mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-22 08:53:08 +01:00
Sigma Rule Update (2025-06-25 20:15:58) (#82)
Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
4d73e7db41
commit
7537634077
@@ -6264,6 +6264,23 @@
|
|||||||
],
|
],
|
||||||
"title": "Allow Service Access Using Security Descriptor Tampering Via Sc.EXE"
|
"title": "Allow Service Access Using Security Descriptor Tampering Via Sc.EXE"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"category": "process_creation",
|
||||||
|
"channel": [
|
||||||
|
"sec"
|
||||||
|
],
|
||||||
|
"description": "Detects potential execution of MeshAgent which is a tool used for remote access.\nHistorical data shows that threat actors rename MeshAgent binary to evade detection.\nMatching command lines with the '--meshServiceName' argument can indicate that the MeshAgent is being used for remote access.\n",
|
||||||
|
"event_ids": [
|
||||||
|
"4688"
|
||||||
|
],
|
||||||
|
"id": "8137d225-9af4-eac6-7709-6bcb96a183f2",
|
||||||
|
"level": "medium",
|
||||||
|
"service": "",
|
||||||
|
"subcategory_guids": [
|
||||||
|
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||||
|
],
|
||||||
|
"title": "Remote Access Tool - Potential MeshAgent Execution - Windows"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"category": "process_creation",
|
"category": "process_creation",
|
||||||
"channel": [
|
"channel": [
|
||||||
@@ -13727,6 +13744,23 @@
|
|||||||
],
|
],
|
||||||
"title": "Suspicious GUP Usage"
|
"title": "Suspicious GUP Usage"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"category": "process_creation",
|
||||||
|
"channel": [
|
||||||
|
"sec"
|
||||||
|
],
|
||||||
|
"description": "Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent.\nRMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management.\nHowever, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.\n",
|
||||||
|
"event_ids": [
|
||||||
|
"4688"
|
||||||
|
],
|
||||||
|
"id": "3ab572a4-6b9c-6004-a772-cf0ce1400109",
|
||||||
|
"level": "high",
|
||||||
|
"service": "",
|
||||||
|
"subcategory_guids": [
|
||||||
|
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||||
|
],
|
||||||
|
"title": "Remote Access Tool - Renamed MeshAgent Execution - Windows"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"category": "process_creation",
|
"category": "process_creation",
|
||||||
"channel": [
|
"channel": [
|
||||||
|
|||||||
Reference in New Issue
Block a user