-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2023-11-14 20:06:20) (#531)
Co-authored-by: hach1yon <[email protected]>
- Loading branch information
1 parent
6a95a17
commit fe55d81
Showing
46 changed files
with
904 additions
and
292 deletions.
There are no files selected for viewing
53 changes: 53 additions & 0 deletions
53
sigma/builtin/process_creation/proc_creation_win_appvlp_uncommon_child_process.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
title: Uncommon Child Process Of Appvlp.EXE | ||
id: 9c7e131a-0f2c-4ae0-9d43-b04f4e266d43 | ||
status: test | ||
description: 'Detects uncommon child processes of Appvlp.EXE | ||
Appvlp or the Application Virtualization Utility is included with Microsoft Office. | ||
Attackers are able to abuse "AppVLP" to execute shell commands. | ||
Normally, this binary is used for Application Virtualization, but it can also | ||
be abused to circumvent the ASR file path rule folder | ||
or to mark a file as a system file. | ||
' | ||
references: | ||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Appvlp/ | ||
author: Sreeman | ||
date: 2020/03/13 | ||
modified: 2023/11/09 | ||
tags: | ||
- attack.t1218 | ||
- attack.defense_evasion | ||
- attack.execution | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
ParentProcessName|endswith: \appvlp.exe | ||
filter_main_generic: | ||
NewProcessName|endswith: | ||
- :\Windows\SysWOW64\rundll32.exe | ||
- :\Windows\System32\rundll32.exe | ||
filter_optional_office_msoasb: | ||
NewProcessName|contains: :\Program Files\Microsoft Office | ||
NewProcessName|endswith: \msoasb.exe | ||
filter_optional_office_skype: | ||
NewProcessName|contains|all: | ||
- :\Program Files\Microsoft Office | ||
- \SkypeSrv\ | ||
NewProcessName|endswith: \SKYPESERVER.EXE | ||
filter_optional_office_msouc: | ||
NewProcessName|contains: :\Program Files\Microsoft Office | ||
NewProcessName|endswith: \MSOUC.EXE | ||
condition: process_creation and (selection and not 1 of filter_main_* and not | ||
1 of filter_optional_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 35 additions & 0 deletions
35
sigma/builtin/process_creation/proc_creation_win_imewbdld_download.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: Arbitrary File Download Via IMEWDBLD.EXE | ||
id: 863218bd-c7d0-4c52-80cd-0a96c09f54af | ||
related: | ||
- id: 8d7e392e-9b28-49e1-831d-5949c6281228 | ||
type: derived | ||
status: experimental | ||
description: Detects usage of "IMEWDBLD.exe" to download arbitrary files | ||
references: | ||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-10---windows---powershell-download | ||
- https://lolbas-project.github.io/lolbas/Binaries/IMEWDBLD/ | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2023/11/09 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.execution | ||
- attack.t1218 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
- NewProcessName|endswith: \IMEWDBLD.exe | ||
- OriginalFileName: imewdbld.exe | ||
selection_cli: | ||
CommandLine|contains: | ||
- http:// | ||
- https:// | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
39 changes: 0 additions & 39 deletions
39
sigma/builtin/process_creation/proc_creation_win_lolbin_appvlp.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
31 changes: 31 additions & 0 deletions
31
sigma/builtin/process_creation/proc_creation_win_msedge_proxy_download.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
title: Arbitrary File Download Via MSEDGE_PROXY.EXE | ||
id: e84d89c4-f544-41ca-a6af-4b92fd38b023 | ||
status: experimental | ||
description: Detects usage of "msedge_proxy.exe" to download arbitrary files | ||
references: | ||
- https://lolbas-project.github.io/lolbas/Binaries/msedge_proxy/ | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2023/11/09 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.execution | ||
- attack.t1218 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
- NewProcessName|endswith: \msedge_proxy.exe | ||
- OriginalFileName: msedge_proxy.exe | ||
selection_cli: | ||
CommandLine|contains: | ||
- http:// | ||
- https:// | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.