-
Notifications
You must be signed in to change notification settings - Fork 25
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2024-09-06 20:13:52) (#714)
Co-authored-by: hach1yon <[email protected]>
- Loading branch information
1 parent
dd25a5b
commit 9cdc107
Showing
9 changed files
with
122 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 4 additions & 0 deletions
4
sigma/builtin/process_creation/proc_creation_win_susp_right_to_left_override.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
sigma/builtin/security/win_security_susp_group_policy_abuse_privilege_addition.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: Group Policy Abuse for Privilege Addition | ||
id: 6e3066ef-54e1-9d1b-5bc6-9ae6947ae271 | ||
related: | ||
- id: 1c480e10-7ee1-46d4-8ed2-85f9789e3ce4 | ||
type: derived | ||
status: experimental | ||
description: | | ||
Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins. | ||
author: Elastic, Josh Nickels, Marius Rothenbücher | ||
references: | ||
- https://www.elastic.co/guide/en/security/current/group-policy-abuse-for-privilege-addition.html#_setup_275 | ||
date: 2024-09-04 | ||
tags: | ||
- attack.privilege-escalation | ||
- attack.t1484.001 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: 'Requirements: The "Audit Directory Service Changes" logging policy must be configured in order to receive events.' | ||
detection: | ||
security: | ||
Channel: Security | ||
selection: | ||
EventID: 5136 | ||
AttributeLDAPDisplayName: gPCMachineExtensionNames | ||
AttributeValue|contains: | ||
- 827D319E-6EAC-11D2-A4EA-00C04F79F83A | ||
- 803E14A0-B4FB-11D0-A0D0-00A0C90F574B | ||
condition: security and selection | ||
falsepositives: | ||
- Users allowed to perform these modifications (user found in field SubjectUserName) | ||
level: medium | ||
ruletype: Sigma |
47 changes: 47 additions & 0 deletions
47
sigma/builtin/security/win_security_susp_group_policy_startup_script_added_to_gpo.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
title: Startup/Logon Script Added to Group Policy Object | ||
id: bc613d09-5a80-cad3-6f65-c5020f960511 | ||
related: | ||
- id: 123e4e6d-b123-48f8-b261-7214938acaf0 | ||
type: derived | ||
status: experimental | ||
description: | | ||
Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects. | ||
references: | ||
- https://www.elastic.co/guide/en/security/current/startup-logon-script-added-to-group-policy-object.html | ||
author: Elastic, Josh Nickels, Marius Rothenbücher | ||
date: 2024-09-06 | ||
tags: | ||
- attack.privilege-escalation | ||
- attack.t1484.001 | ||
- attack.t1547 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure | ||
detection: | ||
security: | ||
Channel: Security | ||
selection_eventid: | ||
EventID: | ||
- 5136 | ||
- 5145 | ||
selection_attributes_main: | ||
AttributeLDAPDisplayName: | ||
- gPCMachineExtensionNames | ||
- gPCUserExtensionNames | ||
AttributeValue|contains: 42B5FAAE-6536-11D2-AE5A-0000F87571E3 | ||
selection_attributes_optional: | ||
AttributeValue|contains: | ||
- 40B6664F-4972-11D1-A7CA-0000F87571E3 | ||
- 40B66650-4972-11D1-A7CA-0000F87571E3 | ||
selection_share: | ||
ShareName|endswith: \SYSVOL | ||
RelativeTargetName|endswith: | ||
- \scripts.ini | ||
- \psscripts.ini | ||
AccessList|contains: '%%4417' | ||
condition: security and (selection_eventid and (all of selection_attributes_* or selection_share)) | ||
falsepositives: | ||
- Legitimate execution by system administrators. | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 4 additions & 0 deletions
4
sigma/sysmon/process_creation/proc_creation_win_susp_right_to_left_override.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters