Feature/rm submodule (#312)
* rm: submodule * Add: rules * Fix: hayabusa-rules to c9c10a
This commit is contained in:
@@ -0,0 +1,30 @@
|
||||
|
||||
title: Pingback Backdoor
|
||||
ruletype: Sigma
|
||||
author: Bhabesh Raj
|
||||
date: 2021/05/05
|
||||
description: Detects the use of Pingback backdoor that creates ICMP tunnel for C2
|
||||
as described in the trustwave report
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*msdtc.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: C:\Windows\oci.dll
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Very unlikely
|
||||
id: 35a7dc42-bc6f-46e0-9f83-81f8e56c8d4b
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel
|
||||
- https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1574.001
|
||||
@@ -0,0 +1,29 @@
|
||||
|
||||
title: SILENTTRINITY Stager Execution
|
||||
ruletype: Sigma
|
||||
author: Aleksey Potapov, oscd.community
|
||||
date: 2019/10/22
|
||||
description: Detects SILENTTRINITY stager use
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: '*st2stager*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 75c505b1-711d-4f68-a357-8c3fe37dbf2d
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/10/04
|
||||
references:
|
||||
- https://github.com/byt3bl33d3r/SILENTTRINITY
|
||||
related:
|
||||
- id: 03552375-cc2c-4883-bbe4-7958d5a980be
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1071
|
||||
@@ -0,0 +1,31 @@
|
||||
|
||||
title: Wmiprvse Wbemcomn DLL Hijack
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/12
|
||||
description: Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\`
|
||||
directory over the network and loading it for a WMI DLL Hijack scenario.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\wmiprvse.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\wbem\wbemcomn.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 7707a579-e0d8-4886-a853-ce47e4575aaa
|
||||
level: critical
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-201009173318.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
- attack.lateral_movement
|
||||
- attack.t1021.002
|
||||
@@ -0,0 +1,57 @@
|
||||
|
||||
title: Suspicious WSMAN Provider Image Loads
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/06/24
|
||||
description: Detects signs of potential use of the WSMAN provider from uncommon processes
|
||||
locally and remote execution.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\WsmSvc.dll'
|
||||
- '*\WsmAuto.dll'
|
||||
- '*\Microsoft.WSMan.Management.ni.dll'
|
||||
SELECTION_3:
|
||||
OriginalFileName:
|
||||
- WsmSvc.dll
|
||||
- WSMANAUTOMATION.DLL
|
||||
- Microsoft.WSMan.Management.dll
|
||||
SELECTION_4:
|
||||
Image: '*\svchost.exe'
|
||||
SELECTION_5:
|
||||
OriginalFileName: WsmWmiPl.dll
|
||||
SELECTION_6:
|
||||
Image:
|
||||
- '*\powershell.exe'
|
||||
- '*C:\Windows\System32\sdiagnhost.exe'
|
||||
SELECTION_7:
|
||||
CommandLine:
|
||||
- '*svchost.exe -k netsvcs -p -s BITS*'
|
||||
- '*svchost.exe -k GraphicsPerfSvcGroup -s GraphicsPerfSvc*'
|
||||
SELECTION_8:
|
||||
Image: C:\Windows\Microsoft.NET\Framework64\\*
|
||||
SELECTION_9:
|
||||
Image: '*\mscorsvw.exe'
|
||||
condition: (SELECTION_1 and ((SELECTION_2 or SELECTION_3) or (SELECTION_4 and SELECTION_5))
|
||||
and not ((SELECTION_6) or (SELECTION_7) or (SELECTION_8 and SELECTION_9)))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/03
|
||||
references:
|
||||
- https://twitter.com/chadtilbury/status/1275851297770610688
|
||||
- https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/
|
||||
- https://docs.microsoft.com/en-us/windows/win32/winrm/windows-remote-management-architecture
|
||||
- https://github.com/bohops/WSMan-WinRM
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.lateral_movement
|
||||
- attack.t1021.003
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: Time Travel Debugging Utility Usage
|
||||
ruletype: Sigma
|
||||
author: Ensar Şamil, @sblmsrsn, @oscd_initiative
|
||||
date: 2020/10/06
|
||||
description: Detects usage of Time Travel Debugging Utility. Adversaries can execute
|
||||
malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 1
|
||||
SELECTION_2:
|
||||
ParentImage: '*\tttracer.exe'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legitimate usage by software developers/testers
|
||||
id: 0b4ae027-2a2d-4b93-8c7e-962caaba5b2a
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
|
||||
- https://twitter.com/mattifestation/status/1196390321783025666
|
||||
- https://twitter.com/oulusoyum/status/1191329746069655553
|
||||
related:
|
||||
- id: e76c8240-d68f-4773-8880-5c6f63595aaf
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.credential_access
