-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
…ixes fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing new: COM Object Hijacking Via Modification Of Default System CLSID Default Value new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21 new: DPAPI Backup Keys And Certificate Export Activity IOC new: DSInternals Suspicious PowerShell Cmdlets new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock new: HackTool - RemoteKrbRelay Execution new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators new: HackTool - SharpDPAPI Execution new: Hypervisor Enforced Paging Translation Disabled new: PDF File Created By RegEdit.EXE new: Periodic Backup For System Registry Hives Enabled new: Renamed Microsoft Teams Execution new: Windows LAPS Credential Dump From Entra ID remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14" update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted. update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers. update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon". update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage. update: Suspicious Electron Application Child Processes - Remove unnecessary filters update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data update: System File Execution Location Anomaly - Enhance filters update: Uncommon Child Process Of Setres.EXE - Update logic and metadata update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language --------- Thanks: cY83rR0H1t Thanks: CTI-Driven Thanks: BIitzkrieg Thanks: DFIR-jwedd Thanks: Snp3r
- Loading branch information
Showing
72 changed files
with
1,261 additions
and
466 deletions.
There are no files selected for viewing
6 changes: 3 additions & 3 deletions
6
...sistence_com_hijacking_susp_locations.yml → ...sistence_com_hijacking_susp_locations.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
...CVE-2023-1389/proxy_exploit_cve_2023_1389_unauth_command_injection_tplink_archer_ax21.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21 | ||
id: 6c7defa9-69f8-4c34-b815-41fce3931754 | ||
status: experimental | ||
description: | | ||
Detects potential exploitation attempt of CVE-2023-1389 an Unauthenticated Command Injection in TP-Link Archer AX21. | ||
references: | ||
- https://www.tenable.com/security/research/tra-2023-11 | ||
- https://github.com/Voyag3r-Security/CVE-2023-1389/blob/4ecada7335b17bf543c0e33b2c9fb6b6215c09ae/archer-rev-shell.py | ||
- https://www.zerodayinitiative.com/blog/2023/4/21/tp-link-wan-side-vulnerability-cve-2023-1389-added-to-the-mirai-botnet-arsenal | ||
author: Nasreddine Bencherchali (Nextron Systems), Rohit Jain | ||
date: 2024/06/25 | ||
tags: | ||
- detection.emerging_threats | ||
- attack.initial_access | ||
- attack.t1190 | ||
- cve.2023.1389 | ||
logsource: | ||
category: proxy | ||
detection: | ||
selection_uri: | ||
cs-method: | ||
- 'GET' | ||
- 'POST' | ||
cs-uri|contains|all: | ||
- '/cgi-bin/luci/;stok=/locale' | ||
- 'form=country' | ||
selection_keyword: | ||
- 'operation=write' | ||
- 'country=$(' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Vulnerability Scanners | ||
level: medium |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
rules-threat-hunting/windows/file/file_event/file_event_win_susp_binary_dropper.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
56 changes: 56 additions & 0 deletions
56
...eat-hunting/windows/process_access/proc_access_win_susp_potential_shellcode_injection.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
title: Potential Shellcode Injection | ||
id: 250ae82f-736e-4844-a68b-0b5e8cc887da | ||
status: test | ||
description: Detects potential shellcode injection as seen used by tools such as Metasploit's migrate and Empire's psinject. | ||
references: | ||
- https://github.com/EmpireProject/PSInject | ||
author: Bhabesh Raj | ||
date: 2022/03/11 | ||
modified: 2024/07/02 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.privilege_escalation | ||
- attack.t1055 | ||
- detection.threat_hunting | ||
logsource: | ||
category: process_access | ||
product: windows | ||
detection: | ||
selection: | ||
GrantedAccess: | ||
- '0x147a' | ||
- '0x1f3fff' | ||
CallTrace|contains: 'UNKNOWN' | ||
filter_main_wmiprvse: | ||
SourceImage: 'C:\Windows\System32\Wbem\Wmiprvse.exe' | ||
TargetImage: 'C:\Windows\system32\lsass.exe' | ||
filter_optional_dell_folders: | ||
# If dell software is installed we get matches like these | ||
# Example 1: | ||
# SourceImage: C:\Program Files\Dell\SupportAssistAgent\bin\SupportAssistAgent.exe | ||
# TargetImage: C:\Program Files\Dell\TechHub\Dell.TechHub.exe | ||
# GrantedAccess: 0x1F3FFF | ||
# Example 2: | ||
# SourceImage: C:\Program Files (x86)\Dell\UpdateService\DCF\Dell.DCF.UA.Bradbury.API.SubAgent.exe | ||
# TargetImage: C:\Program Files\Dell\TechHub\Dell.TechHub.exe | ||
# GrantedAccess: 0x1F3FFF | ||
# Example 3: | ||
# SourceImage: C:\Program Files\Dell\TechHub\Dell.TechHub.exe | ||
# TargetImage: C:\Program Files (x86)\Dell\UpdateService\DCF\Dell.DCF.UA.Bradbury.API.SubAgent.exe | ||
# GrantedAccess: 0x1F3FFF | ||
SourceImage|startswith: | ||
- 'C:\Program Files\Dell\' | ||
- 'C:\Program Files (x86)\Dell\' | ||
TargetImage|startswith: | ||
- 'C:\Program Files\Dell\' | ||
- 'C:\Program Files (x86)\Dell\' | ||
filter_optional_dell_specifc: | ||
SourceImage: 'C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe' | ||
TargetImage: 'C:\Windows\Explorer.EXE' | ||
filter_optional_visual_studio: | ||
SourceImage|startswith: 'C:\Program Files\Microsoft Visual Studio\' | ||
TargetImage|startswith: 'C:\Program Files\Microsoft Visual Studio\' | ||
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_* | ||
falsepositives: | ||
- Unknown | ||
level: medium |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
24 changes: 24 additions & 0 deletions
24
rules/cloud/azure/audit_logs/azure_auditlogs_laps_credential_dumping.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
title: Windows LAPS Credential Dump From Entra ID | ||
id: a4b25073-8947-489c-a8dd-93b41c23f26d | ||
status: experimental | ||
description: Detects when an account dumps the LAPS password from Entra ID. | ||
references: | ||
- https://twitter.com/NathanMcNulty/status/1785051227568632263 | ||
- https://www.cloudcoffee.ch/microsoft-365/configure-windows-laps-in-microsoft-intune/ | ||
- https://techcommunity.microsoft.com/t5/microsoft-entra-blog/introducing-windows-local-administrator-password-solution-with/ba-p/1942487 | ||
author: andrewdanis | ||
date: 2024/06/26 | ||
tags: | ||
- attack.t1098.005 | ||
logsource: | ||
product: azure | ||
service: auditlogs | ||
detection: | ||
selection: | ||
category: 'Device' | ||
activityType|contains: 'Recover device local administrator password' | ||
additionalDetails.additionalInfo|contains: 'Successfully recovered local credential by device id' | ||
condition: selection | ||
falsepositives: | ||
- Approved activity performed by an Administrator. | ||
level: high |
Oops, something went wrong.