Files
hayabusa/rules/alert-rules/sigma/sysmon_dns_over_https_enabled.yml
2021-11-18 08:43:13 +09:00

50 lines
1.8 KiB
YAML

title: DNS-over-HTTPS Enabled by Registry
author: Austin Songer
date: 2021/07/22
description: Detects when a user enables DNS-over-HTTPS. This can be used to hide
internet activity or be used to hide the process of exfiltrating data. With this
enabled organization will lose visibility into data such as query type, response
and originating IP that are used to determine bad actors.
detection:
SELECTION_1:
EventID: 12
SELECTION_2:
EventID: 13
SELECTION_3:
EventID: 14
SELECTION_4:
TargetObject: '*\SOFTWARE\Policies\Microsoft\Edge\BuiltInDnsClientEnabled'
SELECTION_5:
Details: DWORD (1)
SELECTION_6:
TargetObject: '*\SOFTWARE\Google\Chrome\DnsOverHttpsMode'
SELECTION_7:
Details: DWORD (secure)
SELECTION_8:
TargetObject: '*\SOFTWARE\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled'
SELECTION_9:
Details: DWORD (1)
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3) and (((SELECTION_4 and
SELECTION_5) or (SELECTION_6 and SELECTION_7)) or (SELECTION_8 and SELECTION_9)))
falsepositives:
- Unlikely
id: 04b45a8a-d11d-49e4-9acc-4a1b524407a5
level: medium
logsource:
category: registry_event
product: windows
modified: 2021/09/08
references:
- https://www.tenforums.com/tutorials/151318-how-enable-disable-dns-over-https-doh-microsoft-edge.html
- https://github.com/elastic/detection-rules/issues/1371
- https://chromeenterprise.google/policies/?policy=DnsOverHttpsMode
- https://admx.help/HKLM/Software/Policies/Mozilla/Firefox/DNSOverHTTPS
status: experimental
tags:
- attack.defense_evasion
- attack.t1140
- attack.t1112
yml_filename: sysmon_dns_over_https_enabled.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/registry_event