mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 17:22:50 +01:00
Automated update
This commit is contained in:
@@ -55,8 +55,8 @@
|
|||||||
"id": "60d768ca-33e8-4f34-b967-14fd7aa18a22",
|
"id": "60d768ca-33e8-4f34-b967-14fd7aa18a22",
|
||||||
"level": "informational",
|
"level": "informational",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Task Created"
|
"title": "Task Created"
|
||||||
},
|
},
|
||||||
@@ -68,8 +68,8 @@
|
|||||||
"id": "de5ed02e-e7b5-47a0-a35c-06a907c988e4",
|
"id": "de5ed02e-e7b5-47a0-a35c-06a907c988e4",
|
||||||
"level": "informational",
|
"level": "informational",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Task Deleted"
|
"title": "Task Deleted"
|
||||||
},
|
},
|
||||||
@@ -391,8 +391,8 @@
|
|||||||
"id": "4574194d-e7ca-4356-a95c-21b753a1787e",
|
"id": "4574194d-e7ca-4356-a95c-21b753a1787e",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "User Guessing"
|
"title": "User Guessing"
|
||||||
},
|
},
|
||||||
@@ -404,8 +404,8 @@
|
|||||||
"id": "b2c74582-0d44-49fe-8faa-014dcdafee62",
|
"id": "b2c74582-0d44-49fe-8faa-014dcdafee62",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Failed Logon - Non-Existent User"
|
"title": "Failed Logon - Non-Existent User"
|
||||||
},
|
},
|
||||||
@@ -453,8 +453,8 @@
|
|||||||
"id": "a85096da-be85-48d7-8ad5-2f957cd74daa",
|
"id": "a85096da-be85-48d7-8ad5-2f957cd74daa",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Logon Failure (Unknown Reason)"
|
"title": "Logon Failure (Unknown Reason)"
|
||||||
},
|
},
|
||||||
@@ -514,8 +514,8 @@
|
|||||||
"id": "5b0b75dc-9190-4047-b9a8-14164cee8a31",
|
"id": "5b0b75dc-9190-4047-b9a8-14164cee8a31",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Failed Logon - Incorrect Password"
|
"title": "Failed Logon - Incorrect Password"
|
||||||
},
|
},
|
||||||
@@ -539,8 +539,8 @@
|
|||||||
"id": "8afa97ce-a217-4f7c-aced-3e320a57756d",
|
"id": "8afa97ce-a217-4f7c-aced-3e320a57756d",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Logon Failure (User Does Not Exist)"
|
"title": "Logon Failure (User Does Not Exist)"
|
||||||
},
|
},
|
||||||
@@ -625,8 +625,8 @@
|
|||||||
"id": "35e8a0fc-60c2-46d7-ba39-aafb15b9854e",
|
"id": "35e8a0fc-60c2-46d7-ba39-aafb15b9854e",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "PW Guessing"
|
"title": "PW Guessing"
|
||||||
},
|
},
|
||||||
@@ -1018,8 +1018,8 @@
|
|||||||
"id": "798c8f65-068a-0a31-009f-12739f547a2d",
|
"id": "798c8f65-068a-0a31-009f-12739f547a2d",
|
||||||
"level": "critical",
|
"level": "critical",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030"
|
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "OilRig APT Schedule Task Persistence - Security"
|
"title": "OilRig APT Schedule Task Persistence - Security"
|
||||||
},
|
},
|
||||||
@@ -1082,23 +1082,23 @@
|
|||||||
"id": "74d067bc-3f42-3855-c13d-771d589cf11c",
|
"id": "74d067bc-3f42-3855-c13d-771d589cf11c",
|
||||||
"level": "critical",
|
"level": "critical",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security"
|
"title": "CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Detects any creation or modification to a windows domain group with the name \"ESX Admins\".\nThis could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor.\nVMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named \"ESX Admins\" to have full administrative access by default.\n",
|
"description": "Detects any creation or modification to a windows domain group with the name \"ESX Admins\".\nThis could indicates a potential exploitation attempt of CVE-2024-37085, which allows an attacker to elevate their privileges to full administrative access on an domain-joined ESXi hypervisor.\nVMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named \"ESX Admins\" to have full administrative access by default.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
|
"4754",
|
||||||
"4727",
|
"4727",
|
||||||
|
"4728",
|
||||||
"4731",
|
"4731",
|
||||||
"4737",
|
"4737",
|
||||||
"4755",
|
"4755",
|
||||||
"4756",
|
"4756"
|
||||||
"4754",
|
|
||||||
"4728"
|
|
||||||
],
|
],
|
||||||
"id": "2a451b93-9890-5cfe-38aa-1dc4f8f0fe0a",
|
"id": "2a451b93-9890-5cfe-38aa-1dc4f8f0fe0a",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
@@ -1711,16 +1711,16 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects outlook initiating connection to a WebDAV or SMB share, which could be a sign of CVE-2023-23397 exploitation.",
|
"description": "Detects outlook initiating connection to a WebDAV or SMB share, which could be a sign of CVE-2023-23397 exploitation.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4663",
|
"4656",
|
||||||
"4656"
|
"4663"
|
||||||
],
|
],
|
||||||
"id": "1aeb71a3-31b4-1a5e-85d8-1631c3a73d43",
|
"id": "1aeb71a3-31b4-1a5e-85d8-1631c3a73d43",
|
||||||
"level": "critical",
|
"level": "critical",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "CVE-2023-23397 Exploitation Attempt"
|
"title": "CVE-2023-23397 Exploitation Attempt"
|
||||||
},
|
},
|
||||||
@@ -1816,8 +1816,8 @@
|
|||||||
"id": "05731ce3-cfda-dbba-3792-c17794a22cf7",
|
"id": "05731ce3-cfda-dbba-3792-c17794a22cf7",
|
||||||
"level": "critical",
|
"level": "critical",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Diamond Sleet APT Scheduled Task Creation"
|
"title": "Diamond Sleet APT Scheduled Task Creation"
|
||||||
},
|
},
|
||||||
@@ -1885,8 +1885,8 @@
|
|||||||
"description": "Hunts for known SVR-specific scheduled task names",
|
"description": "Hunts for known SVR-specific scheduled task names",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4698",
|
"4698",
|
||||||
"4702",
|
"4699",
|
||||||
"4699"
|
"4702"
|
||||||
],
|
],
|
||||||
"id": "ae16af08-e56e-414a-ceba-cb62e9f3a2ef",
|
"id": "ae16af08-e56e-414a-ceba-cb62e9f3a2ef",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
@@ -2679,18 +2679,18 @@
|
|||||||
{
|
{
|
||||||
"description": "Detect access to files and shares with names and extensions used by BlueSky ransomware which could indicate a current or previous encryption attempt.",
|
"description": "Detect access to files and shares with names and extensions used by BlueSky ransomware which could indicate a current or previous encryption attempt.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4656",
|
"5145",
|
||||||
"4663",
|
"4663",
|
||||||
"5145"
|
"4656"
|
||||||
],
|
],
|
||||||
"id": "21ead34c-d2d4-2799-6318-2ff9e4aa9222",
|
"id": "21ead34c-d2d4-2799-6318-2ff9e4aa9222",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9244-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
"0CCE9244-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "BlueSky Ransomware Artefacts"
|
"title": "BlueSky Ransomware Artefacts"
|
||||||
},
|
},
|
||||||
@@ -3045,14 +3045,14 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects the attack technique pass the hash which is used to move laterally inside the network",
|
"description": "Detects the attack technique pass the hash which is used to move laterally inside the network",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4625",
|
"4624",
|
||||||
"4624"
|
"4625"
|
||||||
],
|
],
|
||||||
"id": "35890fd4-9ed3-b244-0eff-91fe61e52f8b",
|
"id": "35890fd4-9ed3-b244-0eff-91fe61e52f8b",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Potential Pass the Hash Activity"
|
"title": "Potential Pass the Hash Activity"
|
||||||
},
|
},
|
||||||
@@ -3071,8 +3071,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects logon with \"Special groups\" and \"Special Privileges\" can be thought of as Administrator groups or privileges.",
|
"description": "Detects logon with \"Special groups\" and \"Special Privileges\" can be thought of as Administrator groups or privileges.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4964",
|
"4672",
|
||||||
"4672"
|
"4964"
|
||||||
],
|
],
|
||||||
"id": "b3d10465-f171-0ef7-d28e-8ef2f9409cf1",
|
"id": "b3d10465-f171-0ef7-d28e-8ef2f9409cf1",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
@@ -3085,9 +3085,9 @@
|
|||||||
"description": "Detects interactive console logons to Server Systems",
|
"description": "Detects interactive console logons to Server Systems",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4625",
|
"4625",
|
||||||
|
"529",
|
||||||
"528",
|
"528",
|
||||||
"4624",
|
"4624"
|
||||||
"529"
|
|
||||||
],
|
],
|
||||||
"id": "7298c707-7564-3229-7c76-ec514847d8c2",
|
"id": "7298c707-7564-3229-7c76-ec514847d8c2",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
@@ -16138,10 +16138,10 @@
|
|||||||
"id": "7619b716-8052-6323-d9c7-87923ef591e6",
|
"id": "7619b716-8052-6323-d9c7-87923ef591e6",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Access To Browser Credential Files By Uncommon Applications - Security"
|
"title": "Access To Browser Credential Files By Uncommon Applications - Security"
|
||||||
},
|
},
|
||||||
@@ -16357,10 +16357,10 @@
|
|||||||
"id": "4faa08cb-e57e-bb07-cfc2-2153a97a99bf",
|
"id": "4faa08cb-e57e-bb07-cfc2-2153a97a99bf",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "ISO Image Mounted"
|
"title": "ISO Image Mounted"
|
||||||
},
|
},
|
||||||
@@ -16372,8 +16372,8 @@
|
|||||||
"id": "cd7d9f05-3bf6-21f6-6686-e602ab6d72ba",
|
"id": "cd7d9f05-3bf6-21f6-6686-e602ab6d72ba",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Suspicious Scheduled Task Creation"
|
"title": "Suspicious Scheduled Task Creation"
|
||||||
},
|
},
|
||||||
@@ -16397,17 +16397,17 @@
|
|||||||
"id": "1085e6d3-6691-5713-42ba-ba8933a6b2d0",
|
"id": "1085e6d3-6691-5713-42ba-ba8933a6b2d0",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9210-69AE-11D9-BED3-505054503030",
|
"69979849-797A-11D9-BED3-505054503030",
|
||||||
"69979849-797A-11D9-BED3-505054503030"
|
"0CCE9210-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Unauthorized System Time Modification"
|
"title": "Unauthorized System Time Modification"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "An attacker can use the SID history attribute to gain additional privileges.",
|
"description": "An attacker can use the SID history attribute to gain additional privileges.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4766",
|
"4738",
|
||||||
"4765",
|
"4765",
|
||||||
"4738"
|
"4766"
|
||||||
],
|
],
|
||||||
"id": "5335aea0-f1b4-e120-08b6-c80fe4bf99ad",
|
"id": "5335aea0-f1b4-e120-08b6-c80fe4bf99ad",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
@@ -16466,10 +16466,10 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.",
|
"description": "Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"675",
|
"4769",
|
||||||
"4771",
|
"4771",
|
||||||
"4768",
|
"675",
|
||||||
"4769"
|
"4768"
|
||||||
],
|
],
|
||||||
"id": "978525c2-97aa-f0e4-8c11-3cf81ea3379b",
|
"id": "978525c2-97aa-f0e4-8c11-3cf81ea3379b",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
@@ -16494,8 +16494,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.\n",
|
"description": "Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"5038",
|
"6281",
|
||||||
"6281"
|
"5038"
|
||||||
],
|
],
|
||||||
"id": "4f738466-2a14-5842-1eb3-481614770a49",
|
"id": "4f738466-2a14-5842-1eb3-481614770a49",
|
||||||
"level": "informational",
|
"level": "informational",
|
||||||
@@ -16548,8 +16548,8 @@
|
|||||||
"id": "93c95eee-748a-e1db-18a5-f40035167086",
|
"id": "93c95eee-748a-e1db-18a5-f40035167086",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE923B-69AE-11D9-BED3-505054503030",
|
"0CCE9220-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9220-69AE-11D9-BED3-505054503030"
|
"0CCE923B-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "AD Privileged Users or Groups Reconnaissance"
|
"title": "AD Privileged Users or Groups Reconnaissance"
|
||||||
},
|
},
|
||||||
@@ -16598,8 +16598,8 @@
|
|||||||
"id": "c800ccd5-5818-b0f5-1a12-f9c8bc24a433",