|
||||
- attack.t1218
|
||||
- attack.t1003.001
|
||||
@@ -0,0 +1,40 @@
|
||||
|
||||
title: Abusing Azure Browser SSO
|
||||
ruletype: Sigma
|
||||
author: Den Iuzvyk
|
||||
date: 2020/07/15
|
||||
description: Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens
|
||||
for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure
|
||||
AD and a user logs in with their Azure AD account) wanting to perform SSO authentication
|
||||
in the browser. An attacker can use this to authenticate to Azure AD in a browser
|
||||
as that user.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*MicrosoftAccountTokenProvider.dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*\BackgroundTaskHost.exe'
|
||||
- '*\devenv.exe'
|
||||
- '*\iexplore.exe'
|
||||
- '*\MicrosoftEdge.exe'
|
||||
- '*\Microsoft\Edge\Application\msedge.exe'
|
||||
- '*\AppData\Local\Microsoft\OneDrive\OneDrive.exe'
|
||||
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3))
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 50f852e6-af22-4c78-9ede-42ef36aa3453
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/08
|
||||
references:
|
||||
- https://posts.specterops.io/requesting-azure-ad-request-tokens-on-azure-ad-joined-machines-for-browser-sso-2b0409caad30
|
||||
status: test
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1073
|
||||
- attack.t1574.002
|
||||
@@ -0,0 +1,39 @@
|
||||
|
||||
title: Alternate PowerShell Hosts
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2019/09/12
|
||||
description: Detects alternate PowerShell hosts potentially bypassing detections looking
|
||||
for powershell.exe
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: System.Management.Automation
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*System.Management.Automation*'
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- '*\powershell.exe'
|
||||
- '*\mscorsvw.exe'
|
||||
SELECTION_5:
|
||||
Image:
|
||||
- C:\Program Files (x86)\Microsoft Visual Studio\\*
|
||||
- C:\Program Files\Microsoft Visual Studio\\*
|
||||
- C:\Windows\System32\\*
|
||||
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4
|
||||
or SELECTION_5))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: fe6e002f-f244-4278-9263-20e4b593827f
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/07
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190610201010.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
@@ -0,0 +1,25 @@
|
||||
|
||||
title: FoggyWeb Backdoor DLL Loading
|
||||
ruletype: Sigma
|
||||
author: Florian Roth
|
||||
date: 2021/09/27
|
||||
description: Detects DLL image load activity as used by FoggyWeb backdoor loader
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: C:\Windows\ADFS\version.dll
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
id: 640dc51c-7713-4faa-8a0e-e7c0d9d4654c
|
||||
level: critical
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
references:
|
||||
- https://www.microsoft.com/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.resource_development
|
||||
- attack.t1587
|
||||
@@ -0,0 +1,60 @@
|
||||
|
||||
title: In-memory PowerShell
|
||||
ruletype: Sigma
|
||||
author: Tom Kern, oscd.community, Natalia Shornikova, Tim Shelton
|
||||
date: 2019/11/14
|
||||
description: Detects loading of essential DLL used by PowerShell, but not by the process
|
||||
powershell.exe. Detects meterpreter's "load powershell" extension.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\System.Management.Automation.Dll'
|
||||
- '*\System.Management.Automation.ni.Dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*\powershell.exe'
|
||||
- '*\powershell_ise.exe'
|
||||
- '*\WINDOWS\System32\sdiagnhost.exe'
|
||||
- '*\mscorsvw.exe'
|
||||
- '*\WINDOWS\System32\RemoteFXvGPUDisablement.exe'
|
||||
- '*\sqlps.exe'
|
||||
- '*\wsmprovhost.exe'
|
||||
- '*\winrshost.exe'
|
||||
- '*\syncappvpublishingserver.exe'
|
||||
- '*\runscripthelper.exe'
|
||||
- '*\ServerManager.exe'
|
||||
- '*\Microsoft SQL Server Management Studio *\Common*\IDE\Ssms.exe'
|
||||
- '*\IDE\devenv.exe'
|
||||
- '*\ServiceHub.VSDetouredHost.exe'
|
||||
- '*\ServiceHub.SettingsHost.exe'
|
||||
- '*\ServiceHub.Host.CLR.x86.exe'
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- C:\Program Files (x86)\Microsoft Visual Studio\\*
|
||||
- C:\Program Files\Microsoft Visual Studio\\*
|
||||
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3 or SELECTION_4))
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info
|
||||
- EN_0003_enrich_other_sysmon_events_with_event_id_1_data
|
||||
falsepositives:
|
||||
- Used by some .NET binaries, minimal on user workstation.
