Add: sigma rules (#175)

This commit is contained in:
itiB
2021-11-22 08:45:44 +09:00
committed by GitHub
parent b53342218c
commit 034f9c0957
1086 changed files with 40715 additions and 192 deletions

View File

@@ -0,0 +1,37 @@
title: CMSTP Execution Process Access
author: Nik Seetharaman
date: 2018/07/16
description: Detects various indicators of Microsoft Connection Manager Profile Installer
execution
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: '*cmlua.dll*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legitimate CMSTP use (unlikely in modern enterprise environments)
fields:
- CommandLine
- ParentCommandLine
- Details
id: 3b4b232a-af90-427c-a22f-30b0c0837b95
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/27
references:
- https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
status: stable
tags:
- attack.defense_evasion
- attack.t1218.003
- attack.t1191
- attack.execution
- attack.t1559.001
- attack.t1175
- attack.g0069
- attack.g0080
- car.2019-04-001

View File

@@ -0,0 +1,37 @@
title: CMSTP Execution Process Access
author: Nik Seetharaman
date: 2018/07/16
description: Detects various indicators of Microsoft Connection Manager Profile Installer
execution
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: '*cmlua.dll*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Legitimate CMSTP use (unlikely in modern enterprise environments)
fields:
- CommandLine
- ParentCommandLine
- Details
id: 3b4b232a-af90-427c-a22f-30b0c0837b95
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/27
references:
- https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
status: stable
tags:
- attack.defense_evasion
- attack.t1218.003
- attack.t1191
- attack.execution
- attack.t1559.001
- attack.t1175
- attack.g0069
- attack.g0080
- car.2019-04-001

View File

@@ -0,0 +1,32 @@
title: CobaltStrike BOF Injection Pattern
author: Christian Burkard
date: 2021/08/04
description: Detects a typical pattern of a CobaltStrike BOF which inject into other
processes
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace|re: ^C:\\\\Windows\\\\SYSTEM32\\\\ntdll\\.dll\+[a-z0-9]{4,6}\|C:\\\\Windows\\\\System32\\\\KERNELBASE\\.dll\+[a-z0-9]{4,6}\|UNKNOWN\([A-Z0-9]{16}\)$
SELECTION_3:
GrantedAccess:
- '0x1028'
- '0x1fffff'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- unknown
id: 09706624-b7f6-455d-9d02-adee024cee1d
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/boku7/injectAmsiBypass
- https://github.com/boku7/spawn
status: experimental
tags:
- attack.execution
- attack.t1106
- attack.defense_evasion
- attack.t1562.001

View File

@@ -0,0 +1,32 @@
title: CobaltStrike BOF Injection Pattern
author: Christian Burkard
date: 2021/08/04
description: Detects a typical pattern of a CobaltStrike BOF which inject into other
processes
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace|re: ^C:\\\\Windows\\\\SYSTEM32\\\\ntdll\\.dll\+[a-z0-9]{4,6}\|C:\\\\Windows\\\\System32\\\\KERNELBASE\\.dll\+[a-z0-9]{4,6}\|UNKNOWN\([A-Z0-9]{16}\)$
SELECTION_3:
GrantedAccess: '0x1028'
SELECTION_4:
GrantedAccess: '0x1fffff'
condition: (SELECTION_1 and SELECTION_2 and (SELECTION_3 or SELECTION_4))
falsepositives:
- unknown
id: 09706624-b7f6-455d-9d02-adee024cee1d
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/boku7/injectAmsiBypass
- https://github.com/boku7/spawn
status: experimental
tags:
- attack.execution
- attack.t1106
- attack.defense_evasion
- attack.t1562.001

