ルール更新 (#224)

This commit is contained in:
Yamato Security
2021-11-23 15:04:03 +09:00
committed by GitHub
parent 034f9c0957
commit 015899bc51
2224 changed files with 2916 additions and 47186 deletions
@@ -0,0 +1,29 @@
title: Pingback Backdoor
author: Bhabesh Raj
date: 2021/05/05
description: Detects the use of Pingback backdoor that creates ICMP tunnel for C2
as described in the trustwave report
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*msdtc.exe'
SELECTION_3:
ImageLoaded: C:\Windows\oci.dll
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Very unlikely
id: 35a7dc42-bc6f-46e0-9f83-81f8e56c8d4b
level: high
logsource:
category: image_load
product: windows
modified: 2021/09/09
references:
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel
- https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406
status: experimental
tags:
- attack.persistence
- attack.t1574.001
@@ -0,0 +1,28 @@
title: SILENTTRINITY Stager Execution
author: Aleksey Potapov, oscd.community
date: 2019/10/22
description: Detects SILENTTRINITY stager use
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Description: '*st2stager*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- unknown
id: 75c505b1-711d-4f68-a357-8c3fe37dbf2d
level: high
logsource:
category: image_load
product: windows
modified: 2021/10/04
references:
- https://github.com/byt3bl33d3r/SILENTTRINITY
related:
- id: 03552375-cc2c-4883-bbe4-7958d5a980be
type: derived
status: experimental
tags:
- attack.command_and_control
- attack.t1071
@@ -0,0 +1,30 @@
title: Wmiprvse Wbemcomn DLL Hijack
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/12
description: Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\`
directory over the network and loading it for a WMI DLL Hijack scenario.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\wmiprvse.exe'
SELECTION_3:
ImageLoaded: '*\wbem\wbemcomn.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Unknown
id: 7707a579-e0d8-4886-a853-ce47e4575aaa
level: critical
logsource:
category: image_load
product: windows
modified: 2021/09/09
references:
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-201009173318.html
status: experimental
tags:
- attack.execution
- attack.t1047
- attack.lateral_movement
- attack.t1021.002
@@ -0,0 +1,33 @@
title: Time Travel Debugging Utility Usage
author: Ensar Şamil, @sblmsrsn, @oscd_initiative
date: 2020/10/06
description: Detects usage of Time Travel Debugging Utility. Adversaries can execute
malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
ParentImage: '*\tttracer.exe'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legitimate usage by software developers/testers
id: 0b4ae027-2a2d-4b93-8c7e-962caaba5b2a
level: high
logsource:
category: process_creation
product: windows
modified: 2021/09/21
references:
- https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
- https://twitter.com/mattifestation/status/1196390321783025666
- https://twitter.com/oulusoyum/status/1191329746069655553
related:
- id: e76c8240-d68f-4773-8880-5c6f63595aaf
type: derived
status: experimental
tags:
- attack.defense_evasion
- attack.credential_access
- attack.t1218
- attack.t1003.001
@@ -0,0 +1,37 @@
title: Abusing Azure Browser SSO
author: Den Iuzvyk
date: 2020/07/15
description: Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens
for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure
AD and a user logs in with their Azure AD account) wanting to perform SSO authentication
in the browser. An attacker can use this to authenticate to Azure AD in a browser
as that user.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded: '*MicrosoftAccountTokenProvider.dll'
SELECTION_3:
Image:
- '*BackgroundTaskHost.exe'
- '*devenv.exe'
- '*iexplore.exe'
- '*MicrosoftEdge.exe'
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3))
falsepositives:
- unknown
id: 50f852e6-af22-4c78-9ede-42ef36aa3453
level: high
logsource:
category: image_load
product: windows
modified: 2020/12/23
references:
