Skip to content

Commit

Permalink
Merge pull request #549 from Yamato-Security/476-sysmon-registry-conv…
Browse files Browse the repository at this point in the history
…ersion

feat: Sysmon registry rule conversion
  • Loading branch information
YamatoSecurity authored Dec 19, 2023
2 parents 7bdca9b + e38edbe commit 1929efd
Show file tree
Hide file tree
Showing 243 changed files with 976 additions and 947 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ detection:
EventID: 4657
Channel: Security
selection:
EventType: CreateKey
TargetObject|contains: \Software\Sysinternals\SDelete
OperationType: '%%1904'
ObjectName|contains: \Software\Sysinternals\SDelete
condition: registry_add and selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ detection:
EventID: 4657
Channel: Security
main_selection:
TargetObject|contains:
ObjectName|contains:
- \SOFTWARE\Wow6432Node\Microsoft\Windows CE Services\AutoStart
- \Software\Wow6432Node\Microsoft\Command Processor\Autorun
- \SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components
Expand All @@ -39,19 +39,19 @@ detection:
- \Software\Classes\Clsid\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\Inprocserver32
- \Control Panel\Desktop\Scrnsave.exe
session_manager_base:
TargetObject|contains: \System\CurrentControlSet\Control\Session Manager
ObjectName|contains: \System\CurrentControlSet\Control\Session Manager
session_manager:
TargetObject|contains:
ObjectName|contains:
- \SetupExecute
- \S0InitialCommand
- \KnownDlls
- \Execute
- \BootExecute
- \AppCertDlls
current_version_base:
TargetObject|contains: \SOFTWARE\Microsoft\Windows\CurrentVersion
ObjectName|contains: \SOFTWARE\Microsoft\Windows\CurrentVersion
current_version:
TargetObject|contains:
ObjectName|contains:
- \ShellServiceObjectDelayLoad
- \Run
- \Policies\System\Shell
Expand All @@ -69,9 +69,9 @@ detection:
- \Authentication\Credential Providers
- \Authentication\Credential Provider Filters
nt_current_version_base:
TargetObject|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion
ObjectName|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion
nt_current_version:
TargetObject|contains:
ObjectName|contains:
- \Winlogon\VmApplet
- \Winlogon\Userinit
- \Winlogon\Taskman
Expand All @@ -87,9 +87,9 @@ detection:
- \Windows\Run
- \Windows\Load
wow_current_version_base:
TargetObject|contains: \SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion
ObjectName|contains: \SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion
wow_current_version:
TargetObject|contains:
ObjectName|contains:
- \ShellServiceObjectDelayLoad
- \Run
- \Explorer\ShellServiceObjects
Expand All @@ -98,18 +98,18 @@ detection:
- \Explorer\SharedTaskScheduler
- \Explorer\Browser Helper Objects
wow_nt_current_version_base:
TargetObject|contains: \SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion
ObjectName|contains: \SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion
wow_nt_current_version:
TargetObject|contains:
ObjectName|contains:
- \Windows\Appinit_Dlls
- \Image File Execution Options
- \Drivers32
wow_office:
TargetObject|contains: \Software\Wow6432Node\Microsoft\Office
ObjectName|contains: \Software\Wow6432Node\Microsoft\Office
office:
TargetObject|contains: \Software\Microsoft\Office
ObjectName|contains: \Software\Microsoft\Office
wow_office_details:
TargetObject|contains:
ObjectName|contains:
- \Word\Addins
- \PowerPoint\Addins
- \Outlook\Addins
Expand All @@ -118,18 +118,18 @@ detection:
- \Access\Addins
- test\Special\Perf
wow_ie:
TargetObject|contains: \Software\Wow6432Node\Microsoft\Internet Explorer
ObjectName|contains: \Software\Wow6432Node\Microsoft\Internet Explorer
ie:
TargetObject|contains: \Software\Microsoft\Internet Explorer
ObjectName|contains: \Software\Microsoft\Internet Explorer
wow_ie_details:
TargetObject|contains:
ObjectName|contains:
- \Toolbar
- \Extensions
- \Explorer Bars
wow_classes_base:
TargetObject|contains: \Software\Wow6432Node\Classes
ObjectName|contains: \Software\Wow6432Node\Classes
wow_classes:
TargetObject|contains:
ObjectName|contains:
- \Folder\ShellEx\ExtShellFolderViews
- \Folder\ShellEx\DragDropHandlers
- \Folder\ShellEx\ColumnHandlers