|
||||
- Used by Microsoft SQL Server Management Studio
|
||||
id: 092bc4b9-3d1d-43b4-a6b4-8c8acd83522f
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
- https://github.com/p3nt4/PowerShdll
|
||||
related:
|
||||
- id: 867613fb-fa60-4497-a017-a82df74a172c
|
||||
type: obsoletes
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.t1086
|
||||
- attack.t1059.001
|
||||
- attack.execution
|
||||
@@ -0,0 +1,27 @@
|
||||
|
||||
title: PCRE.NET Package Image Load
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/29
|
||||
description: Detects processes loading modules related to PCRE.NET package
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*\AppData\Local\Temp\ba9ea7344a4a5f591d6e5dc32a13494b\\*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 84b0a8f3-680b-4096-a45b-e9a89221727c
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/08/14
|
||||
references:
|
||||
- https://twitter.com/rbmaslen/status/1321859647091970051
|
||||
- https://twitter.com/tifkin_/status/1321916444557365248
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
@@ -0,0 +1,37 @@
|
||||
|
||||
title: WMI Script Host Process Image Loaded
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/09/02
|
||||
description: Detects signs of the WMI script host process %SystemRoot%\system32\wbem\scrcons.exe
|
||||
functionality being used via images being loaded by a process.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\scrcons.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\vbscript.dll'
|
||||
- '*\wbemdisp.dll'
|
||||
- '*\wshom.ocx'
|
||||
- '*\scrrun.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: b439f47d-ef52-4b29-9a2f-57d8a96cb6b8
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://twitter.com/HunterPlaybook/status/1301207718355759107
|
||||
- https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/
|
||||
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-200902020333.html
|
||||
status: test
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.privilege_escalation
|
||||
- attack.persistence
|
||||
- attack.t1546.003
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: Windows Spooler Service Suspicious Binary Load
|
||||
ruletype: Sigma
|
||||
author: FPT.EagleEye, Thomas Patzke (improvements)
|
||||
date: 2021/06/29
|
||||
description: Detect DLL Load from Spooler Service backup folder
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*spoolsv.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\Windows\System32\spool\drivers\x64\3\\*'
|
||||
SELECTION_4:
|
||||
ImageLoaded: '*.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
|
||||
falsepositives:
|
||||
- Loading of legitimate driver
|
||||
id: 02fb90de-c321-4e63-a6b9-25f4b03dfd14
|
||||
level: informational
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/08/24
|
||||
references:
|
||||
- https://github.com/hhlxf/PrintNightmare
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1574
|
||||
- cve.2021.1675
|
||||
- cve.2021.34527
|
||||
@@ -0,0 +1,38 @@
|
||||
|
||||
title: Fax Service DLL Search Order Hijack
|
||||
ruletype: Sigma
|
||||
author: NVISO
|
||||
date: 2020/05/04
|
||||
description: The Fax service attempts to load ualapi.dll, which is non-existent. An
|
||||
attacker can then (side)load their own malicious DLL using this service.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*fxssvc.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*ualapi.dll'
|
||||
SELECTION_4:
|
||||
ImageLoaded:
|
||||
- C:\Windows\WinSxS\\*
|
||||
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
id: 828af599-4c53-4ed2-ba4a-a9f835c434ea
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://windows-internals.com/faxing-your-way-to-system/
|
||||
status: test
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1038
|
||||
- attack.t1574.001
|
||||
- attack.t1574.002
|
||||
@@ -0,0 +1,33 @@
|
||||
|
||||
title: Possible Process Hollowing Image Loading
|
||||
ruletype: Sigma
|
||||
author: Markus Neis
|
||||
date: 2018/01/07
|
||||
description: Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g.