- https://posts.specterops.io/requesting-azure-ad-request-tokens-on-azure-ad-joined-machines-for-browser-sso-2b0409caad30
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1073
- attack.t1574.002
@@ -0,0 +1,30 @@
title: Alternate PowerShell Hosts
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2019/09/12
description: Detects alternate PowerShell hosts potentially bypassing detections looking
for powershell.exe
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Description: System.Management.Automation
SELECTION_3:
ImageLoaded: '*System.Management.Automation*'
SELECTION_4:
Image: '*\powershell.exe'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
falsepositives:
- Unknown
id: fe6e002f-f244-4278-9263-20e4b593827f
level: medium
logsource:
category: image_load
product: windows
modified: 2021/05/12
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
status: experimental
tags:
- attack.execution
- attack.t1059.001
@@ -0,0 +1,24 @@
title: FoggyWeb Backdoor DLL Loading
author: Florian Roth
date: 2021/09/27
description: Detects DLL image load activity as used by FoggyWeb backdoor loader
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: C:\Windows\ADFS\version.dll
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Unlikely
id: 640dc51c-7713-4faa-8a0e-e7c0d9d4654c
level: critical
logsource:
category: image_load
product: windows
references:
- https://www.microsoft.com/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/
status: experimental
tags:
- attack.resource_development
- attack.t1587
@@ -0,0 +1,51 @@
title: In-memory PowerShell
author: Tom Kern, oscd.community, Natalia Shornikova, Tim Shelton
date: 2019/11/14
description: Detects loading of essential DLL used by PowerShell, but not by the process
powershell.exe. Detects meterpreter's "load powershell" extension.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\System.Management.Automation.Dll'
- '*\System.Management.Automation.ni.Dll'
SELECTION_3:
Image:
- '*\powershell.exe'
- '*\powershell_ise.exe'
- '*\WINDOWS\System32\sdiagnhost.exe'
- '*\mscorsvw.exe'
- '*\WINDOWS\System32\RemoteFXvGPUDisablement.exe'
- '*\sqlps.exe'
- '*\wsmprovhost.exe'
- '*\winrshost.exe'
- '*\syncappvpublishingserver.exe'
- '*\runscripthelper.exe'
- '*\ServerManager.exe'
- '*\Microsoft SQL Server Management Studio *\Common*\IDE\Ssms.exe'
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3))
enrichment:
- EN_0001_cache_sysmon_event_id_1_info
- EN_0003_enrich_other_sysmon_events_with_event_id_1_data
falsepositives:
- Used by some .NET binaries, minimal on user workstation.
- Used by Microsoft SQL Server Management Studio
id: 092bc4b9-3d1d-43b4-a6b4-8c8acd83522f
level: high
logsource:
category: image_load
product: windows
modified: 2021/11/11
references:
- https://adsecurity.org/?p=2921
- https://github.com/p3nt4/PowerShdll
related:
- id: 867613fb-fa60-4497-a017-a82df74a172c
type: obsoletes
status: experimental
tags:
- attack.t1086
- attack.t1059.001
- attack.execution
@@ -0,0 +1,26 @@
title: PCRE.NET Package Image Load
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/29
description: Detects processes loading modules related to PCRE.NET package
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded: '*\AppData\Local\Temp\ba9ea7344a4a5f591d6e5dc32a13494b\\*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Unknown
id: 84b0a8f3-680b-4096-a45b-e9a89221727c
level: high
logsource:
category: image_load
product: windows
modified: 2021/08/14
references:
- https://twitter.com/rbmaslen/status/1321859647091970051
- https://twitter.com/tifkin_/status/1321916444557365248
status: experimental
tags:
- attack.execution
- attack.t1059
@@ -0,0 +1,35 @@
title: WMI Script Host Process Image Loaded
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/09/02
description: Detects signs of the WMI script host process %SystemRoot%\system32\wbem\scrcons.exe
functionality being used via images being loaded by a process.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\scrcons.exe'
SELECTION_3:
ImageLoaded:
- '*\vbscript.dll'
- '*\wbemdisp.dll'
- '*\wshom.ocx'
- '*\scrrun.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Unknown
id: b439f47d-ef52-4b29-9a2f-57d8a96cb6b8
level: high
logsource:
category: image_load
product: windows
references:
- https://twitter.com/HunterPlaybook/status/1301207718355759107
- https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html
status: experimental
tags:
- attack.lateral_movement
- attack.privilege_escalation
- attack.persistence
- attack.t1546.003
@@ -0,0 +1,33 @@
title: Windows Spooler Service Suspicious Binary Load
author: FPT.EagleEye, Thomas Patzke (improvements)
date: 2021/06/29
description: Detect DLL Load from Spooler Service backup folder
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*spoolsv.exe'
SELECTION_3:
ImageLoaded: '*\Windows\System32\spool\drivers\x64\3\\*'
SELECTION_4:
ImageLoaded: '*.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Loading of legitimate driver
id: 02fb90de-c321-4e63-a6b9-25f4b03dfd14
level: informational
logsource:
category: image_load
product: windows
modified: 2021/08/24
references:
- https://github.com/hhlxf/PrintNightmare
status: experimental
tags:
- attack.persistence
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1574
- cve.2021.1675
- cve.2021.34527
@@ -0,0 +1,37 @@
title: Fax Service DLL Search Order Hijack
author: NVISO
date: 2020/05/04
description: The Fax service attempts to load ualapi.dll, which is non-existent. An
attacker can then (side)load their own malicious DLL using this service.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*fxssvc.exe'
SELECTION_3:
ImageLoaded:
- '*ualapi.dll'
SELECTION_4:
ImageLoaded:
- C:\Windows\WinSxS\\*
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
falsepositives:
- Unlikely
id: 828af599-4c53-4ed2-ba4a-a9f835c434ea
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://windows-internals.com/faxing-your-way-to-system/
status: experimental
tags:
- attack.persistence
- attack.defense_evasion
- attack.t1073
- attack.t1038
- attack.t1574.001
- attack.t1574.002
@@ -0,0 +1,32 @@
title: Possible Process Hollowing Image Loading
author: Markus Neis
date: 2018/01/07
description: Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g.
through process hollowing by Mimikatz
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\notepad.exe'
SELECTION_3:
ImageLoaded:
- '*\samlib.dll'
- '*\WinSCard.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Very likely, needs more tuning
id: e32ce4f5-46c6-4c47-ba69-5de3c9193cd7
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for.html
status: experimental
tags:
- attack.defense_evasion
- attack.t1073
- attack.t1574.002
@@ -0,0 +1,33 @@
title: dotNET DLL Loaded Via Office Applications
author: Antonlovesdnb
date: 2020/02/19
description: Detects any assembly DLL being loaded by an Office Product
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- C:\Windows\assembly\\*
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: ff0f2b05-09db-4095-b96d-1b75ca24894a
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,33 @@
title: CLR DLL Loaded Via Office Applications
author: Antonlovesdnb
date: 2020/02/19
description: Detects CLR DLL being loaded by an Office Product
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- '*\clr.dll*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: d13c43f0-f66b-4279-8b2c-5912077c1780
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,33 @@
title: GAC DLL Loaded Via Office Applications
author: Antonlovesdnb
date: 2020/02/19
description: Detects any GAC DLL being loaded by an Office Product
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- C:\Windows\Microsoft.NET\assembly\GAC_MSIL*
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: 90217a70-13fc-48e4-b3db-0d836c5824ac
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,33 @@
title: Active Directory Parsing DLL Loaded Via Office Applications
author: Antonlovesdnb
date: 2020/02/19