View File

@@ -0,0 +1,65 @@
title: Credentials Dumping Tools Accessing LSASS Memory
author: Florian Roth, Roberto Rodriguez, Dimitrios Slamaris, Mark Russinovich, Thomas
Patzke, Teymur Kheirkhabarov, Sherif Eldeeb, James Dickenson, Aleksey Potapov, oscd.community
(update)
date: 2017/02/16
description: Detects process access LSASS memory which is typical for credentials
dumping tools
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
GrantedAccess:
- '*0x40*'
- '*0x1000*'
- '*0x1400*'
- '*0x100000*'
- '*0x1410*'
- '*0x1010*'
- '*0x1438*'
- '*0x143a*'
- '*0x1418*'
- '*0x1f0fff*'
- '*0x1f1fff*'
- '*0x1f2fff*'
- '*0x1f3fff*'
SELECTION_4:
ProcessName:
- '*\wmiprvse.exe'
- '*\taskmgr.exe'
- '*\procexp64.exe'
- '*\procexp.exe'
- '*\lsm.exe'
- '*\MsMpEng.exe'
- '*\csrss.exe'
- '*\wininit.exe'
- '*\vmtoolsd.exe'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
falsepositives:
- Legitimate software accessing LSASS process for legitimate reason; update the whitelist
with it
fields:
- ComputerName
- User
- SourceImage
id: 32d0d3e2-e58d-4d41-926b-18b520b2b32d
level: high
logsource:
category: process_access
product: windows
modified: 2021/05/16
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf
status: experimental
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003
- attack.s0002
- car.2019-04-004

View File

@@ -0,0 +1,92 @@
title: Credentials Dumping Tools Accessing LSASS Memory
author: Florian Roth, Roberto Rodriguez, Dimitrios Slamaris, Mark Russinovich, Thomas
Patzke, Teymur Kheirkhabarov, Sherif Eldeeb, James Dickenson, Aleksey Potapov, oscd.community
(update)
date: 2017/02/16
description: Detects process access LSASS memory which is typical for credentials
dumping tools
detection:
SELECTION_1:
EventID: 10
SELECTION_10:
GrantedAccess: '*0x1438*'
SELECTION_11:
GrantedAccess: '*0x143a*'
SELECTION_12:
GrantedAccess: '*0x1418*'
SELECTION_13:
GrantedAccess: '*0x1f0fff*'
SELECTION_14:
GrantedAccess: '*0x1f1fff*'
SELECTION_15:
GrantedAccess: '*0x1f2fff*'
SELECTION_16:
GrantedAccess: '*0x1f3fff*'
SELECTION_17:
EventID: 10
SELECTION_18:
ProcessName: '*\wmiprvse.exe'
SELECTION_19:
ProcessName: '*\taskmgr.exe'
SELECTION_2:
EventID: 10
SELECTION_20:
ProcessName: '*\procexp64.exe'
SELECTION_21:
ProcessName: '*\procexp.exe'
SELECTION_22:
ProcessName: '*\lsm.exe'
SELECTION_23:
ProcessName: '*\MsMpEng.exe'
SELECTION_24:
ProcessName: '*\csrss.exe'
SELECTION_25:
ProcessName: '*\wininit.exe'
SELECTION_26:
ProcessName: '*\vmtoolsd.exe'
SELECTION_3:
TargetImage: '*\lsass.exe'
SELECTION_4:
GrantedAccess: '*0x40*'
SELECTION_5:
GrantedAccess: '*0x1000*'
SELECTION_6:
GrantedAccess: '*0x1400*'
SELECTION_7:
GrantedAccess: '*0x100000*'
SELECTION_8:
GrantedAccess: '*0x1410*'
SELECTION_9:
GrantedAccess: '*0x1010*'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3 and (SELECTION_4 or SELECTION_5
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10 or
SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15 or
SELECTION_16)) and not ((SELECTION_17 and (SELECTION_18 or SELECTION_19 or SELECTION_20
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
or SELECTION_26))))
falsepositives:
- Legitimate software accessing LSASS process for legitimate reason; update the whitelist
with it
fields:
- ComputerName
- User
- SourceImage
id: 32d0d3e2-e58d-4d41-926b-18b520b2b32d
level: high
logsource:
category: process_access
product: windows
modified: 2021/05/16
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf
status: experimental
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003
- attack.s0002
- car.2019-04-004

View File

@@ -0,0 +1,25 @@
title: Direct Syscall of NtOpenProcess
author: Christian Burkard
date: 2021/07/28
description: Detects the usage of the direct syscall of NtOpenProcess which might
be done from a CobaltStrike BOF.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: UNKNOWN*
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- unknown
id: 3f3f3506-1895-401b-9cc3-e86b16e630d0
level: critical
logsource:
category: process_access
product: windows
references:
- https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6
status: experimental
tags:
- attack.execution
- attack.t1106

