious Scheduled Task Update"
|
||||
},
|
||||
@@ -2181,17 +2181,17 @@
|
||||
"description": "Detects files that have extensions commonly seen while SDelete is used to wipe files.",
|
||||
"event_ids": [
|
||||
"4656",
|
||||
"4663",
|
||||
"4658"
|
||||
"4658",
|
||||
"4663"
|
||||
],
|
||||
"id": "70c3269a-a7f2-49bd-1e28-a0921f353db7",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9223-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potential Secure Deletion with SDelete"
|
||||
},
|
||||
@@ -2237,14 +2237,14 @@
|
||||
{
|
||||
"description": "Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.\n",
|
||||
"event_ids": [
|
||||
"5145",
|
||||
"5136"
|
||||
"5136",
|
||||
"5145"
|
||||
],
|
||||
"id": "bc613d09-5a80-cad3-6f65-c5020f960511",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9244-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030"
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9244-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Startup/Logon Script Added to Group Policy Object"
|
||||
},
|
||||
@@ -2301,8 +2301,8 @@
|
||||
{
|
||||
"description": "Detects execution of EDRSilencer, a tool that abuses the Windows Filtering Platform (WFP) to block the outbound traffic of running EDR agents based on specific hardcoded filter names.\n",
|
||||
"event_ids": [
|
||||
"5441",
|
||||
"5447"
|
||||
"5447",
|
||||
"5441"
|
||||
],
|
||||
"id": "4d56e133-40b5-5b28-07b5-bab0913fc338",
|
||||
"level": "high",
|
||||
@@ -2484,16 +2484,16 @@
|
||||
{
|
||||
"description": "Alerts on Metasploit host's authentications on the domain.",
|
||||
"event_ids": [
|
||||
"4624",
|
||||
"4776",
|
||||
"4625",
|
||||
"4776"
|
||||
"4624"
|
||||
],
|
||||
"id": "827aa6c1-1507-3f0a-385a-ade5251bfd71",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE923F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE923F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Metasploit SMB Authentication"
|
||||
},
|
||||
@@ -2580,8 +2580,8 @@
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "LSASS Access From Non System Account"
|
||||
},
|
||||
@@ -2616,8 +2616,8 @@
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "SCM Database Handle Failure"
|
||||
@@ -2678,26 +2678,26 @@
|
||||
"id": "d1909400-93d7-de3c-ba13-153c64499c7c",
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Service Registry Key Read Access Request"
|
||||
},
|
||||
{
|
||||
"description": "Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.\n",
|
||||
"event_ids": [
|
||||
"4663",
|
||||
"4656"
|
||||
"4656",
|
||||
"4663"
|
||||
],
|
||||
"id": "777523b0-14f8-1ca2-12c9-d668153661ff",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Windows Defender Exclusion Registry Key - Write Access Requested"
|
||||
},
|
||||
@@ -2717,8 +2717,8 @@
|
||||
{
|
||||
"description": "One of the Windows Eventlogs has been cleared. e.g. caused by \"wevtutil cl\" command execution",
|
||||
"event_ids": [
|
||||
"1102",
|
||||
"517"
|
||||
"517",
|
||||
"1102"
|
||||
],
|
||||
"id": "9b14c9d8-6b61-e49f-f8a8-0836d0ad98c9",
|
||||
"level": "high",
|
||||
@@ -2759,24 +2759,24 @@
|
||||
"id": "cd93b6ed-961d-ed36-92db-bd44bccda695",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9228-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9229-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9229-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9228-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'"
|
||||
},
|
||||
{
|
||||
"description": "This events that are generated when using the hacktool Ruler by Sensepost",
|
||||
"event_ids": [
|
||||
"4625",
|
||||
"4776",
|
||||
"4624"
|
||||