|
"id": "c800ccd5-5818-b0f5-1a12-f9c8bc24a433",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9236-69AE-11D9-BED3-505054503030",
|
"0CCE923C-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE923C-69AE-11D9-BED3-505054503030"
|
"0CCE9236-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Possible DC Shadow Attack"
|
"title": "Possible DC Shadow Attack"
|
||||||
},
|
},
|
||||||
@@ -16613,9 +16613,9 @@
|
|||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Potentially Suspicious AccessMask Requested From LSASS"
|
"title": "Potentially Suspicious AccessMask Requested From LSASS"
|
||||||
},
|
},
|
||||||
@@ -16634,16 +16634,16 @@
|
|||||||
{
|
{
|
||||||
"description": "This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent.\nThis detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\\SOFTWARE\\Microsoft\\Microsoft Online\\Reporting\\MonitoringAgent.\n",
|
"description": "This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent.\nThis detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\\SOFTWARE\\Microsoft\\Microsoft Online\\Reporting\\MonitoringAgent.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4663",
|
"4656",
|
||||||
"4656"
|
"4663"
|
||||||
],
|
],
|
||||||
"id": "321196fe-fb10-6b13-c611-3dfe40baa1af",
|
"id": "321196fe-fb10-6b13-c611-3dfe40baa1af",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Azure AD Health Monitoring Agent Registry Keys Access"
|
"title": "Azure AD Health Monitoring Agent Registry Keys Access"
|
||||||
},
|
},
|
||||||
@@ -16801,41 +16801,41 @@
|
|||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE923F-69AE-11D9-BED3-505054503030",
|
"0CCE923F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Account Tampering - Suspicious Failed Logon Reasons"
|
"title": "Account Tampering - Suspicious Failed Logon Reasons"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Potential threat actor tampering with Sysmon manifest and eventually disabling it",
|
"description": "Potential threat actor tampering with Sysmon manifest and eventually disabling it",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4663",
|
"4657",
|
||||||
"4657"
|
"4663"
|
||||||
],
|
],
|
||||||
"id": "249d836c-8857-1b98-5d7b-050c2d34e275",
|
"id": "249d836c-8857-1b98-5d7b-050c2d34e275",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Sysmon Channel Reference Deletion"
|
"title": "Sysmon Channel Reference Deletion"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Potential adversaries accessing the microphone and webcam in an endpoint.",
|
"description": "Potential adversaries accessing the microphone and webcam in an endpoint.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4663",
|
"4657",
|
||||||
"4656",
|
"4656",
|
||||||
"4657"
|
"4663"
|
||||||
],
|
],
|
||||||
"id": "32337bc9-8e75-bdaf-eaf4-d3b19ee08a67",
|
"id": "32337bc9-8e75-bdaf-eaf4-d3b19ee08a67",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Processes Accessing the Microphone and Webcam"
|
"title": "Processes Accessing the Microphone and Webcam"
|
||||||
},
|
},
|
||||||
@@ -16848,10 +16848,10 @@
|
|||||||
"id": "63308dbe-54a4-9c70-cc90-6d15e10f3505",
|
"id": "63308dbe-54a4-9c70-cc90-6d15e10f3505",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "SysKey Registry Keys Access"
|
"title": "SysKey Registry Keys Access"
|
||||||
},
|
},
|
||||||
@@ -16887,8 +16887,8 @@
|
|||||||
"id": "6bcac9cb-eeee-9f45-c5c1-0daaf023ac12",
|
"id": "6bcac9cb-eeee-9f45-c5c1-0daaf023ac12",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Failed Logon From Public IP"
|
"title": "Failed Logon From Public IP"
|
||||||
},
|
},
|
||||||
@@ -16920,8 +16920,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects activity when a member is removed from a security-enabled global group",
|
"description": "Detects activity when a member is removed from a security-enabled global group",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4729",
