-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2023-10-04 20:07:22) (#501)
Co-authored-by: hach1yon <[email protected]>
- Loading branch information
1 parent
b0fc709
commit 7f1d5e3
Showing
136 changed files
with
5,750 additions
and
2,638 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
33 changes: 33 additions & 0 deletions
33
...ng-threats/2023/Malware/DarkGate/proc_creation_win_malware_darkgate_net_user_creation.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: DarkGate User Created Via Net.EXE | ||
id: bf906d7b-7070-4642-8383-e404cf26eba5 | ||
status: experimental | ||
description: Detects creation of local users via the net.exe command with the name | ||
of "DarkGate" | ||
references: | ||
- Internal Research | ||
author: X__Junior (Nextron Systems) | ||
date: 2023/08/27 | ||
tags: | ||
- attack.persistence | ||
- attack.t1136.001 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
CommandLine|contains|all: | ||
- user | ||
- add | ||
- DarkGate | ||
- SafeMode | ||
NewProcessName|endswith: | ||
- \net.exe | ||
- \net1.exe | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unlikely | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
sigma/builtin/process_creation/proc_creation_win_browsers_chromium_headless_debugging.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 35 additions & 0 deletions
35
sigma/builtin/process_creation/proc_creation_win_browsers_chromium_headless_exec.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: Browser Execution In Headless Mode | ||
id: ef9dcfed-690c-4c5d-a9d1-482cd422225c | ||
related: | ||
- id: 0e8cfe08-02c9-4815-a2f8-0d157b7ed33e | ||
type: derived | ||
status: test | ||
description: Detects execution of Chromium based browser in headless mode | ||
references: | ||
- https://twitter.com/mrd0x/status/1478234484881436672?s=12 | ||
- https://www.trendmicro.com/en_us/research/23/e/managed-xdr-investigation-of-ducktail-in-trend-micro-vision-one.html | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2023/09/12 | ||
tags: | ||
- attack.command_and_control | ||
- attack.t1105 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
CommandLine|contains: --headless | ||
NewProcessName|endswith: | ||
- \brave.exe | ||
- \chrome.exe | ||
- \msedge.exe | ||
- \opera.exe | ||
- \vivaldi.exe | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
3 changes: 3 additions & 0 deletions
3
...a/builtin/process_creation/proc_creation_win_browsers_chromium_headless_file_download.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
37 changes: 37 additions & 0 deletions
37
sigma/builtin/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
title: Chromium Browser Headless Execution To Mockbin Like Site | ||
id: 1c526788-0abe-4713-862f-b520da5e5316 | ||
status: experimental | ||
description: Detects the execution of a Chromium based browser process with the "headless" | ||
flag and a URL pointing to the mockbin.org service (which can be used to exfiltrate | ||
data). | ||
references: | ||
- https://www.zscaler.com/blogs/security-research/steal-it-campaign | ||
author: X__Junior (Nextron Systems) | ||
date: 2023/09/11 | ||
tags: | ||
- attack.execution | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
NewProcessName|endswith: | ||
- \brave.exe | ||
- \chrome.exe | ||
- \msedge.exe | ||
- \opera.exe | ||
- \vivaldi.exe | ||
selection_headless: | ||
CommandLine|contains: --headless | ||
selection_url: | ||
CommandLine|contains: | ||
- ://run.mocky | ||
- ://mockbin | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
48 changes: 48 additions & 0 deletions
48
sigma/builtin/process_creation/proc_creation_win_browsers_inline_file_download.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
title: File Download From Browser Process Via Inline Link | ||
id: 94771a71-ba41-4b6e-a757-b531372eaab6 | ||
status: test | ||
description: Detects execution of a browser process with a URL argument pointing to | ||
a file with a potentially interesting extension. This can be abused to download | ||
arbitrary files or to hide from the user for example by launching the browser | ||
in a minimized state. | ||
references: | ||
- https://twitter.com/mrd0x/status/1478116126005641220 | ||
- https://lolbas-project.github.io/lolbas/Binaries/Msedge/ | ||
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems) | ||
date: 2022/01/11 | ||
modified: 2023/04/06 | ||
tags: | ||
- attack.command_and_control | ||
- attack.t1105 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
NewProcessName|endswith: | ||
- \brave.exe | ||
- \chrome.exe | ||
- \msedge.exe | ||
- \opera.exe | ||
- \vivaldi.exe | ||
selection_http: | ||
CommandLine|contains: ' http' | ||
selection_ext: | ||
CommandLine|contains: | ||
- .dat | ||
- .dll | ||
- .exe | ||
- .hta | ||
- .ps1 | ||
- .txt | ||
- .vbe | ||
- .vbs | ||
- .zip | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
34 changes: 0 additions & 34 deletions
34
sigma/builtin/process_creation/proc_creation_win_browsers_msedge_arbitrary_download.yml
This file was deleted.
Oops, something went wrong.
3 changes: 3 additions & 0 deletions
3
sigma/builtin/process_creation/proc_creation_win_browsers_remote_debugging.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.