View File

@@ -0,0 +1,25 @@
title: Direct Syscall of NtOpenProcess
author: Christian Burkard
date: 2021/07/28
description: Detects the usage of the direct syscall of NtOpenProcess which might
be done from a CobaltStrike BOF.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: UNKNOWN*
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- unknown
id: 3f3f3506-1895-401b-9cc3-e86b16e630d0
level: critical
logsource:
category: process_access
product: windows
references:
- https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6
status: experimental
tags:
- attack.execution
- attack.t1106

View File

@@ -0,0 +1,76 @@
title: Suspicious In-Memory Module Execution
author: Perez Diego (@darkquassar), oscd.community, Jonhnathan Ribeiro
date: 2019/10/27
description: Detects the access to processes by other suspicious processes which have
reflectively loaded libraries in their memory space. An example is SilentTrinity
C2 behaviour. Generally speaking, when Sysmon EventID 10 cannot reference a stack
call to a dll loaded from disk (the standard way), it will display "UNKNOWN" as
the module name. Usually this means the stack call points to a module that was reflectively
loaded in memory. Adding to this, it is not common to see such few calls in the
stack (ntdll.dll --> kernelbase.dll --> unknown) which essentially means that most
of the functions required by the process to execute certain routines are already
present in memory, not requiring any calls to external libraries. The latter should
also be considered suspicious.
detection:
SELECTION_1:
EventID: 10
SELECTION_10:
EventID: 10
SELECTION_11:
CallTrace: '*UNKNOWN*'
SELECTION_12:
GrantedAccess:
- '0x1F0FFF'
- '0x1F1FFF'
- '0x143A'
- '0x1410'
- '0x1010'
- '0x1F2FFF'
- '0x1F3FFF'
- '0x1FFFFF'
SELECTION_13:
SourceImage:
- '*\Windows\System32\sdiagnhost.exe'
SELECTION_2:
EventID: 10
SELECTION_3:
CallTrace: '*C:\\Windows\\SYSTEM32\\ntdll.dll+*'
SELECTION_4:
CallTrace: '*|C:\\Windows\\System32\\KERNELBASE.dll+*'
SELECTION_5:
CallTrace: '*|UNKNOWN(*'
SELECTION_6:
CallTrace: '*)*'
SELECTION_7:
CallTrace: '*UNKNOWN(*'
SELECTION_8:
CallTrace: '*)|UNKNOWN(*'
SELECTION_9:
CallTrace: '*)'
condition: (SELECTION_1 and ((SELECTION_2 and ((SELECTION_3 and SELECTION_4 and
SELECTION_5 and SELECTION_6) or (SELECTION_7 and SELECTION_8 and SELECTION_9)))
or ((SELECTION_10 and SELECTION_11 and SELECTION_12) and not (SELECTION_13))))
falsepositives:
- Low
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
id: 5f113a8f-8b61-41ca-b90f-d374fa7e4a39
level: critical
logsource:
category: process_access
product: windows
modified: 2021/05/16
references:
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center/
status: experimental
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1055.001
- attack.t1055.002
- attack.t1055

View File

@@ -0,0 +1,83 @@
title: Suspicious In-Memory Module Execution
author: Perez Diego (@darkquassar), oscd.community, Jonhnathan Ribeiro
date: 2019/10/27
description: Detects the access to processes by other suspicious processes which have
reflectively loaded libraries in their memory space. An example is SilentTrinity
C2 behaviour. Generally speaking, when Sysmon EventID 10 cannot reference a stack
call to a dll loaded from disk (the standard way), it will display "UNKNOWN" as
the module name. Usually this means the stack call points to a module that was reflectively
loaded in memory. Adding to this, it is not common to see such few calls in the
stack (ntdll.dll --> kernelbase.dll --> unknown) which essentially means that most
of the functions required by the process to execute certain routines are already
present in memory, not requiring any calls to external libraries. The latter should
also be considered suspicious.
detection:
SELECTION_1:
EventID: 10
SELECTION_10:
CallTrace: '*UNKNOWN*'
SELECTION_11:
GrantedAccess: '0x1F0FFF'
SELECTION_12:
GrantedAccess: '0x1F1FFF'
SELECTION_13:
GrantedAccess: '0x143A'
SELECTION_14:
GrantedAccess: '0x1410'
SELECTION_15:
GrantedAccess: '0x1010'
SELECTION_16:
GrantedAccess: '0x1F2FFF'
SELECTION_17:
GrantedAccess: '0x1F3FFF'
SELECTION_18:
GrantedAccess: '0x1FFFFF'
SELECTION_19:
EventID: 10
SELECTION_2:
CallTrace: '*C:\\Windows\\SYSTEM32\\ntdll.dll+*'
SELECTION_20:
SourceImage: '*\Windows\System32\sdiagnhost.exe'
SELECTION_3:
CallTrace: '*|C:\\Windows\\System32\\KERNELBASE.dll+*'
SELECTION_4:
CallTrace: '*|UNKNOWN(*'
SELECTION_5:
CallTrace: '*)*'
SELECTION_6:
CallTrace: '*UNKNOWN(*'
SELECTION_7:
CallTrace: '*)|UNKNOWN(*'
SELECTION_8:
CallTrace: '*)'
SELECTION_9:
EventID: 10
condition: (SELECTION_1 and (((SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5)
or (SELECTION_6 and SELECTION_7 and SELECTION_8)) or ((SELECTION_9 and SELECTION_10
and (SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
or SELECTION_16 or SELECTION_17 or SELECTION_18)) and not ((SELECTION_19 and
SELECTION_20)))))
falsepositives:
- Low
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
id: 5f113a8f-8b61-41ca-b90f-d374fa7e4a39
level: critical
logsource:
category: process_access
product: windows
modified: 2021/05/16
references:
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center/
status: experimental
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1055.001
- attack.t1055.002
- attack.t1055

View File

@@ -0,0 +1,33 @@
title: Suspect Svchost Memory Asccess
author: Tim Burrell
date: 2020/01/02
description: Detects suspect access to svchost process memory such as that used by
Invoke-Phantom to kill the winRM windows event logging service.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\windows\system32\svchost.exe'
SELECTION_3:
GrantedAccess: '0x1f3fff'
SELECTION_4:
CallTrace:
- '*unknown*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- unknown
id: 166e9c50-8cd9-44af-815d-d1f0c0e90dde
level: high
logsource:
category: process_access
product: windows
modified: 2020/08/24
references:
- https://github.com/hlldz/Invoke-Phant0m
- https://twitter.com/timbmsft/status/900724491076214784
status: experimental
tags:
- attack.defense_evasion
- attack.t1562.002
- attack.t1089

View File

@@ -0,0 +1,32 @@
title: Suspect Svchost Memory Asccess
author: Tim Burrell
date: 2020/01/02
description: Detects suspect access to svchost process memory such as that used by
Invoke-Phantom to kill the winRM windows event logging service.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\windows\system32\svchost.exe'
SELECTION_3:
GrantedAccess: '0x1f3fff'
SELECTION_4:
CallTrace: '*unknown*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- unknown
id: 166e9c50-8cd9-44af-815d-d1f0c0e90dde
level: high
logsource:
category: process_access
product: windows
modified: 2020/08/24
references:
- https://github.com/hlldz/Invoke-Phant0m
- https://twitter.com/timbmsft/status/900724491076214784
status: experimental
tags:
- attack.defense_evasion
- attack.t1562.002
- attack.t1089

View File

@@ -0,0 +1,36 @@
title: Credential Dumping by LaZagne
author: Bhabesh Raj, Jonhnathan Ribeiro
date: 2020/09/09
description: Detects LSASS process access by LaZagne for credential dumping.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
CallTrace: '*C:\\Windows\\SYSTEM32\\ntdll.dll+*'
SELECTION_4:
CallTrace: '*|C:\\Windows\\System32\\KERNELBASE.dll+*'
SELECTION_5:
CallTrace: '*_ctypes.pyd+*'
SELECTION_6:
CallTrace: '*python27.dll+*'
SELECTION_7:
GrantedAccess: '0x1FFFFF'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5
and SELECTION_6 and SELECTION_7)
falsepositives:
- Unknown
id: 4b9a8556-99c4-470b-a40c-9c8d02c77ed0
level: critical
logsource:
category: process_access
product: windows
references:
- https://twitter.com/bh4b3sh/status/1303674603819081728
status: stable
tags:
- attack.credential_access
- attack.t1003.001
- attack.s0349