|
"633",
|
||||||
"633"
|
"4729"
|
||||||
],
|
],
|
||||||
"id": "6e0f860b-3678-7396-a4a3-7cf55f7bb01c",
|
"id": "6e0f860b-3678-7396-a4a3-7cf55f7bb01c",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
@@ -17029,8 +17029,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects activity when a security-enabled global group is deleted",
|
"description": "Detects activity when a security-enabled global group is deleted",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"634",
|
"4730",
|
||||||
"4730"
|
"634"
|
||||||
],
|
],
|
||||||
"id": "ae7d8d1c-f75b-d952-e84e-a7981b861590",
|
"id": "ae7d8d1c-f75b-d952-e84e-a7981b861590",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
@@ -17074,9 +17074,9 @@
|
|||||||
"level": "critical",
|
"level": "critical",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "WCE wceaux.dll Access"
|
"title": "WCE wceaux.dll Access"
|
||||||
},
|
},
|
||||||
@@ -17100,10 +17100,10 @@
|
|||||||
"id": "04a055ea-ffa9-540b-e1d2-d5c1bfd5bc7b",
|
"id": "04a055ea-ffa9-540b-e1d2-d5c1bfd5bc7b",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030"
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Suspicious Teams Application Related ObjectAcess Event"
|
"title": "Suspicious Teams Application Related ObjectAcess Event"
|
||||||
},
|
},
|
||||||
@@ -17147,8 +17147,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects a user log-off activity. Could be used for example to correlate information during forensic investigations",
|
"description": "Detects a user log-off activity. Could be used for example to correlate information during forensic investigations",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4634",
|
"4647",
|
||||||
"4647"
|
"4634"
|
||||||
],
|
],
|
||||||
"id": "73f64ce7-a76d-0208-ea75-dd26a09d719b",
|
"id": "73f64ce7-a76d-0208-ea75-dd26a09d719b",
|
||||||
"level": "informational",
|
"level": "informational",
|
||||||
@@ -17290,18 +17290,18 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects files that have extensions commonly seen while SDelete is used to wipe files.",
|
"description": "Detects files that have extensions commonly seen while SDelete is used to wipe files.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4663",
|
|
||||||
"4656",
|
"4656",
|
||||||
|
"4663",
|
||||||
"4658"
|
"4658"
|
||||||
],
|
],
|
||||||
"id": "70c3269a-a7f2-49bd-1e28-a0921f353db7",
|
"id": "70c3269a-a7f2-49bd-1e28-a0921f353db7",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9223-69AE-11D9-BED3-505054503030",
|
"0CCE9223-69AE-11D9-BED3-505054503030"
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
|
||||||
],
|
],
|
||||||
"title": "Potential Secure Deletion with SDelete"
|
"title": "Potential Secure Deletion with SDelete"
|
||||||
},
|
},
|
||||||
@@ -17337,24 +17337,24 @@
|
|||||||
"id": "d7742b08-730d-3624-df95-cc3c6eaa3a39",
|
"id": "d7742b08-730d-3624-df95-cc3c6eaa3a39",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "SAM Registry Hive Handle Request"
|
"title": "SAM Registry Hive Handle Request"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.\n",
|
"description": "Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"5145",
|
"5136",
|
||||||
"5136"
|
"5145"
|
||||||
],
|
],
|
||||||
"id": "bc613d09-5a80-cad3-6f65-c5020f960511",
|
"id": "bc613d09-5a80-cad3-6f65-c5020f960511",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE923C-69AE-11D9-BED3-505054503030",
|
"0CCE9244-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9244-69AE-11D9-BED3-505054503030"
|
"0CCE923C-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Startup/Logon Script Added to Group Policy Object"
|
"title": "Startup/Logon Script Added to Group Policy Object"
|
||||||
},
|
},
|
||||||
@@ -17379,8 +17379,8 @@
|
|||||||
"id": "5ac4b7f8-9412-f919-220c-aa8a1867b1ef",
|
"id": "5ac4b7f8-9412-f919-220c-aa8a1867b1ef",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9220-69AE-11D9-BED3-505054503030",
|
"0CCE923B-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE923B-69AE-11D9-BED3-505054503030"
|
"0CCE9220-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Reconnaissance Activity"
|
"title": "Reconnaissance Activity"
|
||||||
},
|
},
|
||||||
@@ -17417,8 +17417,8 @@
|
|||||||
"id": "4d56e133-40b5-5b28-07b5-bab0913fc338",
|
"id": "4d56e133-40b5-5b28-07b5-bab0913fc338",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9233-69AE-11D9-BED3-505054503030",
|
"0CCE9234-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9234-69AE-11D9-BED3-505054503030"
|
"0CCE9233-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "HackTool - EDRSilencer Execution - Filter Added"
|
"title": "HackTool - EDRSilencer Execution - Filter Added"
|
||||||
},
|
},
|
||||||
@@ -17594,16 +17594,16 @@
|
|||||||
{
|
{
|
||||||
"description": "Alerts on Metasploit host's authentications on the domain.",
|
"description": "Alerts on Metasploit host's authentications on the domain.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
|
"4625",
|
||||||
"4624",
|
"4624",
|
||||||
"4776",
|
"4776"
|
||||||
"4625"
|
|
||||||
],
|
],
|
||||||
"id": "827aa6c1-1507-3f0a-385a-ade5251bfd71",
|
"id": "827aa6c1-1507-3f0a-385a-ade5251bfd71",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
|
"0CCE923F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
"0CCE923F-69AE-11D9-BED3-505054503030"
|
|
||||||
],
|
],
|
||||||
"title": "Metasploit SMB Authentication"
|
"title": "Metasploit SMB Authentication"
|
||||||
},
|
},
|
||||||
@@ -17688,10 +17688,10 @@
|
|||||||
"id": "06b8bcc0-326b-518a-3868-fe0721488fb8",
|
"id": "06b8bcc0-326b-518a-3868-fe0721488fb8",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "LSASS Access From Non System Account"
|
"title": "LSASS Access From Non System Account"
|
||||||
},
|
},
|
||||||
@@ -17725,10 +17725,10 @@
|
|||||||
"id": "474caaa9-3115-c838-1509-59ffb6caecfc",
|
"id": "474caaa9-3115-c838-1509-59ffb6caecfc",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "SCM Database Handle Failure"
|
"title": "SCM Database Handle Failure"
|
||||||
},
|
},
|
||||||
@@ -17789,25 +17789,25 @@
|
|||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Service Registry Key Read Access Request"
|
"title": "Service Registry Key Read Access Request"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.\n",
|
"description": "Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4656",
|
"4663",
|
||||||
"4663"
|
"4656"
|
||||||
],
|
],
|
||||||
"id": "777523b0-14f8-1ca2-12c9-d668153661ff",
|
"id": "777523b0-14f8-1ca2-12c9-d668153661ff",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE921D-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Windows Defender Exclusion Registry Key - Write Access Requested"
|
"title": "Windows Defender Exclusion Registry Key - Write Access Requested"
|
||||||
},
|
},
|
||||||
@@ -17838,8 +17838,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators\n",
|
"description": "Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"5447",
|
"5449",
|
||||||
"5449"
|
"5447"
|
||||||
],
|
],
|
||||||
"id": "22d4af9f-97d9-4827-7209-c451ff7f43c6",
|
"id": "22d4af9f-97d9-4827-7209-c451ff7f43c6",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
@@ -17869,24 +17869,24 @@
|
|||||||
"id": "cd93b6ed-961d-ed36-92db-bd44bccda695",
|
"id": "cd93b6ed-961d-ed36-92db-bd44bccda695",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9229-69AE-11D9-BED3-505054503030",
|
"0CCE9228-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9228-69AE-11D9-BED3-505054503030"
|
"0CCE9229-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'"
|
"title": "User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"description": "This events that are generated when using the hacktool Ruler by Sensepost",
|
"description": "This events that are generated when using the hacktool Ruler by Sensepost",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4624",