description: Detects DSParse DLL being loaded by an Office Product
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- '*\dsparse.dll*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: a2a3b925-7bb0-433b-b508-db9003263cc4
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,33 @@
title: Active Directory Kerberos DLL Loaded Via Office Applications
author: Antonlovesdnb
date: 2020/02/19
description: Detects Kerberos DLL being loaded by an Office Product
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- '*\kerberos.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: 7417e29e-c2e7-4cf6-a2e8-767228c64837
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,29 @@
title: Python Py2Exe Image Load
author: Patrick St. John, OTR (Open Threat Research)
date: 2020/05/03
description: Detects the image load of Python Core indicative of a Python script bundled
with Py2Exe.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Description: Python Core
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legit Py2Exe Binaries
fields:
- Description
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
level: medium
logsource:
category: image_load
product: windows
modified: 2021/05/12
references:
- https://www.py2exe.org/
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
status: experimental
tags:
- attack.defense_evasion
- attack.t1027.002
@@ -0,0 +1,35 @@
title: CLR DLL Loaded Via Scripting Applications
author: omkar72, oscd.community
date: 2020/10/14
description: Detects CLR DLL being loaded by an scripting applications
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\wscript.exe'
- '*\cscript.exe'
- '*\mshta.exe'
SELECTION_3:
ImageLoaded:
- '*\clr.dll'
- '*\mscoree.dll'
- '*\mscorlib.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- unknown
id: 4508a70e-97ef-4300-b62b-ff27992990ea
level: high
logsource:
category: image_load
product: windows
references:
- https://github.com/tyranid/DotNetToJScript
- https://thewover.github.io/Introducing-Donut/
- https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
status: experimental
tags:
- attack.execution
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,31 @@
title: Suspicious System.Drawing Load
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/05/02
description: A General detection for processes loading System.Drawing.ni.dll. This
could be an indicator of potential Screen Capture.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded: '*\System.Drawing.ni.dll'
SELECTION_3:
Image:
- '*\WmiPrvSE.exe'
- '*\mmc.exe'
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3))
falsepositives:
- unknown
id: 666ecfc7-229d-42b8-821e-1a8f8cb7057c
level: medium
logsource:
category: image_load
product: windows
modified: 2021/11/16
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/16
- https://threathunterplaybook.com/evals/apt29/detections/7.A.1_3B4E5808-3C71-406A-B181-17B0CE3178C9.html
status: experimental
tags:
- attack.collection
- attack.t1113
@@ -0,0 +1,35 @@
title: VBA DLL Loaded Via Microsoft Word
author: Antonlovesdnb
date: 2020/02/19
description: Detects DLL's Loaded Via Word Containing VBA Macros
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- '*\VBE7.DLL'
- '*\VBEUI.DLL'
- '*\VBE7INTL.DLL'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Alerts on legitimate macro usage as well, will need to filter as appropriate
id: e6ce8457-68b1-485b-9bdd-3c2b5d679aa9
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1204.002
@@ -0,0 +1,37 @@
title: Windows Management Instrumentation DLL Loaded Via Microsoft Word
author: Michael R. (@nahamike01)
date: 2019/12/26
description: Detects DLL's Loaded Via Word Containing VBA Macros Executing WMI Commands
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\winword.exe'
- '*\powerpnt.exe'
- '*\excel.exe'
- '*\outlook.exe'
SELECTION_3:
ImageLoaded:
- '*\wmiutils.dll'
- '*\wbemcomn.dll'
- '*\wbemprox.dll'
- '*\wbemdisp.dll'
- '*\wbemsvc.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Possible. Requires further testing.