|
||||
through process hollowing by Mimikatz
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\notepad.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\samlib.dll'
|
||||
- '*\WinSCard.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Very likely, needs more tuning
|
||||
id: e32ce4f5-46c6-4c47-ba69-5de3c9193cd7
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for.html
|
||||
status: test
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1574.002
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: dotNET DLL Loaded Via Office Applications
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects any assembly DLL being loaded by an Office Product
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- C:\Windows\assembly\\*
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: ff0f2b05-09db-4095-b96d-1b75ca24894a
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: CLR DLL Loaded Via Office Applications
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects CLR DLL being loaded by an Office Product
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\clr.dll*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: d13c43f0-f66b-4279-8b2c-5912077c1780
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: GAC DLL Loaded Via Office Applications
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects any GAC DLL being loaded by an Office Product
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- C:\Windows\Microsoft.NET\assembly\GAC_MSIL*
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: 90217a70-13fc-48e4-b3db-0d836c5824ac
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: Active Directory Parsing DLL Loaded Via Office Applications
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects DSParse DLL being loaded by an Office Product
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\dsparse.dll*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: a2a3b925-7bb0-433b-b508-db9003263cc4
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: Active Directory Kerberos DLL Loaded Via Office Applications
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects Kerberos DLL being loaded by an Office Product
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\kerberos.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: 7417e29e-c2e7-4cf6-a2e8-767228c64837
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,37 @@
|
||||
|
||||
title: Python Py2Exe Image Load
|
||||
ruletype: Sigma
|
||||
author: Patrick St. John, OTR (Open Threat Research)
|
||||
date: 2020/05/03
|
||||
description: Detects the image load of Python Core indicative of a Python script bundled
|
||||
with Py2Exe.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: Python Core
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*Python*'
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- C:\Program Files\\*
|
||||
- C:\Program Files (x86)\\*
|
||||
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3 or SELECTION_4))
|
||||
falsepositives:
|
||||
- Legit Py2Exe Binaries
|
||||
fields:
|
||||
- Description
|
||||
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/05
|
||||
references:
|
||||
- https://www.py2exe.org/
|
||||
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027.002
|
||||
@@ -0,0 +1,37 @@
|
||||
|
||||
title: CLR DLL Loaded Via Scripting Applications
|
||||
ruletype: Sigma
|
||||
author: omkar72, oscd.community
|
||||
date: 2020/10/14
|
||||
description: Detects CLR DLL being loaded by an scripting applications
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\wscript.exe'
|
||||
- '*\cscript.exe'
|
||||
- '*\mshta.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\clr.dll'
|
||||
- '*\mscoree.dll'
|
||||
- '*\mscorlib.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 4508a70e-97ef-4300-b62b-ff27992990ea
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://github.com/tyranid/DotNetToJScript
|
||||
- https://thewover.github.io/Introducing-Donut/
|
||||
- https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.privilege_escalation
|
||||
- attack.t1055
|
||||
@@ -0,0 +1,40 @@
|
||||
|
||||
title: Suspicious System.Drawing Load
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/05/02
|
||||
description: A General detection for processes loading System.Drawing.ni.dll. This
|
||||
could be an indicator of potential Screen Capture.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*\System.Drawing.ni.dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- C:\Program Files\\*
|
||||
- C:\Program Files (x86)\\*
|
||||
- C:\Windows\System32\\*
|
||||
- C:\Windows\Microsoft.NET\\*
|
||||
- C:\Windows\ImmersiveControlPanel\\*
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- C:\Users\\*\AppData\Local\NhNotifSys\nahimic\nahimicNotifSys.exe
|
||||
- C:\Users\\*\GitHubDesktop\Update.exe
|
||||
- C:\Windows\System32\NhNotifSys.exe
|
||||
condition: (SELECTION_1 and SELECTION_2 and not ((SELECTION_3) or (SELECTION_4)))
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 666ecfc7-229d-42b8-821e-1a8f8cb7057c
|
||||
level: low
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/05
|
||||
references:
|
||||
- https://github.com/OTRF/detection-hackathon-apt29/issues/16
|
||||
- https://threathunterplaybook.com/evals/apt29/detections/7.A.1_3B4E5808-3C71-406A-B181-17B0CE3178C9.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1113
|
||||
@@ -0,0 +1,36 @@
|
||||
|
||||
title: VBA DLL Loaded Via Microsoft Word
|
||||
ruletype: Sigma
|
||||
author: Antonlovesdnb
|
||||
date: 2020/02/19
|
||||
description: Detects DLL's Loaded Via Word Containing VBA Macros
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\VBE7.DLL'
|
||||
- '*\VBEUI.DLL'
|
||||
- '*\VBE7INTL.DLL'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Alerts on legitimate macro usage as well, will need to filter as appropriate
|
||||
id: e6ce8457-68b1-485b-9bdd-3c2b5d679aa9
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1204
|
||||
- attack.t1204.002
|
||||
@@ -0,0 +1,38 @@
|
||||
|
||||
title: Windows Management Instrumentation DLL Loaded Via Microsoft Word
|
||||
ruletype: Sigma
|
||||
author: Michael R. (@nahamike01)
|
||||
date: 2019/12/26
|
||||
description: Detects DLL's Loaded Via Word Containing VBA Macros Executing WMI Commands
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\winword.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\outlook.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\wmiutils.dll'
|
||||
- '*\wbemcomn.dll'
|
||||
- '*\wbemprox.dll'
|
||||
- '*\wbemdisp.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Possible. Requires further testing.
|
||||
id: a457f232-7df9-491d-898f-b5aabd2cbe2f
|
||||
level: informational
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/22
|
||||
references:
|
||||
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
- https://www.carbonblack.com/2019/04/24/cb-tau-threat-intelligence-notification-emotet-utilizing-wmi-to-launch-powershell-encoded-code/
|
||||
- https://media.cert.europa.eu/static/SecurityAdvisories/2019/CERT-EU-SA2019-021.pdf
|
||||
status: deprecated
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
@@ -0,0 +1,72 @@
|
||||
|
||||
title: Load of dbghelp/dbgcore DLL from Suspicious Process
|
||||
ruletype: Sigma
|
||||
author: Perez Diego (@darkquassar), oscd.community, Ecco
|
||||
date: 2019/10/27
|
||||
description: Detects the load of dbghelp/dbgcore DLL (used to make memory dumps) by
|
||||
suspicious processes. Tools like ProcessHacker and some attacker tradecract use
|
||||
MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity
|
||||
C2 Framework has a module that leverages this API to dump the contents of Lsass.exe
|
||||
and transfer it over the network back to the attacker's machine.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\dbghelp.dll'
|
||||
- '*\dbgcore.dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*\msbuild.exe'
|
||||
- '*\cmd.exe'
|
||||
- '*\svchost.exe'
|
||||
- '*\rundll32.exe'
|
||||
- '*\powershell.exe'
|
||||
- '*\word.exe'
|
||||
- '*\excel.exe'
|
||||
- '*\powerpnt.exe'
|
||||
- '*\outlook.exe'
|
||||
- '*\monitoringhost.exe'
|
||||
- '*\wmic.exe'
|
||||
- '*\bash.exe'
|
||||
- '*\wscript.exe'
|
||||
- '*\cscript.exe'
|
||||
- '*\mshta.exe'
|
||||
- '*\regsvr32.exe'
|
||||
- '*\schtasks.exe'
|
||||
- '*\dnx.exe'
|
||||
- '*\regsvcs.exe'
|
||||
- '*\sc.exe'
|
||||
- '*\scriptrunner.exe'
|
||||
SELECTION_4:
|
||||
Signed: 'FALSE'
|
||||
SELECTION_5:
|
||||
Image: '*Visual Studio*'
|
||||
SELECTION_6:
|
||||
CommandLine: '*-k LocalSystemNetworkRestricted*'
|
||||
SELECTION_7:
|
||||
CommandLine: C:\WINDOWS\winsxs\*\TiWorker.exe -Embedding
|
||||
condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4)) and not
|
||||
(SELECTION_5 or SELECTION_6)) and not (SELECTION_7))
|
||||
falsepositives:
|
||||
- Penetration tests
|
||||
fields:
|
||||
- ComputerName