|
"4776",
|
||||||
"4625",
|
"4625",
|
||||||
"4776"
|
"4624"
|
||||||
],
|
],
|
||||||
"id": "8b40829b-4556-9bec-a8ad-905688497639",
|
"id": "8b40829b-4556-9bec-a8ad-905688497639",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE923F-69AE-11D9-BED3-505054503030",
|
"0CCE923F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9215-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Hacktool Ruler"
|
"title": "Hacktool Ruler"
|
||||||
},
|
},
|
||||||
@@ -17935,10 +17935,10 @@
|
|||||||
"id": "d81faa44-ff28-8f61-097b-92727b8af44b",
|
"id": "d81faa44-ff28-8f61-097b-92727b8af44b",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030"
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Password Dumper Activity on LSASS"
|
"title": "Password Dumper Activity on LSASS"
|
||||||
},
|
},
|
||||||
@@ -17971,14 +17971,14 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects scenarios where one can control another users or computers account without having to use their credentials.",
|
"description": "Detects scenarios where one can control another users or computers account without having to use their credentials.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"5136",
|
"4738",
|
||||||
"4738"
|
"5136"
|
||||||
],
|
],
|
||||||
"id": "c9123898-04d5-2d3b-5e2b-7c0c92111480",
|
"id": "c9123898-04d5-2d3b-5e2b-7c0c92111480",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9235-69AE-11D9-BED3-505054503030",
|
"0CCE923C-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE923C-69AE-11D9-BED3-505054503030"
|
"0CCE9235-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Active Directory User Backdoors"
|
"title": "Active Directory User Backdoors"
|
||||||
},
|
},
|
||||||
@@ -17992,9 +17992,9 @@
|
|||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Azure AD Health Service Agents Registry Keys Access"
|
"title": "Azure AD Health Service Agents Registry Keys Access"
|
||||||
},
|
},
|
||||||
@@ -18082,8 +18082,8 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.",
|
"description": "Detects the registration of the security event source VSSAudit. It would usually trigger when volume shadow copy operations happen.",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4905",
|
"4904",
|
||||||
"4904"
|
"4905"
|
||||||
],
|
],
|
||||||
"id": "00f253a0-1035-e450-7f6e-e2291dee27ec",
|
"id": "00f253a0-1035-e450-7f6e-e2291dee27ec",
|
||||||
"level": "informational",
|
"level": "informational",
|
||||||
@@ -18184,9 +18184,9 @@
|
|||||||
"id": "7bd85790-c82a-56af-7127-f257e5ef6c6f",
|
"id": "7bd85790-c82a-56af-7127-f257e5ef6c6f",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Windows Defender Exclusion Deleted"
|
"title": "Windows Defender Exclusion Deleted"
|
||||||
},
|
},
|
||||||
@@ -18887,12 +18887,12 @@
|
|||||||
{
|
{
|
||||||
"description": "Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges.\nSigma detects\nEvent ID 4728 indicates a \"Member is added to a Security Group\".\nEvent ID 4729 indicates a \"Member is removed from a Security enabled-group\".\nEvent ID 4730 indicates a \"Security Group is deleted\".\nThe case is not applicable for Unix OS.\nSupported OS - Windows 2008 R2 and 7, Windows 2012 R2 and 8.1, Windows 2016 and 10 Windows Server 2019, Windows Server 2000, Windows 2003 and XP.\n",
|
"description": "Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges.\nSigma detects\nEvent ID 4728 indicates a \"Member is added to a Security Group\".\nEvent ID 4729 indicates a \"Member is removed from a Security enabled-group\".\nEvent ID 4730 indicates a \"Security Group is deleted\".\nThe case is not applicable for Unix OS.\nSupported OS - Windows 2008 R2 and 7, Windows 2012 R2 and 8.1, Windows 2016 and 10 Windows Server 2019, Windows Server 2000, Windows 2003 and XP.\n",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"633",
|
"4728",
|
||||||
"634",
|
"634",
|
||||||
"4729",
|
"4729",
|