id: a457f232-7df9-491d-898f-b5aabd2cbe2f
level: high
logsource:
category: image_load
product: windows
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
- https://www.carbonblack.com/2019/04/24/cb-tau-threat-intelligence-notification-emotet-utilizing-wmi-to-launch-powershell-encoded-code/
- https://media.cert.europa.eu/static/SecurityAdvisories/2019/CERT-EU-SA2019-021.pdf
status: experimental
tags:
- attack.execution
- attack.t1047
@@ -0,0 +1,72 @@
title: Load of dbghelp/dbgcore DLL from Suspicious Process
author: Perez Diego (@darkquassar), oscd.community, Ecco
date: 2019/10/27
description: Detects the load of dbghelp/dbgcore DLL (used to make memory dumps) by
suspicious processes. Tools like ProcessHacker and some attacker tradecract use
MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity
C2 Framework has a module that leverages this API to dump the contents of Lsass.exe
and transfer it over the network back to the attacker's machine.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\dbghelp.dll'
- '*\dbgcore.dll'
SELECTION_3:
Image:
- '*\msbuild.exe'
- '*\cmd.exe'
- '*\rundll32.exe'
- '*\powershell.exe'
- '*\word.exe'
- '*\excel.exe'
- '*\powerpnt.exe'
- '*\outlook.exe'
- '*\monitoringhost.exe'
- '*\wmic.exe'
- '*\bash.exe'
- '*\wscript.exe'
- '*\cscript.exe'
- '*\mshta.exe'
- '*\regsvr32.exe'
- '*\schtasks.exe'
- '*\dnx.exe'
- '*\regsvcs.exe'
- '*\sc.exe'
- '*\scriptrunner.exe'
SELECTION_4:
Image: '*Visual Studio*'
SELECTION_5:
ImageLoaded:
- '*\dbghelp.dll'
- '*\dbgcore.dll'
SELECTION_6:
Signed: 'FALSE'
SELECTION_7:
Image: '*Visual Studio*'
condition: (SELECTION_1 and (((SELECTION_2 and SELECTION_3) and not (SELECTION_4))
or ((SELECTION_5 and SELECTION_6) and not (SELECTION_7))))
falsepositives:
- Penetration tests
fields:
- ComputerName
- User
- Image
- ImageLoaded
id: 0e277796-5f23-4e49-a490-483131d4f6e1
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpapiset-minidumpwritedump
- https://www.pinvoke.net/default.aspx/dbghelp/MiniDumpWriteDump.html
- https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6
status: experimental
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
@@ -0,0 +1,42 @@
title: Svchost DLL Search Order Hijack
author: SBousseaden
date: 2019/10/28
description: IKEEXT and SessionEnv service, as they call LoadLibrary on files that
do not exist within C:\Windows\System32\ by default. An attacker can place their
malicious logic within the PROCESS_ATTACH block of their library and restart the
aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote
machine.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\svchost.exe'
SELECTION_3:
ImageLoaded:
- '*\tsmsisrv.dll'
- '*\tsvipsrv.dll'
- '*\wlbsctrl.dll'
SELECTION_4:
ImageLoaded:
- C:\Windows\WinSxS\\*
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
falsepositives:
- Pentest
id: 602a1f13-c640-4d73-b053-be9a2fa58b77
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
status: experimental
tags:
- attack.persistence
- attack.defense_evasion
- attack.t1073
- attack.t1574.002
- attack.t1038
- attack.t1574.001
@@ -0,0 +1,33 @@
title: Time Travel Debugging Utility Usage
author: Ensar Şamil, @sblmsrsn, @oscd_initiative
date: 2020/10/06
description: Detects usage of Time Travel Debugging Utility. Adversaries can execute
malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\ttdrecord.dll'
- '*\ttdwriter.dll'
- '*\ttdloader.dll'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legitimate usage by software developers/testers
id: e76c8240-d68f-4773-8880-5c6f63595aaf
level: high
logsource:
category: image_load
product: windows
modified: 2021/09/21
references:
- https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
- https://twitter.com/mattifestation/status/1196390321783025666
- https://twitter.com/oulusoyum/status/1191329746069655553
status: experimental
tags:
- attack.defense_evasion
- attack.credential_access
- attack.t1218
- attack.t1003.001
@@ -0,0 +1,32 @@
title: UAC Bypass With Fake DLL
author: oscd.community, Dmitry Uchakin
date: 2020/10/06
description: Attempts to load dismcore.dll after dropping it
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image:
- '*\dism.exe'
SELECTION_3:
ImageLoaded:
- '*\dismcore.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Pentests
- Actions of a legitimate telnet client
id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03
level: high
logsource:
category: image_load
product: windows
references:
- https://steemit.com/utopian-io/@ah101/uac-bypassing-utility
status: experimental
tags:
- attack.persistence
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002
- attack.t1574.002
@@ -0,0 +1,39 @@
title: UIPromptForCredentials DLLs
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/20
description: Detects potential use of UIPromptForCredentials functions by looking
for some of the DLLs needed for it.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\credui.dll'
- '*\wincredui.dll'
SELECTION_3:
OriginalFileName:
- credui.dll
- wincredui.dll
SELECTION_4:
Image:
- C:\Windows\System32\\*
- C:\Windows\explorer.exe*
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3) and not (SELECTION_4))
falsepositives:
- other legitimate processes loading those DLLs in your environment.