"4624",
|
||||
"4625"
|
||||
],
|
||||
"id": "8b40829b-4556-9bec-a8ad-905688497639",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Hacktool Ruler"
|
||||
},
|
||||
@@ -2807,8 +2807,8 @@
|
||||
{
|
||||
"description": "Detects the creation of a user with the \"$\" character. This can be used by attackers to hide a user or trick detection systems that lack the parsing mechanisms.\n",
|
||||
"event_ids": [
|
||||
"4720",
|
||||
"4781"
|
||||
"4781",
|
||||
"4720"
|
||||
],
|
||||
"id": "ec77919c-1169-6640-23e7-91c6f27ddc91",
|
||||
"level": "medium",
|
||||
@@ -2825,10 +2825,10 @@
|
||||
"id": "d81faa44-ff28-8f61-097b-92727b8af44b",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Password Dumper Activity on LSASS"
|
||||
},
|
||||
@@ -2841,8 +2841,8 @@
|
||||
"id": "9ce591d7-6b6d-444a-8c27-8ca626dddad3",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Important Scheduled Task Deleted/Disabled"
|
||||
},
|
||||
@@ -2867,8 +2867,8 @@
|
||||
"id": "c9123898-04d5-2d3b-5e2b-7c0c92111480",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9235-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9235-69AE-11D9-BED3-505054503030",
|
||||
"0CCE923C-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Active Directory User Backdoors"
|
||||
},
|
||||
@@ -2881,10 +2881,10 @@
|
||||
"id": "763d50d7-9452-0146-18a1-9ca65e3a2f73",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Azure AD Health Service Agents Registry Keys Access"
|
||||
},
|
||||
@@ -2972,8 +2972,8 @@
|
||||
{
|
||||
"description": "Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.",
|
||||
"event_ids": [
|
||||
"4904",
|
||||
"4905"
|
||||
"4905",
|
||||
"4904"
|
||||
],
|
||||
"id": "00f253a0-1035-e450-7f6e-e2291dee27ec",
|
||||
"level": "informational",
|
||||
@@ -3033,11 +3033,11 @@
|
||||
{
|
||||
"description": "Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges.\nSigma detects\nEvent ID 4728 indicates a \"Member is added to a Security Group\".\nEvent ID 4729 indicates a \"Member is removed from a Security enabled-group\".\nEvent ID 4730 indicates a \"Security Group is deleted\".\nThe case is not applicable for Unix OS.\nSupported OS - Windows 2008 R2 and 7, Windows 2012 R2 and 8.1, Windows 2016 and 10 Windows Server 2019, Windows Server 2000, Windows 2003 and XP.\n",
|
||||
"event_ids": [
|
||||
"4729",
|
||||
"633",
|
||||
"4728",
|
||||
"4730",
|
||||
"633",
|
||||
"632",
|
||||
"4728",
|
||||
"4729",
|
||||
"634"
|
||||
],
|
||||
"id": "506379d9-8545-c010-e9a3-693119ab9261",
|
||||
@@ -3095,8 +3095,8 @@
|
||||
"id": "84202b5b-54c1-473b-4568-e10da23b3eb8",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Multiple Users Failing to Authenticate from Single Process"
|
||||
},
|
||||
@@ -3108,8 +3108,8 @@
|
||||
"id": "89ed0fbe-11b8-ce3c-e025-59925225ee99",
|
||||
"level": "low",
|
||||
"subcategory_guids": [
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Rare Schtasks Creations"
|
||||
},
|
||||
@@ -3157,8 +3157,8 @@
|
||||
"id": "888d3e17-a1ed-6b11-895c-e1f9b96b35be",
|
||||
"level": "high",
|
||||
"subcategory_guids": [
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
@@ -3198,8 +3198,8 @@
|
||||
"id": "428d3964-3241-1ceb-8f93-b31d8490c822",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Failed Logins with Different Accounts from Single Source System"
|
||||
},
|
||||
@@ -3211,10 +3211,10 @@
|
||||
"id": "a4504cb2-23f6-6d94-5ae6-d6013cf1d995",
|
||||
"level": "medium",
|
||||
"subcategory_guids": [
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Suspicious Multiple File Rename Or Delete Occurred"
|
||||
},
|
||||
|
||||
Reference in New Issue
Block a user