|
||||
- User
|
||||
- Image
|
||||
- ImageLoaded
|
||||
id: 0e277796-5f23-4e49-a490-483131d4f6e1
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/05
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpapiset-minidumpwritedump
|
||||
- https://www.pinvoke.net/default.aspx/dbghelp/MiniDumpWriteDump.html
|
||||
- https://medium.com/@fsx30/bypass-edrs-memory-protection-introduction-to-hooking-2efb21acffd6
|
||||
status: test
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.t1003.001
|
||||
@@ -0,0 +1,43 @@
|
||||
|
||||
title: Svchost DLL Search Order Hijack
|
||||
ruletype: Sigma
|
||||
author: SBousseaden
|
||||
date: 2019/10/28
|
||||
description: IKEEXT and SessionEnv service, as they call LoadLibrary on files that
|
||||
do not exist within C:\Windows\System32\ by default. An attacker can place their
|
||||
malicious logic within the PROCESS_ATTACH block of their library and restart the
|
||||
aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote
|
||||
machine.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\svchost.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\tsmsisrv.dll'
|
||||
- '*\tsvipsrv.dll'
|
||||
- '*\wlbsctrl.dll'
|
||||
SELECTION_4:
|
||||
ImageLoaded:
|
||||
- C:\Windows\WinSxS\\*
|
||||
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
|
||||
falsepositives:
|
||||
- Pentest
|
||||
id: 602a1f13-c640-4d73-b053-be9a2fa58b77
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
|
||||
status: test
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1574.002
|
||||
- attack.t1038
|
||||
- attack.t1574.001
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: Time Travel Debugging Utility Usage
|
||||
ruletype: Sigma
|
||||
author: Ensar Şamil, @sblmsrsn, @oscd_initiative
|
||||
date: 2020/10/06
|
||||
description: Detects usage of Time Travel Debugging Utility. Adversaries can execute
|
||||
malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\ttdrecord.dll'
|
||||
- '*\ttdwriter.dll'
|
||||
- '*\ttdloader.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legitimate usage by software developers/testers
|
||||
id: e76c8240-d68f-4773-8880-5c6f63595aaf
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
|
||||
- https://twitter.com/mattifestation/status/1196390321783025666
|
||||
- https://twitter.com/oulusoyum/status/1191329746069655553
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.credential_access
|
||||
- attack.t1218
|
||||
- attack.t1003.001
|
||||
@@ -0,0 +1,37 @@
|
||||
|
||||
title: UAC Bypass With Fake DLL
|
||||
ruletype: Sigma
|
||||
author: oscd.community, Dmitry Uchakin
|
||||
date: 2020/10/06
|
||||
description: Attempts to load dismcore.dll after dropping it
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image:
|
||||
- '*\dism.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\dismcore.dll'
|
||||
SELECTION_4:
|
||||
ImageLoaded:
|
||||
- C:\Windows\System32\Dism\dismcore.dll
|
||||
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
|
||||
falsepositives:
|
||||
- Pentests
|
||||
- Actions of a legitimate telnet client
|
||||
id: a5ea83a7-05a5-44c1-be2e-addccbbd8c03
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/23
|
||||
references:
|
||||
- https://steemit.com/utopian-io/@ah101/uac-bypassing-utility
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1548.002
|
||||
- attack.t1574.002
|
||||
@@ -0,0 +1,48 @@
|
||||
|
||||
title: UIPromptForCredentials DLLs
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/20
|
||||
description: Detects potential use of UIPromptForCredentials functions by looking
|
||||
for some of the DLLs needed for it.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\credui.dll'
|
||||
- '*\wincredui.dll'
|
||||
SELECTION_3:
|
||||
OriginalFileName:
|
||||
- credui.dll
|
||||
- wincredui.dll
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- C:\Windows\System32\\*
|
||||
- C:\Windows\explorer.exe*
|
||||
- C:\Program Files\\*
|
||||
- C:\Users\\*\AppData\Local\Microsoft\OneDrive\\*\Microsoft.SharePoint.exe*
|
||||
- C:\Program Files (x86)\\*
|
||||
- C:\Windows\ImmersiveControlPanel\SystemSettings.exe*
|
||||
- C:\Users\\*\AppData\Local\Microsoft\OneDrive\OneDrive.exe*
|
||||
SELECTION_5:
|
||||
Image: '*\opera_autoupdate.exe'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3) and not (SELECTION_4 or
|
||||
SELECTION_5))
|
||||
falsepositives:
|
||||
- other legitimate processes loading those DLLs in your environment.