View File

@@ -0,0 +1,36 @@
title: Credential Dumping by LaZagne
author: Bhabesh Raj, Jonhnathan Ribeiro
date: 2020/09/09
description: Detects LSASS process access by LaZagne for credential dumping.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
CallTrace: '*C:\\Windows\\SYSTEM32\\ntdll.dll+*'
SELECTION_4:
CallTrace: '*|C:\\Windows\\System32\\KERNELBASE.dll+*'
SELECTION_5:
CallTrace: '*_ctypes.pyd+*'
SELECTION_6:
CallTrace: '*python27.dll+*'
SELECTION_7:
GrantedAccess: '0x1FFFFF'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5
and SELECTION_6 and SELECTION_7)
falsepositives:
- Unknown
id: 4b9a8556-99c4-470b-a40c-9c8d02c77ed0
level: critical
logsource:
category: process_access
product: windows
references:
- https://twitter.com/bh4b3sh/status/1303674603819081728
status: stable
tags:
- attack.credential_access
- attack.t1003.001
- attack.s0349

View File

@@ -0,0 +1,29 @@
title: LittleCorporal Generated Maldoc Injection
author: Christian Burkard
date: 2021/08/09
description: Detects the process injection of a LittleCorporal generated Maldoc.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
SourceImage: '*winword.exe'
SELECTION_3:
CallTrace: '*:\Windows\Microsoft.NET\Framework64\v2.*'
SELECTION_4:
CallTrace: '*UNKNOWN*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- unknown
id: 7bdde3bf-2a42-4c39-aa31-a92b3e17afac
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/connormcgarr/LittleCorporal
status: experimental
tags:
- attack.execution
- attack.t1204.002
- attack.t1055.003

View File

@@ -0,0 +1,29 @@
title: LittleCorporal Generated Maldoc Injection
author: Christian Burkard
date: 2021/08/09
description: Detects the process injection of a LittleCorporal generated Maldoc.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
SourceImage: '*winword.exe'
SELECTION_3:
CallTrace: '*:\Windows\Microsoft.NET\Framework64\v2.*'
SELECTION_4:
CallTrace: '*UNKNOWN*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- unknown
id: 7bdde3bf-2a42-4c39-aa31-a92b3e17afac
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/connormcgarr/LittleCorporal
status: experimental
tags:
- attack.execution
- attack.t1204.002
- attack.t1055.003

View File

@@ -0,0 +1,32 @@
title: Load Undocumented Autoelevated COM Interface
author: oscd.community, Dmitry Uchakin
date: 2020/10/07
description: COM interface (EditionUpgradeManager) that is not used by standard executables.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: '*editionupgrademanagerobj.dll*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- unknown
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
id: fb3722e4-1a06-46b6-b772-253e2e7db933
level: high
logsource:
category: process_access
product: windows
references:
- https://www.snip2code.com/Snippet/4397378/UAC-bypass-using-EditionUpgradeManager-C/
- https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002

View File

@@ -0,0 +1,32 @@
title: Load Undocumented Autoelevated COM Interface
author: oscd.community, Dmitry Uchakin
date: 2020/10/07
description: COM interface (EditionUpgradeManager) that is not used by standard executables.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
CallTrace: '*editionupgrademanagerobj.dll*'
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- unknown
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
id: fb3722e4-1a06-46b6-b772-253e2e7db933
level: high
logsource:
category: process_access
product: windows
references:
- https://www.snip2code.com/Snippet/4397378/UAC-bypass-using-EditionUpgradeManager-C/
- https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002

View File

@@ -0,0 +1,31 @@
title: Lsass Memory Dump via Comsvcs DLL
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/20
description: Detects adversaries leveraging the MiniDump export function from comsvcs.dll
via rundll32 to perform a memory dump from lsass.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
SourceImage: C:\Windows\System32\rundll32.exe
SELECTION_4:
CallTrace: '*comsvcs.dll*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Unknown
id: a49fa4d5-11db-418c-8473-1e014a8dd462
level: critical
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://twitter.com/shantanukhande/status/1229348874298388484
- https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
status: experimental
tags:
- attack.credential_access
- attack.t1003.001