id: 9ae01559-cf7e-4f8e-8e14-4c290a1b4784
level: medium
logsource:
category: image_load
product: windows
modified: 2021/11/20
references:
- https://securitydatasets.com/notebooks/small/windows/06_credential_access/SDWIN-201020013208.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password
- https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-creduipromptforcredentialsa
status: experimental
tags:
- attack.credential_access
- attack.collection
- attack.t1056.002
@@ -0,0 +1,28 @@
title: Unsigned Image Loaded Into LSASS Process
author: Teymur Kheirkhabarov, oscd.community
date: 2019/10/22
description: Loading unsigned image (DLL, EXE) into LSASS process
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\lsass.exe'
SELECTION_3:
Signed: 'false'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Valid user connecting using RDP
id: 857c8db3-c89b-42fb-882b-f681c7cf4da2
level: medium
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
status: experimental
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
@@ -0,0 +1,63 @@
title: WMI Modules Loaded
author: Roberto Rodriguez @Cyb3rWard0g
date: 2019/08/10
description: Detects non wmiprvse loading WMI modules
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\wmiclnt.dll'
- '*\WmiApRpl.dll'
- '*\wmiprov.dll'
- '*\wmiutils.dll'
- '*\wbemcomn.dll'
- '*\wbemprox.dll'
- '*\WMINet_Utils.dll'
- '*\wbemsvc.dll'
- '*\fastprox.dll'
SELECTION_3:
Image:
- '*\WmiPrvSE.exe'
- '*\WmiApSrv.exe'
- '*\svchost.exe'
- '*\DeviceCensus.exe'
- '*\CompatTelRunner.exe'
- '*\sdiagnhost.exe'
- '*\SIHClient.exe'
- '*\ngentask.exe'
- '*\windows\system32\taskhostw.exe'
- '*\windows\system32\MoUsoCoreWorker.exe'
- '*\windows\system32\wbem\WMIADAP.exe'
- '*C:\Windows\Sysmon64.exe'
- '*C:\Windows\Sysmon.exe'
- '*C:\Windows\System32\wbem\unsecapp.exe'
- '*\logman.exe'
- '*\systeminfo.exe'
- '*\nvcontainer.exe'
- '*C:\Windows\System32\wbem\WMIC.exe'
SELECTION_4:
Image:
- C:\Program Files\\*
- C:\Program Files (x86)\\*
condition: (SELECTION_1 and (SELECTION_2 and not (SELECTION_3)) and not (SELECTION_4))
falsepositives:
- Unknown
fields:
- ComputerName
- User
- Image
- ImageLoaded
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
level: medium
logsource:
category: image_load
product: windows
modified: 2021/11/20
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190811201010.html
status: experimental
tags:
- attack.execution
- attack.t1047
@@ -0,0 +1,28 @@
title: WMI Persistence - Command Line Event Consumer
author: Thomas Patzke
date: 2018/03/07
description: Detects WMI command line event consumers
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: C:\Windows\System32\wbem\WmiPrvSE.exe
SELECTION_3:
ImageLoaded: '*\wbemcons.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Unknown (data set is too small; further testing needed)
id: 05936ce2-ee05-4dae-9d03-9a391cf2d2c6
level: high
logsource:
category: image_load
product: windows
modified: 2020/08/23
references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
status: experimental
tags:
- attack.t1084
- attack.t1546.003
- attack.persistence
@@ -0,0 +1,32 @@
title: WMIC Loading Scripting Libraries
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/17
description: Detects threat actors proxy executing code and bypassing application
controls by leveraging wmic and the `/FORMAT` argument switch to download and execute
an XSL file (i.e js, vbs, etc).
