-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2023-10-18 20:07:16) (#510)
Co-authored-by: hach1yon <[email protected]>
- Loading branch information
1 parent
e8a73e1
commit 583fd49
Showing
30 changed files
with
357 additions
and
88 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
13 changes: 9 additions & 4 deletions
13
...are/DarkGate/proc_creation_win_malware_darkgate_autoit3_from_susp_parent_and_location.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
13 changes: 9 additions & 4 deletions
13
sigma/builtin/process_creation/proc_creation_win_susp_task_folder_evasion.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
29 changes: 29 additions & 0 deletions
29
sigma/builtin/registry/registry_set/registry_set_powershell_enablescripts_enabled.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: PowerShell Script Execution Policy Enabled | ||
id: 8218c875-90b9-42e2-b60d-0b0069816d10 | ||
related: | ||
- id: fad91067-08c5-4d1a-8d8c-d96a21b37814 | ||
type: derived | ||
status: experimental | ||
description: Detects the enabling of the PowerShell script execution policy. Once | ||
enabled, this policy allows scripts to be executed. | ||
references: | ||
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.PowerShell::EnableScripts | ||
author: Nasreddine Bencherchali (Nextron Systems), Thurein Oo | ||
date: 2023/10/18 | ||
tags: | ||
- attack.execution | ||
logsource: | ||
category: registry_set | ||
product: windows | ||
detection: | ||
registry_set: | ||
EventID: 4657 | ||
Channel: Security | ||
selection: | ||
TargetObject|endswith: \Policies\Microsoft\Windows\PowerShell\EnableScripts | ||
Details: DWORD (0x00000001) | ||
condition: registry_set and selection | ||
falsepositives: | ||
- Likely | ||
level: low | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
62 changes: 62 additions & 0 deletions
62
...tin/threat-hunting/process_creation/proc_creation_win_regsvr32_dllregisterserver_exec.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
title: Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly | ||
id: ce2c44b5-a6ac-412a-afba-9e89326fa972 | ||
related: | ||
- id: 0ba1da6d-b6ce-4366-828c-18826c9de23e | ||
type: similar | ||
status: experimental | ||
description: 'Detects execution of regsvr32 with the silent flag and no other flags | ||
on a DLL located in an uncommon or potentially suspicious location. | ||
When Regsvr32 is called in such a way, it implicitly calls the DLL export function | ||
''DllRegisterServer''. | ||
' | ||
references: | ||
- https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/ | ||
- https://www.virustotal.com/gui/file/288fc4f954f98d724e6fab32a89477943df5c0e9662cb199a19b90ae0c63aebe/detection | ||
- https://learn.microsoft.com/en-us/windows/win32/api/olectl/nf-olectl-dllregisterserver | ||
- https://ss64.com/nt/regsvr32.html | ||
author: Andreas Braathen (mnemonic.io), Nasreddine Bencherchali (Nextron Systems) | ||
date: 2023/10/17 | ||
tags: | ||
- attack.execution | ||
- attack.t1218 | ||
- detection.threat_hunting | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_image: | ||
- NewProcessName|endswith: \regsvr32.exe | ||
- OriginalFileName: REGSVR32.EXE | ||
selection_cmdline: | ||
CommandLine|contains: | ||
- ' /s ' | ||
- ' /e ' | ||
filter_main_paths: | ||
- CommandLine|contains: | ||
- :\Program Files (x86) | ||
- :\Program Files\ | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
- CurrentDirectory|contains: | ||
- :\Program Files (x86) | ||
- :\Program Files\ | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
filter_main_other_flags: | ||
CommandLine|contains: | ||
- ' /i:' | ||
- '/U ' | ||
filter_main_rpcproxy: | ||
ParentCommandLine|endswith: :\Windows\System32\RpcProxy\RpcProxy.dll | ||
CommandLine: regsvr32 /s rpcproxy.dll | ||
condition: process_creation and (all of selection_* and not 1 of filter_main_*) | ||
falsepositives: | ||
- Legitimate usage as part of application installation, but less likely from e.g. | ||
temporary paths. | ||
level: medium | ||
ruletype: Sigma |
47 changes: 47 additions & 0 deletions
47
.../builtin/threat-hunting/process_creation/proc_creation_win_rundll32_dllregisterserver.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
title: Rundll32.EXE Calling DllRegisterServer Export Function Explicitly | ||
id: d81a9fc6-55db-4461-b962-0e78fea5b0ad | ||
related: | ||
- id: 2569ed8c-1147-498a-9b8c-2ad3656b10ed | ||
type: similar | ||
status: experimental | ||
description: 'Detects when the DLL export function ''DllRegisterServer'' is called | ||
in the commandline by Rundll32 explicitly where the DLL is located in a non-standard | ||
path. | ||
' | ||
references: | ||
- https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/ | ||
- https://www.virustotal.com/gui/file/94816439312563db982cd038cf77cbc5ef4c7003e3edee86e2b0f99e675ed4ed/behavior | ||
- https://learn.microsoft.com/en-us/windows/win32/api/olectl/nf-olectl-dllregisterserver | ||
author: Andreas Braathen (mnemonic.io) | ||
date: 2023/10/17 | ||
tags: | ||
- attack.execution | ||
- attack.t1218 | ||
- detection.threat_hunting | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_image: | ||
- NewProcessName|endswith: \rundll32.exe | ||
- OriginalFileName: RUNDLL32.EXE | ||
selection_cmdline: | ||
CommandLine|contains: DllRegisterServer | ||
filter_main_legit_paths: | ||
CommandLine|contains: | ||
- :\Program Files (x86) | ||
- :\Program Files\ | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
condition: process_creation and (all of selection_* and not 1 of filter_main_*) | ||
falsepositives: | ||
- Legitimate usage as part of application installation, but less likely from e.g. | ||
temporary paths. | ||
- Not every instance is considered malicious, but this rule will capture the malicious | ||
usages. | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
18 changes: 12 additions & 6 deletions
18
...threats/2023/Malware/DarkGate/file_event_win_malware_darkgate_autoit3_binary_creation.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.