-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR #5095 from @faisalusuf - Add new rules related to QuickAssis…
…t usage new: QuickAssist Execution new: DNS Query Request By QuickAssist.EXE --------- Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
- Loading branch information
1 parent
a9423d6
commit 8e8b86a
Showing
2 changed files
with
52 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: DNS Query Request By QuickAssist.EXE | ||
id: 882e858a-3233-4ba8-855e-2f3d3575803d | ||
status: experimental | ||
description: | | ||
Detects DNS queries initiated by "QuickAssist.exe" to Microsoft Quick Assist primary endpoint that is used to establish a session. | ||
references: | ||
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/ | ||
- https://www.linkedin.com/posts/kevin-beaumont-security_ive-been-assisting-a-few-orgs-hit-with-successful-activity-7268055739116445701-xxjZ/ | ||
- https://x.com/cyb3rops/status/1862406110365245506 | ||
- https://learn.microsoft.com/en-us/windows/client-management/client-tools/quick-assist | ||
author: Muhammad Faisal (@faisalusuf) | ||
date: 2024-12-19 | ||
tags: | ||
- attack.initial-access | ||
- attack.t1071.001 | ||
- attack.t1210 | ||
logsource: | ||
category: dns_query | ||
product: windows | ||
detection: | ||
selection: | ||
Image|endswith: '\QuickAssist.exe' | ||
QueryName|endswith: 'remoteassistance.support.services.microsoft.com' | ||
condition: selection | ||
falsepositives: | ||
- Legitimate use of Quick Assist in the environment. | ||
level: low |
25 changes: 25 additions & 0 deletions
25
rules/windows/process_creation/proc_creation_win_quickassist_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
title: QuickAssist Execution | ||
id: e20b5b14-ce93-4230-88af-981983ef6e74 | ||
status: experimental | ||
description: | | ||
Detects the execution of Microsoft Quick Assist tool "QuickAssist.exe". This utility can be used by attackers to gain remote access. | ||
references: | ||
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/ | ||
- https://www.linkedin.com/posts/kevin-beaumont-security_ive-been-assisting-a-few-orgs-hit-with-successful-activity-7268055739116445701-xxjZ/ | ||
- https://x.com/cyb3rops/status/1862406110365245506 | ||
- https://learn.microsoft.com/en-us/windows/client-management/client-tools/quick-assist | ||
author: Muhammad Faisal (@faisalusuf) | ||
date: 2024-12-19 | ||
tags: | ||
- attack.command-and-control | ||
- attack.t1219 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection: | ||
Image|endswith: '\QuickAssist.exe' | ||
condition: selection | ||
falsepositives: | ||
- Legitimate use of Quick Assist in the environment. | ||
level: low |