||||||
"4728",
|
"633",
|
||||||
"632",
|
"4730",
|
||||||
"4730"
|
"632"
|
||||||
],
|
],
|
||||||
"id": "506379d9-8545-c010-e9a3-693119ab9261",
|
"id": "506379d9-8545-c010-e9a3-693119ab9261",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
@@ -19168,16 +19168,16 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects remote execution via scheduled task creation or update on the destination host",
|
"description": "Detects remote execution via scheduled task creation or update on the destination host",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
"4698",
|
|
||||||
"4702",
|
"4702",
|
||||||
"4624"
|
"4624",
|
||||||
|
"4698"
|
||||||
],
|
],
|
||||||
"id": "bc42c437-1ea8-fd0f-d964-e37a58d861fc",
|
"id": "bc42c437-1ea8-fd0f-d964-e37a58d861fc",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
"0CCE9226-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9227-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Remote Schtasks Creation"
|
"title": "Remote Schtasks Creation"
|
||||||
},
|
},
|
||||||
@@ -19214,8 +19214,8 @@
|
|||||||
"id": "89ed0fbe-11b8-ce3c-e025-59925225ee99",
|
"id": "89ed0fbe-11b8-ce3c-e025-59925225ee99",
|
||||||
"level": "low",
|
"level": "low",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9226-69AE-11D9-BED3-505054503030",
|
"0CCE9227-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9227-69AE-11D9-BED3-505054503030"
|
"0CCE9226-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Rare Schtasks Creations"
|
"title": "Rare Schtasks Creations"
|
||||||
},
|
},
|
||||||
@@ -19263,9 +19263,9 @@
|
|||||||
"id": "888d3e17-a1ed-6b11-895c-e1f9b96b35be",
|
"id": "888d3e17-a1ed-6b11-895c-e1f9b96b35be",
|
||||||
"level": "high",
|
"level": "high",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
"0CCE9245-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE921F-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Stored Credentials in Fake Files"
|
"title": "Stored Credentials in Fake Files"
|
||||||
@@ -19278,8 +19278,8 @@
|
|||||||
"id": "30e70d43-6368-123c-a3c8-d23309a3ff97",
|
"id": "30e70d43-6368-123c-a3c8-d23309a3ff97",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE9217-69AE-11D9-BED3-505054503030",
|
"0CCE9215-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9215-69AE-11D9-BED3-505054503030"
|
"0CCE9217-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Multiple Users Remotely Failing To Authenticate From Single Source"
|
"title": "Multiple Users Remotely Failing To Authenticate From Single Source"
|
||||||
},
|
},
|
||||||
@@ -19329,10 +19329,10 @@
|
|||||||
"id": "a4504cb2-23f6-6d94-5ae6-d6013cf1d995",
|
"id": "a4504cb2-23f6-6d94-5ae6-d6013cf1d995",
|
||||||
"level": "medium",
|
"level": "medium",
|
||||||
"subcategory_guids": [
|
"subcategory_guids": [
|
||||||
"0CCE921E-69AE-11D9-BED3-505054503030",
|
"0CCE921F-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE9245-69AE-11D9-BED3-505054503030",
|
|
||||||
"0CCE921D-69AE-11D9-BED3-505054503030",
|
"0CCE921D-69AE-11D9-BED3-505054503030",
|
||||||
"0CCE921F-69AE-11D9-BED3-505054503030"
|
"0CCE921E-69AE-11D9-BED3-505054503030",
|
||||||
|
"0CCE9245-69AE-11D9-BED3-505054503030"
|
||||||
],
|
],
|
||||||
"title": "Suspicious Multiple File Rename Or Delete Occurred"
|
"title": "Suspicious Multiple File Rename Or Delete Occurred"
|
||||||
},
|
},
|
||||||
@@ -19747,9 +19747,9 @@
|
|||||||
{
|
{
|
||||||
"description": "Detects the presence of a registry key created during Azorult execution",
|
"description": "Detects the presence of a registry key created during Azorult execution",
|
||||||
"event_ids": [
|
"event_ids": [
|
||||||
|
"4657",
|
||||||
"13",
|
"13",
|
||||||
"12",
|
"12"
|
||||||
"4657"
|
|
||||||
],
|
],
|
||||||
"id": "46595663-e666-c413-ccf4-028a618ca712",
|
"id": "46595663-e666-c413-ccf4-028a618ca712",
|
||||||
"level": "critical",
|
"level": "critical",
|
||||||
|
|||||||
Reference in New Issue
Block a user