View File

@@ -0,0 +1,31 @@
title: Lsass Memory Dump via Comsvcs DLL
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/10/20
description: Detects adversaries leveraging the MiniDump export function from comsvcs.dll
via rundll32 to perform a memory dump from lsass.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
SourceImage: C:\Windows\System32\rundll32.exe
SELECTION_4:
CallTrace: '*comsvcs.dll*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Unknown
id: a49fa4d5-11db-418c-8473-1e014a8dd462
level: critical
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://twitter.com/shantanukhande/status/1229348874298388484
- https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
status: experimental
tags:
- attack.credential_access
- attack.t1003.001

View File

@@ -0,0 +1,34 @@
title: LSASS Memory Dump
author: Samir Bousseaden
date: 2019/04/03
description: Detects process LSASS memory dump using procdump or taskmgr based on
the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
GrantedAccess: '0x1fffff'
SELECTION_4:
CallTrace:
- '*dbghelp.dll*'
- '*dbgcore.dll*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- unknown
id: 5ef9853e-4d0e-4a70-846f-a9ca37d876da
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html
status: experimental
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003
- attack.s0002

View File

@@ -0,0 +1,37 @@
title: LSASS Memory Dump
author: Samir Bousseaden
date: 2019/04/03
description: Detects process LSASS memory dump using procdump or taskmgr based on
the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
EventID: 10
SELECTION_3:
TargetImage: '*\lsass.exe'
SELECTION_4:
GrantedAccess: '0x1fffff'
SELECTION_5:
CallTrace: '*dbghelp.dll*'
SELECTION_6:
CallTrace: '*dbgcore.dll*'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and SELECTION_4 and (SELECTION_5
or SELECTION_6))
falsepositives:
- unknown
id: 5ef9853e-4d0e-4a70-846f-a9ca37d876da
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html
status: experimental
tags:
- attack.credential_access
- attack.t1003.001
- attack.t1003
- attack.s0002

View File

@@ -0,0 +1,40 @@
title: Malware Shellcode in Verclsid Target Process
author: John Lambert (tech), Florian Roth (rule)
date: 2017/03/04
description: Detects a process access to verclsid.exe that injects shellcode from
a Microsoft Office application / VBA macro
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\verclsid.exe'
SELECTION_3:
GrantedAccess: '0x1FFFFF'
SELECTION_4:
CallTrace: '*|UNKNOWN(*'
SELECTION_5:
CallTrace: '*VBE7.DLL*'
SELECTION_6:
SourceImage: '*\Microsoft Office\\*'
SELECTION_7:
CallTrace: '*|UNKNOWN*'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and ((SELECTION_4 and
SELECTION_5) or (SELECTION_6 and SELECTION_7)))
falsepositives:
- unknown
id: b7967e22-3d7e-409b-9ed5-cdae3f9243a1
level: high
logsource:
category: process_access
definition: 'Use the following config to generate the necessary Event ID 10 Process
Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess
onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
product: windows
references:
- https://twitter.com/JohnLaTwC/status/837743453039534080
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055

View File

@@ -0,0 +1,42 @@
title: Malware Shellcode in Verclsid Target Process
author: John Lambert (tech), Florian Roth (rule)
date: 2017/03/04
description: Detects a process access to verclsid.exe that injects shellcode from
a Microsoft Office application / VBA macro
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
EventID: 10
SELECTION_3:
TargetImage: '*\verclsid.exe'
SELECTION_4:
GrantedAccess: '0x1FFFFF'
SELECTION_5:
CallTrace: '*|UNKNOWN(*'
SELECTION_6:
CallTrace: '*VBE7.DLL*'
SELECTION_7:
SourceImage: '*\Microsoft Office\\*'
SELECTION_8:
CallTrace: '*|UNKNOWN*'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3 and SELECTION_4) and ((SELECTION_5
and SELECTION_6) or (SELECTION_7 and SELECTION_8)))
falsepositives:
- unknown
id: b7967e22-3d7e-409b-9ed5-cdae3f9243a1
level: high
logsource:
category: process_access
definition: 'Use the following config to generate the necessary Event ID 10 Process
Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess
onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
product: windows
references:
- https://twitter.com/JohnLaTwC/status/837743453039534080
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055