|
||||
id: 9ae01559-cf7e-4f8e-8e14-4c290a1b4784
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/12/03
|
||||
references:
|
||||
- https://securitydatasets.com/notebooks/small/windows/06_credential_access/SDWIN-201020013208.html
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.002/T1056.002.md#atomic-test-2---powershell---prompt-user-for-password
|
||||
- https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-creduipromptforcredentialsa
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.collection
|
||||
- attack.t1056.002
|
||||
@@ -0,0 +1,29 @@
|
||||
|
||||
title: Unsigned Image Loaded Into LSASS Process
|
||||
ruletype: Sigma
|
||||
author: Teymur Kheirkhabarov, oscd.community
|
||||
date: 2019/10/22
|
||||
description: Loading unsigned image (DLL, EXE) into LSASS process
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\lsass.exe'
|
||||
SELECTION_3:
|
||||
Signed: 'false'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Valid user connecting using RDP
|
||||
id: 857c8db3-c89b-42fb-882b-f681c7cf4da2
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
|
||||
status: test
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.t1003.001
|
||||
@@ -0,0 +1,67 @@
|
||||
|
||||
title: WMI Modules Loaded
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez @Cyb3rWard0g
|
||||
date: 2019/08/10
|
||||
description: Detects non wmiprvse loading WMI modules
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\wmiclnt.dll'
|
||||
- '*\WmiApRpl.dll'
|
||||
- '*\wmiprov.dll'
|
||||
- '*\wmiutils.dll'
|
||||
- '*\wbemcomn.dll'
|
||||
- '*\wbemprox.dll'
|
||||
- '*\WMINet_Utils.dll'
|
||||
- '*\wbemsvc.dll'
|
||||
- '*\fastprox.dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*\WmiPrvSE.exe'
|
||||
- '*\WmiApSrv.exe'
|
||||
- '*\svchost.exe'
|
||||
- '*\DeviceCensus.exe'
|
||||
- '*\CompatTelRunner.exe'
|
||||
- '*\sdiagnhost.exe'
|
||||
- '*\SIHClient.exe'
|
||||
- '*\ngentask.exe'
|
||||
- '*\windows\system32\taskhostw.exe'
|
||||
- '*\windows\system32\MoUsoCoreWorker.exe'
|
||||
- '*\windows\system32\wbem\WMIADAP.exe'
|
||||
- '*C:\Windows\Sysmon64.exe'
|
||||
- '*C:\Windows\Sysmon.exe'
|
||||
- '*C:\Windows\System32\wbem\unsecapp.exe'
|
||||
- '*\logman.exe'
|
||||
- '*\systeminfo.exe'
|
||||
- '*\nvcontainer.exe'
|
||||
- '*C:\Windows\System32\wbem\WMIC.exe'
|
||||
- '*\explorer.exe'
|
||||
- '*\opera_autoupdate.exe'
|
||||
- '*\MsMpEng.exe'
|
||||
SELECTION_4:
|
||||
Image:
|
||||
- C:\Program Files\\*
|
||||
- C:\Program Files (x86)\\*
|
||||
condition: (SELECTION_1 and (SELECTION_2 and not (SELECTION_3)) and not (SELECTION_4))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
fields:
|
||||
- ComputerName
|
||||
- User
|
||||
- Image
|
||||
- ImageLoaded
|
||||
id: 671bb7e3-a020-4824-a00e-2ee5b55f385e
|
||||
level: informational
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/25
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190811201010.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
@@ -0,0 +1,29 @@
|
||||
|
||||
title: WMI Persistence - Command Line Event Consumer
|
||||
ruletype: Sigma
|
||||
author: Thomas Patzke
|
||||
date: 2018/03/07
|
||||
description: Detects WMI command line event consumers
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: C:\Windows\System32\wbem\WmiPrvSE.exe
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\wbemcons.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Unknown (data set is too small; further testing needed)
|
||||
id: 05936ce2-ee05-4dae-9d03-9a391cf2d2c6
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
|
||||
status: test
|
||||
tags:
|
||||
- attack.t1084
|
||||
- attack.t1546.003
|
||||
- attack.persistence
|
||||
@@ -0,0 +1,34 @@
|
||||
|
||||
title: WMIC Loading Scripting Libraries
|
||||
ruletype: Sigma
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/17
|
||||
description: Detects threat actors proxy executing code and bypassing application
|
||||
controls by leveraging wmic and the `/FORMAT` argument switch to download and execute
|
||||
an XSL file (i.e js, vbs, etc).
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\wmic.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded:
|
||||
- '*\jscript.dll'
|
||||
- '*\vbscript.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Apparently, wmic os get lastboottuptime loads vbscript.dll
|
||||
id: 06ce37c2-61ab-4f05-9ff5-b1a96d18ae32
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://securitydatasets.com/notebooks/small/windows/05_defense_evasion/SDWIN-201017061100.html
|
||||
- https://twitter.com/dez_/status/986614411711442944
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Wmic/
|
||||
status: test
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1220
|
||||
@@ -0,0 +1,29 @@
|
||||
|
||||
title: APT PRIVATELOG Image Load Pattern
|
||||
ruletype: Sigma
|
||||
author: Florian Roth
|
||||
date: 2021/09/07
|
||||
description: Detects an image load pattern as seen when a tool named PRIVATELOG is
|
||||
used and rarely observed under legitimate circumstances
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\svchost.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\clfsw32.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Rarely observed
|
||||
id: 33a2d1dd-f3b0-40bd-8baf-7974468927cc
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
references:
|
||||
- https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1055
|
||||
@@ -0,0 +1,43 @@
|
||||
|
||||
title: Image Load of VSS_PS.dll by Uncommon Executable
|
||||
ruletype: Sigma
|
||||
author: Markus Neis, @markus_neis
|
||||
date: 2021/07/07
|
||||
description: Detects the image load of vss_ps.dll by uncommon executables using OriginalFileName
|
||||
datapoint
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
ImageLoaded:
|
||||
- '*\vss_ps.dll'
|
||||
SELECTION_3:
|
||||
Image:
|
||||
- '*\svchost.exe'
|
||||
- '*\msiexec.exe'
|
||||
- '*\vssvc.exe'
|
||||
- '*\srtasks.exe'
|
||||
- '*\tiworker.exe'
|
||||
- '*\dllhost.exe'
|
||||
- '*\searchindexer.exe'
|
||||
- '*dismhost.exe'
|
||||
- '*taskhostw.exe'
|
||||
- '*\clussvc.exe'
|
||||
SELECTION_4:
|
||||
Image: '*c:\windows\\*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and not (SELECTION_3 and SELECTION_4))
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 333cdbe8-27bb-4246-bf82-b41a0dca4b70
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
references:
|
||||
- 1bd85e1caa1415ebdc8852c91e37bbb7
|
||||
- https://twitter.com/am0nsec/status/1412232114980982787
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.impact
|
||||
- attack.t1490
|
||||
Reference in New Issue
Block a user