Sigma Rule Update (2025-06-05 20:13:02) (#76)

Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
github-actions[bot]
2025-06-05 20:13:09 +00:00
committed by GitHub
parent 7154f4d885
commit d5d6760a32

View File

@@ -6982,6 +6982,23 @@
],
"title": "Sysinternals PsSuspend Execution"
},
{
"category": "process_creation",
"channel": [
"sec"
],
"description": "Detects the execution of obfuscated PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`).\nThe technique involves manipulating strings to hide functionality, such as constructing class names using string insertion (e.g., 'indowsInstaller.Installer'.Insert(0,'W')) and correcting\nmalformed URLs (e.g., converting 'htps://' to 'https://') at runtime. This behavior is commonly associated with malware loaders or droppers that aim to bypass static detection\nby hiding intent in runtime-generated strings and using legitimate tools for code execution. The use of `InstallProduct` and COM object creation, particularly combined with\nhidden window execution and suppressed UI, indicates an attempt to install software (likely malicious) without user interaction.\n",
"event_ids": [
"4688"
],
"id": "74a80804-adfc-f831-6290-6ae386436db4",
"level": "high",
"service": "",
"subcategory_guids": [
"0CCE922B-69AE-11D9-BED3-505054503030"
],
"title": "Obfuscated PowerShell MSI Install via WindowsInstaller COM"
},
{
"category": "process_creation",
"channel": [
@@ -13491,7 +13508,7 @@
"subcategory_guids": [
"0CCE922B-69AE-11D9-BED3-505054503030"
],
"title": "Potential PowerShell Obfuscation Via WCHAR"
"title": "Potential PowerShell Obfuscation Via WCHAR/CHAR"
},
{
"category": "process_creation",
@@ -15509,7 +15526,7 @@
"4688"
],
"id": "1d0387b6-6de7-eb5c-ffe9-ee892ff26f07",
"level": "medium",
"level": "high",
"service": "",
"subcategory_guids": [
"0CCE922B-69AE-11D9-BED3-505054503030"
@@ -31943,23 +31960,6 @@
],
"title": "Potential CVE-2021-40444 Exploitation Attempt"
},
{
"category": "registry_set",
"channel": [
"sec"
],
"description": "Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum",
"event_ids": [
"4657"
],
"id": "a4072638-9c3a-3307-e4f9-458edbb60efb",
"level": "critical",
"service": "",
"subcategory_guids": [
"0CCE921E-69AE-11D9-BED3-505054503030"
],
"title": "CVE-2021-31979 CVE-2021-33771 Exploits"
},
{
"category": "",
"channel": [
@@ -31979,20 +31979,21 @@
"title": "Potential CVE-2021-42278 Exploitation Attempt"
},
{
"category": "",
"category": "registry_set",
"channel": [
"MSExchange Management"
"sec"
],
"description": "Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321",
"description": "Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum",
"event_ids": [
"6",
"8"
"4657"
],
"id": "429ee035-2f74-8a92-ad19-a448e450bb5e",
"level": "high",
"service": "msexchange-management",
"subcategory_guids": [],
"title": "Possible Exploitation of Exchange RCE CVE-2021-42321"
"id": "a4072638-9c3a-3307-e4f9-458edbb60efb",
"level": "critical",
"service": "",
"subcategory_guids": [
"0CCE921E-69AE-11D9-BED3-505054503030"
],
"title": "CVE-2021-31979 CVE-2021-33771 Exploits"
},
{
"category": "process_creation",
@@ -32011,6 +32012,22 @@
],
"title": "Potential SystemNightmare Exploitation Attempt"
},
{
"category": "",
"channel": [
"MSExchange Management"
],
"description": "Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321",
"event_ids": [
"6",
"8"
],
"id": "429ee035-2f74-8a92-ad19-a448e450bb5e",
"level": "high",
"service": "msexchange-management",
"subcategory_guids": [],
"title": "Possible Exploitation of Exchange RCE CVE-2021-42321"
},
{
"category": "process_creation",
"channel": [
@@ -33030,21 +33047,6 @@
],
"title": "CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process"
},
{
"category": "",
"channel": [
"Application"
],
"description": "Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation",
"event_ids": [
"2027"
],
"id": "0bcc2c11-231f-f491-7985-3571fee7f2c5",
"level": "high",
"service": "application",
"subcategory_guids": [],
"title": "MSMQ Corrupted Packet Encountered"
},
{
"category": "process_creation",
"channel": [
@@ -33149,6 +33151,21 @@
"subcategory_guids": [],
"title": "CVE-2023-40477 Potential Exploitation - WinRAR Application Crash"
},
{
"category": "",
"channel": [
"Application"
],
"description": "Detects corrupted packets sent to the MSMQ service. Could potentially be a sign of CVE-2023-21554 exploitation",
"event_ids": [
"2027"
],
"id": "0bcc2c11-231f-f491-7985-3571fee7f2c5",
"level": "high",
"service": "application",
"subcategory_guids": [],
"title": "MSMQ Corrupted Packet Encountered"
},
{
"category": "",
"channel": [