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\wmic.exe'
SELECTION_3:
ImageLoaded:
- '*\jscript.dll'
- '*\vbscript.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Apparently, wmic os get lastboottuptime loads vbscript.dll
id: 06ce37c2-61ab-4f05-9ff5-b1a96d18ae32
level: high
logsource:
category: image_load
product: windows
references:
- https://securitydatasets.com/notebooks/small/windows/05_defense_evasion/SDWIN-201017061100.html
- https://twitter.com/dez_/status/986614411711442944
- https://lolbas-project.github.io/lolbas/Binaries/Wmic/
status: experimental
tags:
- attack.defense_evasion
- attack.t1220
@@ -0,0 +1,48 @@
title: Suspicious WSMAN Provider Image Loads
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/06/24
description: Detects signs of potential use of the WSMAN provider from uncommon processes
locally and remote execution.
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
EventID: 7
SELECTION_3:
ImageLoaded:
- '*\WsmSvc.dll'
- '*\WsmAuto.dll'
- '*\Microsoft.WSMan.Management.ni.dll'
SELECTION_4:
OriginalFileName:
- WsmSvc.dll
- WSMANAUTOMATION.DLL
- Microsoft.WSMan.Management.dll
SELECTION_5:
Image: '*\powershell.exe'
SELECTION_6:
Image: '*\svchost.exe'
SELECTION_7:
OriginalFileName: WsmWmiPl.dll
condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4) and not
(SELECTION_5)) or (SELECTION_6 and SELECTION_7)))
falsepositives:
- Unknown
id: ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94
level: medium
logsource:
category: image_load
product: windows
modified: 2021/11/17
references:
- https://twitter.com/chadtilbury/status/1275851297770610688
- https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/
- https://docs.microsoft.com/en-us/windows/win32/winrm/windows-remote-management-architecture
- https://github.com/bohops/WSMan-WinRM
status: experimental
tags:
- attack.execution
- attack.t1059.001
- attack.lateral_movement
- attack.t1021.003
@@ -0,0 +1,28 @@
title: APT PRIVATELOG Image Load Pattern
author: Florian Roth
date: 2021/09/07
description: Detects an image load pattern as seen when a tool named PRIVATELOG is
used and rarely observed under legitimate circumstances
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
Image: '*\svchost.exe'
SELECTION_3:
ImageLoaded: '*\clfsw32.dll'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Rarely observed
id: 33a2d1dd-f3b0-40bd-8baf-7974468927cc
level: high
logsource:
category: image_load
product: windows
references:
- https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,42 @@
title: Image Load of VSS_PS.dll by Uncommon Executable
author: Markus Neis, @markus_neis
date: 2021/07/07
description: Detects the image load of vss_ps.dll by uncommon executables using OriginalFileName
datapoint
detection:
SELECTION_1:
EventID: 7
SELECTION_2:
ImageLoaded:
- '*\vss_ps.dll'
SELECTION_3:
Image:
- '*\svchost.exe'
- '*\msiexec.exe'
- '*\vssvc.exe'
- '*\srtasks.exe'
- '*\tiworker.exe'
- '*\dllhost.exe'
- '*\searchindexer.exe'
- '*dismhost.exe'
- '*taskhostw.exe'
- '*\clussvc.exe'
SELECTION_4:
Image: '*c:\windows\\*'
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3 and SELECTION_4))
falsepositives:
- unknown
id: 333cdbe8-27bb-4246-bf82-b41a0dca4b70
level: high
logsource:
category: image_load
product: windows
references:
- 1bd85e1caa1415ebdc8852c91e37bbb7
- https://twitter.com/am0nsec/status/1412232114980982787
status: experimental
tags:
- attack.defense_evasion
- attack.impact
- attack.t1490