Expand All @@ -143,9 +143,9 @@ detection:
- \ShellEx\PropertySheetHandlers
- \ShellEx\ContextMenuHandlers
classes_base:
TargetObject|contains: \Software\Classes
ObjectName|contains: \Software\Classes
classes:
TargetObject|contains:
ObjectName|contains:
- \Folder\ShellEx\ExtShellFolderViews
- \Folder\ShellEx\DragDropHandlers
- \Folder\Shellex\ColumnHandlers
Expand All @@ -163,23 +163,23 @@ detection:
- \ShellEx\PropertySheetHandlers
- \ShellEx\ContextMenuHandlers
scripts_base:
TargetObject|contains: \Software\Policies\Microsoft\Windows\System\Scripts
ObjectName|contains: \Software\Policies\Microsoft\Windows\System\Scripts
scripts:
TargetObject|contains:
ObjectName|contains:
- \Startup
- \Shutdown
- \Logon
- \Logoff
winsock_parameters_base:
TargetObject|contains: \System\CurrentControlSet\Services\WinSock2\Parameters
ObjectName|contains: \System\CurrentControlSet\Services\WinSock2\Parameters
winsock_parameters:
TargetObject|contains:
ObjectName|contains:
- \Protocol_Catalog9\Catalog_Entries
- \NameSpace_Catalog5\Catalog_Entries
system_control_base:
TargetObject|contains: \SYSTEM\CurrentControlSet\Control
ObjectName|contains: \SYSTEM\CurrentControlSet\Control
system_control:
TargetObject|contains:
ObjectName|contains:
- \Terminal Server\WinStations\RDP-Tcp\InitialProgram
- \Terminal Server\Wds\rdpwd\StartupPrograms
- \SecurityProviders\SecurityProviders
Expand All @@ -191,9 +191,9 @@ detection:
- \Lsa\Authentication Packages
- \BootVerificationProgram\ImagePath
filter:
- Details: (Empty)
- TargetObject|endswith: \NgcFirst\ConsecutiveSwitchCount
- Image: C:\WINDOWS\System32\svchost.exe
- NewValue: (Empty)
- ObjectName|endswith: \NgcFirst\ConsecutiveSwitchCount
- ProcessName: C:\WINDOWS\System32\svchost.exe
condition: registry_event and (( main_selection or session_manager_base and session_manager
or current_version_base and current_version or nt_current_version_base and
nt_current_version or wow_current_version_base and wow_current_version or
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,8 +29,8 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\
Details|endswith:
ObjectName|contains: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\
NewValue|endswith:
- .sh
- .exe
- .dll
Expand All @@ -46,10 +46,10 @@ detection:
- .vbs
condition: registry_set and selection
fields:
- ObjectName
- NewValue
- EventID
- CommandLine
- TargetObject
- Details
falsepositives:
- Unknown
level: high
Expand Down
6 changes: 3 additions & 3 deletions sigma/builtin/deprecated/registry_set_add_hidden_user.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,9 +19,9 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\
TargetObject|endswith: $
Details: DWORD (0x00000000)
ObjectName|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\
ObjectName|endswith: $
NewValue: DWORD (0x00000000)
condition: registry_set and selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,13 +21,13 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains: \SOFTWARE\Microsoft\Office\
TargetObject|endswith:
ObjectName|contains: \SOFTWARE\Microsoft\Office\
ObjectName|endswith:
- VBAWarnings
- DisableInternetFilesInPV
- DisableUnsafeLocationsInPV
- DisableAttachementsInPV
Details: DWORD (0x00000001)
NewValue: DWORD (0x00000001)
condition: registry_set and selection
falsepositives:
- Unknown
Expand Down
2 changes: 1 addition & 1 deletion sigma/builtin/deprecated/registry_set_office_security.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|endswith:
ObjectName|endswith:
- \Security\Trusted Documents\TrustRecords
- \Security\AccessVBOM
- \Security\VBAWarnings
Expand Down
4 changes: 2 additions & 2 deletions sigma/builtin/deprecated/registry_set_silentprocessexit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains: Microsoft\Windows NT\CurrentVersion\SilentProcessExit
Details|contains: MonitorProcess
ObjectName|contains: Microsoft\Windows NT\CurrentVersion\SilentProcessExit
NewValue|contains: MonitorProcess
condition: registry_set and selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,11 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|endswith:
ObjectName|endswith:
- CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\(Default)
- CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InProcServer32\(Default)
filter:
Details|endswith:
NewValue|endswith:
- system32\wbem\wmiutils.dll
- system32\wbem\wbemsvc.dll
condition: registry_set and (selection and not filter)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@ detection:
EventID: 4657
Channel: Security
selection_path:
TargetObject|contains: \Microsoft\Windows\CurrentVersion\Run\
ObjectName|contains: \Microsoft\Windows\CurrentVersion\Run\
selection_value:
- TargetObject|contains: Microsift
- Details|contains: .exe Platypus
- ObjectName|contains: Microsift
- NewValue|contains: .exe Platypus
condition: registry_set and (all of selection_*)
falsepositives:
- Unlikely
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,10 +23,10 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains|all:
ObjectName|contains|all:
- \SOFTWARE\Microsoft\Office\
- \Outlook\
TargetObject|contains:
ObjectName|contains:
- \Tasks\
- \Notes\
condition: registry_set and selection
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains|all:
ObjectName|contains|all:
- \SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-
- \ProfileImagePath
Details|contains:
NewValue|contains:
- ANONYMOUS
- _DomainUser_
condition: registry_set and selection
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|endswith: SECURITY\Policy\Secrets\n
ObjectName|endswith: SECURITY\Policy\Secrets\n
condition: registry_event and selection
level: high
ruletype: Sigma
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,10 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains: \SOFTWARE\Classes\.wav\OpenWithProgIds\
ObjectName|contains: \SOFTWARE\Classes\.wav\OpenWithProgIds\
filter_main_wav:
- TargetObject|endswith: .AssocFile.WAV
- TargetObject|contains: .wav.
- ObjectName|endswith: .AssocFile.WAV
- ObjectName|contains: .wav.
condition: registry_set and (selection and not 1 of filter_main_*)
falsepositives:
- Some additional tuning might be required to tune out legitimate processes that
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ detection:
EventID: 4657
Channel: Security
selection:
TargetObject|contains|all:
ObjectName|contains|all:
- \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\
- Windows TeamCity Settings User Interface
condition: registry_event and selection
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,8 @@ detection:
EventID: 4657
Channel: Security
selection:
EventType: CreateKey
TargetObject|contains: \software\NetWire
OperationType: '%%1904'
ObjectName|contains: \software\NetWire
condition: registry_add and selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@ detection:
EventID: 4657
Channel: Security
selection:
EventType: CreateKey
TargetObject|contains: \Software\AppDataLow\Software\Microsoft\
OperationType: '%%1904'
ObjectName|contains: \Software\AppDataLow\Software\Microsoft\
filter:
TargetObject|contains:
ObjectName|contains:
- \SOFTWARE\AppDataLow\Software\Microsoft\Internet Explorer\
- \SOFTWARE\AppDataLow\Software\Microsoft\RepService\
- \SOFTWARE\AppDataLow\Software\Microsoft\IME\
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,12 @@ detection:
EventID: 4657
Channel: Security
selection:
EventType: CreateKey
TargetObject|contains:
OperationType: '%%1904'
ObjectName|contains:
- \SOFTWARE\Microsoft\AMSI\Providers\
- \SOFTWARE\WOW6432Node\Microsoft\AMSI\Providers\
filter:
Image|startswith:
ProcessName|startswith:
- C:\Windows\System32\
- C:\Program Files\
- C:\Program Files (x86)\
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,13 +18,13 @@ detection:
EventID: 4657
Channel: Security
selection:
EventType: CreateKey
TargetObject|contains|all:
- HKU\
OperationType: '%%1904'
ObjectName|contains|all:
- \REGISTRY\USER\
- Classes\CLSID\
- \TreatAs
filter_svchost:
Image: C:\WINDOWS\system32\svchost.exe
ProcessName: C:\WINDOWS\system32\svchost.exe
condition: registry_add and (selection and not 1 of filter_*)
falsepositives:
- Maybe some system utilities in rare cases use linking keys for backward compatibility
Expand Down
Loading

0 comments on commit 1929efd

Please sign in to comment.