View File

@@ -0,0 +1,36 @@
title: Mimikatz through Windows Remote Management
author: Patryk Prauze - ING Tech
date: 2019/05/20
description: Detects usage of mimikatz through WinRM protocol by monitoring access
to lsass process by wsmprovhost.exe.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
SourceImage: C:\Windows\system32\wsmprovhost.exe
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- low
id: aa35a627-33fb-4d04-a165-d33b4afca3e8
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://pentestlab.blog/2018/05/15/lateral-movement-winrm/
status: stable
tags:
- attack.credential_access
- attack.execution
- attack.t1003.001
- attack.t1003
- attack.t1059.001
- attack.t1086
- attack.lateral_movement
- attack.t1021.006
- attack.t1028
- attack.s0002

View File

@@ -0,0 +1,36 @@
title: Mimikatz through Windows Remote Management
author: Patryk Prauze - ING Tech
date: 2019/05/20
description: Detects usage of mimikatz through WinRM protocol by monitoring access
to lsass process by wsmprovhost.exe.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
SourceImage: C:\Windows\system32\wsmprovhost.exe
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- low
id: aa35a627-33fb-4d04-a165-d33b4afca3e8
level: high
logsource:
category: process_access
product: windows
modified: 2021/06/21
references:
- https://pentestlab.blog/2018/05/15/lateral-movement-winrm/
status: stable
tags:
- attack.credential_access
- attack.execution
- attack.t1003.001
- attack.t1003
- attack.t1059.001
- attack.t1086
- attack.lateral_movement
- attack.t1021.006
- attack.t1028
- attack.s0002

View File

@@ -0,0 +1,37 @@
title: Credential Dumping by Pypykatz
author: Bhabesh Raj
date: 2021/08/03
description: Detects LSASS process access by pypykatz for credential dumping.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
CallTrace: '*C:\Windows\SYSTEM32\ntdll.dll+*'
SELECTION_4:
CallTrace: '*C:\Windows\System32\KERNELBASE.dll+*'
SELECTION_5:
CallTrace: '*libffi-7.dll*'
SELECTION_6:
CallTrace: '*_ctypes.pyd+*'
SELECTION_7:
CallTrace: '*python3*.dll+*'
SELECTION_8:
GrantedAccess: '0x1FFFFF'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5
and SELECTION_6 and SELECTION_7 and SELECTION_8)
falsepositives:
- Unknown
id: 7186e989-4ed7-4f4e-a656-4674b9e3e48b
level: critical
logsource:
category: process_access
product: windows
references:
- https://github.com/skelsec/pypykatz
status: experimental
tags:
- attack.credential_access
- attack.t1003.001

View File

@@ -0,0 +1,37 @@
title: Credential Dumping by Pypykatz
author: Bhabesh Raj
date: 2021/08/03
description: Detects LSASS process access by pypykatz for credential dumping.
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\lsass.exe'
SELECTION_3:
CallTrace: '*C:\Windows\SYSTEM32\ntdll.dll+*'
SELECTION_4:
CallTrace: '*C:\Windows\System32\KERNELBASE.dll+*'
SELECTION_5:
CallTrace: '*libffi-7.dll*'
SELECTION_6:
CallTrace: '*_ctypes.pyd+*'
SELECTION_7:
CallTrace: '*python3*.dll+*'
SELECTION_8:
GrantedAccess: '0x1FFFFF'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5
and SELECTION_6 and SELECTION_7 and SELECTION_8)
falsepositives:
- Unknown
id: 7186e989-4ed7-4f4e-a656-4674b9e3e48b
level: critical
logsource:
category: process_access
product: windows
references:
- https://github.com/skelsec/pypykatz
status: experimental
tags:
- attack.credential_access
- attack.t1003.001

View File

@@ -0,0 +1,27 @@
title: SVCHOST Credential Dump
author: Florent Labouyrie
date: 2021/04/30
description: Detects when a process, such as mimikatz, accesses the memory of svchost
to dump credentials
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
TargetImage: '*\svchost.exe'
SELECTION_3:
GrantedAccess: '0x143a'
SELECTION_4:
SourceImage:
- '*\services.exe'
- '*\msiexec.exe'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
falsepositives:
- Non identified legit exectubale
id: 174afcfa-6e40-4ae9-af64-496546389294
level: critical
logsource:
category: process_access
product: windows
tags:
- attack.t1548

View File

@@ -0,0 +1,32 @@
title: SVCHOST Credential Dump
author: Florent Labouyrie
date: 2021/04/30
description: Detects when a process, such as mimikatz, accesses the memory of svchost
to dump credentials
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
EventID: 10
SELECTION_3:
TargetImage: '*\svchost.exe'
SELECTION_4:
GrantedAccess: '0x143a'
SELECTION_5:
EventID: 10
SELECTION_6:
SourceImage: '*\services.exe'
SELECTION_7:
SourceImage: '*\msiexec.exe'
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3 and SELECTION_4) and not
((SELECTION_5 and (SELECTION_6 or SELECTION_7))))
falsepositives:
- Non identified legit exectubale
id: 174afcfa-6e40-4ae9-af64-496546389294
level: critical
logsource:
category: process_access
product: windows
tags:
- attack.t1548

View File

@@ -0,0 +1,30 @@
title: UAC Bypass Using WOW64 Logger DLL Hijack
author: Christian Burkard
date: 2021/08/23
description: Detects the pattern of UAC Bypass using a WoW64 logger DLL hijack (UACMe
30)
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
SourceImage: '*:\Windows\SysWOW64\\*'
SELECTION_3:
GrantedAccess: '0x1fffff'
SELECTION_4:
CallTrace: UNKNOWN(0000000000000000)|UNKNOWN(0000000000000000)|*
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Unknown
id: 4f6c43e2-f989-4ea5-bcd8-843b49a0317c
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/hfiref0x/UACME
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002

View File

@@ -0,0 +1,30 @@
title: UAC Bypass Using WOW64 Logger DLL Hijack
author: Christian Burkard
date: 2021/08/23
description: Detects the pattern of UAC Bypass using a WoW64 logger DLL hijack (UACMe
30)
detection:
SELECTION_1:
EventID: 10
SELECTION_2:
SourceImage: '*:\Windows\SysWOW64\\*'
SELECTION_3:
GrantedAccess: '0x1fffff'
SELECTION_4:
CallTrace: UNKNOWN(0000000000000000)|UNKNOWN(0000000000000000)|*
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Unknown
id: 4f6c43e2-f989-4ea5-bcd8-843b49a0317c
level: high
logsource:
category: process_access
product: windows
references:
- https://github.com/hfiref0x/UACME
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1548.002

View File

@@ -0,0 +1,35 @@
title: Suspicious Shells Spawn by WinRM
author: Andreas Hunkeler (@Karneades), Markus Neis
date: 2021/05/20
description: Detects suspicious shell spawn from WinRM host process
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
ParentImage: '*\wsmprovhost.exe'
SELECTION_3:
Image:
- '*\cmd.exe'
- '*\sh.exe'
- '*\bash.exe'
- '*\powershell.exe'
- '*\schtasks.exe'
- '*\certutil.exe'
- '*\whoami.exe'
- '*\bitsadmin.exe'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Legitimate WinRM usage
id: 5cc2cda8-f261-4d88-a2de-e9e193c86716
level: high
logsource:
category: process_creation
product: windows
modified: 2021/05/22
status: experimental
tags:
- attack.t1190
- attack.initial_access
- attack.persistence
- attack.privilege_escalation

View File

@@ -0,0 +1,42 @@
title: Suspicious Shells Spawn by WinRM
author: Andreas Hunkeler (@Karneades), Markus Neis
date: 2021/05/20
description: Detects suspicious shell spawn from WinRM host process
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
Image: '*\bitsadmin.exe'
SELECTION_2:
ParentImage: '*\wsmprovhost.exe'
SELECTION_3:
Image: '*\cmd.exe'
SELECTION_4:
Image: '*\sh.exe'
SELECTION_5:
Image: '*\bash.exe'
SELECTION_6:
Image: '*\powershell.exe'
SELECTION_7:
Image: '*\schtasks.exe'
SELECTION_8:
Image: '*\certutil.exe'
SELECTION_9:
Image: '*\whoami.exe'
condition: (SELECTION_1 and SELECTION_2 and (SELECTION_3 or SELECTION_4 or SELECTION_5
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10))
falsepositives:
- Legitimate WinRM usage
id: 5cc2cda8-f261-4d88-a2de-e9e193c86716
level: high
logsource:
category: process_creation
product: windows
modified: 2021/05/22
status: experimental
tags:
- attack.t1190
- attack.initial_access
- attack.persistence
- attack.privilege_escalation