mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-17 22:53:22 +01:00
Sigma Rule Update (2025-06-05 20:13:02) (#76)
Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
7154f4d885
commit
d5d6760a32
@@ -6982,6 +6982,23 @@
|
||||
],
|
||||
"title": "Sysinternals PsSuspend Execution"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects the execution of obfuscated PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`).\nThe technique involves manipulating strings to hide functionality, such as constructing class names using string insertion (e.g., 'indowsInstaller.Installer'.Insert(0,'W')) and correcting\nmalformed URLs (e.g., converting 'htps://' to 'https://') at runtime. This behavior is commonly associated with malware loaders or droppers that aim to bypass static detection\nby hiding intent in runtime-generated strings and using legitimate tools for code execution. The use of `InstallProduct` and COM object creation, particularly combined with\nhidden window execution and suppressed UI, indicates an attempt to install software (likely malicious) without user interaction.\n",
|
||||
"event_ids": [
|
||||
"4688"
|
||||
],
|
||||
"id": "74a80804-adfc-f831-6290-6ae386436db4",
|
||||
"level": "high",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Obfuscated PowerShell MSI Install via WindowsInstaller COM"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
@@ -13491,7 +13508,7 @@
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "Potential PowerShell Obfuscation Via WCHAR"
|
||||
"title": "Potential PowerShell Obfuscation Via WCHAR/CHAR"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
@@ -15509,7 +15526,7 @@
|
||||
"4688"
|
||||
],
|
||||
"id": "1d0387b6-6de7-eb5c-ffe9-ee892ff26f07",
|
||||
"level": "medium",
|
||||
"level": "high",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
@@ -31943,23 +31960,6 @@
|
||||
],
|
||||
"title": "Potential CVE-2021-40444 Exploitation Attempt"
|
||||
},
|
||||
{
|
||||
"category": "registry_set",
|
||||
"channel": [
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum",
|
||||
"event_ids": [
|
||||
"4657"
|
||||
],
|
||||
"id": "a4072638-9c3a-3307-e4f9-458edbb60efb",
|
||||
"level": "critical",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "CVE-2021-31979 CVE-2021-33771 Exploits"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"channel": [
|
||||
@@ -31979,20 +31979,21 @@
|
||||
"title": "Potential CVE-2021-42278 Exploitation Attempt"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"category": "registry_set",
|
||||
"channel": [
|
||||
"MSExchange Management"
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321",
|
||||
"description": "Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum",
|
||||
"event_ids": [
|
||||
"6",
|
||||
"8"
|
||||
"4657"
|
||||
],
|
||||
"id": "429ee035-2f74-8a92-ad19-a448e450bb5e",
|
||||
"level": "high",
|
||||
"service": "msexchange-management",
|
||||
"subcategory_guids": [],
|
||||
"title": "Possible Exploitation of Exchange RCE CVE-2021-42321"
|
||||
"id": "a4072638-9c3a-3307-e4f9-458edbb60efb",
|
||||
"level": "critical",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE921E-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "CVE-2021-31979 CVE-2021-33771 Exploits"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
@@ -32011,6 +32012,22 @@
|
||||
],
|
||||
"title": "Potential SystemNightmare Exploitation Attempt"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"channel": [
|
||||
"MSExchange Management"
|
||||
],
|
||||
"description": "Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321",
|
||||
"event_ids": [
|
||||
"6",
|
||||
"8"
|
||||
],
|
||||
"id": "429ee035-2f74-8a92-ad19-a448e450bb5e",
|
||||
"level": "high",
|
||||
"service": "msexchange-management",
|
||||
"subcategory_guids": [],
|
||||
"title": "Possible Exploitation of Exchange RCE CVE-2021-42321"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
@@ -33030,21 +33047,6 @@
|
||||
],
|
||||
"title": "CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"channel": [
|
||||
"Application"
|
||||
],
|
||||
"description": "Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation",
|
||||
"event_ids": [
|
||||
"2027"
|
||||
],
|
||||
"id": "0bcc2c11-231f-f491-7985-3571fee7f2c5",
|
||||
"level": "high",
|
||||
"service": "application",
|
||||
"subcategory_guids": [],
|
||||
"title": "MSMQ Corrupted Packet Encountered"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
@@ -33149,6 +33151,21 @@
|
||||
"subcategory_guids": [],
|
||||
"title": "CVE-2023-40477 Potential Exploitation - WinRAR Application Crash"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"channel": [
|
||||
"Application"
|
||||
],
|
||||
"description": "Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation",
|
||||
"event_ids": [
|
||||
"2027"
|
||||
],
|
||||
"id": "0bcc2c11-231f-f491-7985-3571fee7f2c5",
|
||||
"level": "high",
|
||||
"service": "application",
|
||||
"subcategory_guids": [],
|
||||
"title": "MSMQ Corrupted Packet Encountered"
|
||||
},
|
||||
{
|
||||
"category": "",
|
||||
"channel": [
|
||||
|
||||
Reference in New Issue
Block a user