Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test EDRSilencer #5111

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Test EDRSilencer #5111

wants to merge 1 commit into from

Conversation

frack113
Copy link
Member

@frack113 frack113 commented Dec 7, 2024

Summary of the Pull Request

I try EDRSilencer and search for artefact

Changelog

new: FWPUCLNT.DLL Loaded Via Uncommon Process
new: Potential WFP Filters to Block Security Tools

Example Log Event

{
  "Company": "Microsoft Corporation",
  "Computer": "Win11",
  "Correlation_ActivityID": "{00000000-0000-0000-0000-000000000000}",
  "DefaultBase": "0x7FFE66CB0000",
  "Description": "FWP/IPsec User-Mode API",
  "EventID": "5",
  "Execution_ProcessID": "9236",
  "Execution_ThreadID": "9672",
  "FileAge": "70d17h50m50s",
  "FileCreationDate": "2024-09-27T18:26:09",
  "FileVersion": "10.0.22621.4249 (WinBuild.160101.0800)",
  "Hashes": "MD5=24B32FC11A638F35276B585E0D7880E5,SHA1=CE7A376C978BC28AE50B2BDBEA47AADDE07AA682,SHA256=1804C88B8A894E4BC63580CD93C2E19D4C40FA9B0E1DB4EB66A7593110CD1EF4,IMPHASH=0CA254034305A3720D197B3D4A52CBBB",
  "Image": "C:\\Users\\frack113\\Downloads\\EDRSilencer.exe",
  "ImageBase": "0x7FFE66CB0000",
  "ImageCheckSum": "575689",
  "ImageLoaded": "C:\\Windows\\System32\\FWPUCLNT.DLL",
  "ImageName": "\\Device\\HarddiskVolume3\\Windows\\System32\\FWPUCLNT.DLL",
  "ImageSize": "0x83000",
  "Keywords": "0x8000000000000040",
  "Level": "4",
  "Match_Strings": "\\FWPUCLNT.DLL in ImageLoaded",
  "Module": "Sigma",
  "Opcode": "0",
  "OriginalFileName": "fwpuclnt.dll",
  "ProcessId": "9236",
  "Product": "Microsoft® Windows® Operating System",
  "Provider_Guid": "{22FB2CD6-0E7B-422B-A0C7-2FAD1FD0E716}",
  "Provider_Name": "Microsoft-Windows-Kernel-Process",
  "Rule_Author": "Frack113",
  "Rule_Description": "Detects loading of \"FWPUCLNT.dll\" by a uncommon process",
  "Rule_FalsePositives": "Unknown",
  "Rule_Id": "c6292f94-4f20-4155-ac75-b387ee6562dc",
  "Rule_Level": "medium",
  "Rule_Modified": "2024-12-07",
  "Rule_Path": "sigma-rules\\image_load_dll_fwpuclnt_suspicious_process.yml",
  "Rule_References": "Internal Research, https://github.com/netero1010/EDRSilencer/blob/0e73a7037ec65c52894d8208e6f605a7da0a34a6/EDRSilencer.c",
  "Rule_Sigtype": "custom",
  "Rule_Title": "FWPUCLNT.DLL Loaded Via Uncommon Process",
  "Security_UserID": "S-1-5-21-888117185-644776935-3477416708-1104",
  "Task": "5",
  "TimeCreated_SystemTime": "2024-12-07T12:03:06.2175739+01:00",
  "TimeDateStamp": "2256540336",
  "Timestamp": "2041-07-04T10:45:36",
  "Version": "0",
  "Winversion": "22631",
  "aurora_eventid": 7,
  "level": "notice",
  "msg": "Sigma match found",
  "time": "2024-12-07T12:03:06+01:00",
  "_Match": [
    "\\FWPUCLNT.DLL in ImageLoaded"
  ],
  "_Description": [
    "Detects loading of \"FWPUCLNT.dll\" by a uncommon process"
  ],
  "_Author": "Frack113"
}
{
  "Computer": "Win11",
  "Correlation_ActivityID": "{00000000-0000-0000-0000-000000000000}",
  "Details": "Binary Data",
  "EventID": "13",
  "EventType": "SetValue",
  "Execution_ProcessID": "3028",
  "Execution_ThreadID": "3580",
  "Image": "C:\\WINDOWS\\system32\\svchost.exe",
  "Keywords": "0x8000000000000000",
  "Level": "4",
  "Match_Strings": "\\System\\CurrentControlSet\\Services\\BFE\\Parameters\\Policy\\Persistent\\Filter\\ in TargetObject",
  "Module": "Sigma",
  "Opcode": "0",
  "ProcessGuid": "{095b1fc8-1e81-6754-2100-000000004700}",
  "ProcessId": "1488",
  "Provider_Guid": "{5770385F-C22A-43E0-BF4C-06F5698FFBD9}",
  "Provider_Name": "Microsoft-Windows-Sysmon",
  "RuleName": "-",
  "Rule_Author": "Frack113",
  "Rule_Description": "Detects when an attacker registers a new Add WFP filters to block Security tools",
  "Rule_FalsePositives": "Unknown",
  "Rule_Id": "1f1d8209-636e-4c6c-a137-781cca8b82f9",
  "Rule_Level": "medium",
  "Rule_Modified": "2024-12-07",
  "Rule_Path": "sigma-rules\\registry_add_persistence_amsi_providers.yml",
  "Rule_References": "Internal Research, https://github.com/netero1010/EDRSilencer/blob/0e73a7037ec65c52894d8208e6f605a7da0a34a6/EDRSilencer.c",
  "Rule_Sigtype": "custom",
  "Rule_Title": "Potential WFP filters to Block Security Tools",
  "Security_UserID": "S-1-5-18",
  "TargetObject": "HKLM\\System\\CurrentControlSet\\Services\\BFE\\Parameters\\Policy\\Persistent\\Filter\\{0ae23bf5-87c4-4ac9-ac15-a187b41af53d}",
  "Task": "13",
  "TimeCreated_SystemTime": "2024-12-07T11:58:12.7135863+01:00",
  "User": "AUTORITE NT\\SERVICE LOCAL",
  "UtcTime": "2024-12-07 10:58:12.705",
  "Version": "2",
  "Winversion": "22631",
  "aurora_eventid": 99,
  "level": "notice",
  "msg": "Sigma match found",
  "time": "2024-12-07T11:58:14+01:00",
  "_Match": [
    "\\System\\CurrentControlSet\\Services\\BFE\\Parameters\\Policy\\Persistent\\Filter\\ in TargetObject"
  ],
  "_Description": [
    "Detects when an attacker registers a new Add WFP filters to block Security tools"
  ],
  "_Author": "Frack113"
}

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@frack113 frack113 requested a review from nasbench December 7, 2024 13:30
@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Dec 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant