-
Notifications
You must be signed in to change notification settings - Fork 372
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
16 changed files
with
406 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
68 changes: 68 additions & 0 deletions
68
detections/endpoint/windows_archived_collected_data_in_temp_folder.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
name: Windows Archived Collected Data In TEMP Folder | ||
id: cb56a1ea-e0b1-46d5-913f-e024cba40cbe | ||
version: 1 | ||
date: '2024-09-24' | ||
author: Teoderick Contreras, Splunk | ||
data_sources: | ||
- Sysmon Event ID 11 | ||
type: TTP | ||
status: production | ||
description: The following analytic detects the creation of archived files in a temporary folder, which may contain collected data. This behavior is often associated with malicious activity, where attackers compress sensitive information before exfiltration. The detection focuses on monitoring specific directories, such as temp folders, for the presence of newly created archive files (e.g., .zip, .rar, .tar). By identifying this pattern, security teams can quickly respond to potential data collection and exfiltration attempts, minimizing the risk of data breaches and improving overall threat detection. | ||
search: '|tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem | ||
where Filesystem.file_name IN ("*.zip", "*.rar", "*.tar", "*.7z") Filesystem.file_path = "*\\temp\\*" | ||
by _time Filesystem.file_name Filesystem.file_path Filesystem.dest Filesystem.file_create_time | ||
| `drop_dm_object_name(Filesystem)` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `windows_archived_collected_data_in_temp_folder_filter`' | ||
how_to_implement: To successfully implement this search you need to be ingesting information | ||
on process that include the name of the process responsible for the changes from | ||
your endpoints into the `Endpoint` datamodel in the `Processes` node. In addition, | ||
confirm the latest CIM App 4.20 or higher is installed and the latest TA for the | ||
endpoint product. | ||
known_false_positives: unknown | ||
references: | ||
- https://x.com/suyog41/status/1825869470323056748 | ||
- https://g0njxa.medium.com/from-vietnam-to-united-states-malware-fraud-and-dropshipping-98b7a7b2c36d | ||
drilldown_searches: | ||
- name: View the detection results for "$dest$" | ||
search: '%original_detection_search% | search dest = "$dest$"' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: View risk events for the last 7 days for "$dest$" | ||
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
tags: | ||
analytic_story: | ||
- Braodo Stealer | ||
asset_type: Endpoint | ||
confidence: 80 | ||
impact: 80 | ||
message: A archive file [$file_name$] was creatd in %temp% folder on [$dest$]. | ||
mitre_attack_id: | ||
- T1560 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- _time | ||
- Filesystem.dest | ||
- Filesystem.file_create_time | ||
- Filesystem.file_name | ||
- Filesystem.user | ||
- Filesystem.file_path | ||
risk_score: 64 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560/archived_in_temp_dir/braodo_zip_temp.log | ||
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational | ||
sourcetype: XmlWinEventLog |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
69 changes: 69 additions & 0 deletions
69
detections/endpoint/windows_credentials_from_password_stores_chrome_copied_in_temp_dir.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
name: Windows Credentials from Password Stores Chrome Copied in TEMP Dir | ||
id: 4d14c86d-fdee-4393-94da-238d2706902f | ||
version: 1 | ||
date: '2024-09-24' | ||
author: Teoderick Contreras, Splunk | ||
data_sources: | ||
- Sysmon Event ID 11 | ||
type: TTP | ||
status: production | ||
description: The following analytic detects the copying of Chrome's Local State and Login Data files into temporary folders, a tactic often used by the Braodo stealer malware. These files contain encrypted user credentials, including saved passwords and login session details. The detection monitors for suspicious copying activity involving these specific Chrome files, particularly in temp directories where malware typically processes the stolen data. Identifying this behavior enables security teams to act quickly, preventing attackers from decrypting and exfiltrating sensitive browser credentials and mitigating the risk of unauthorized access. | ||
search: '|tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem | ||
where Filesystem.file_name IN ("Local State", "Login Data") Filesystem.file_path = "*\\temp\\*" | ||
by _time Filesystem.file_name Filesystem.file_path Filesystem.dest Filesystem.file_create_time | ||
| `drop_dm_object_name(Filesystem)` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `windows_credentials_from_password_stores_chrome_copied_in_temp_dir_filter`' | ||
how_to_implement: To successfully implement this search you need to be ingesting information | ||
on process that include the name of the process responsible for the changes from | ||
your endpoints into the `Endpoint` datamodel in the `Processes` node. In addition, | ||
confirm the latest CIM App 4.20 or higher is installed and the latest TA for the | ||
endpoint product. | ||
known_false_positives: unknown | ||
references: | ||
- https://x.com/suyog41/status/1825869470323056748 | ||
- https://g0njxa.medium.com/from-vietnam-to-united-states-malware-fraud-and-dropshipping-98b7a7b2c36d | ||
drilldown_searches: | ||
- name: View the detection results for "$dest$" | ||
search: '%original_detection_search% | search dest = "$dest$"' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: View risk events for the last 7 days for "$dest$" | ||
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
tags: | ||
analytic_story: | ||
- Braodo Stealer | ||
asset_type: Endpoint | ||
confidence: 80 | ||
impact: 80 | ||
message: Chrome Password Store File [$file_name] was copied in %temp% folder on [$dest$]. | ||
mitre_attack_id: | ||
- T1555.003 | ||
- T1555 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- _time | ||
- Filesystem.dest | ||
- Filesystem.file_create_time | ||
- Filesystem.file_name | ||
- Filesystem.user | ||
- Filesystem.file_path | ||
risk_score: 64 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1555.003/browser_credential_info_temp/braodo_browser_info.log | ||
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational | ||
sourcetype: XmlWinEventLog |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
69 changes: 69 additions & 0 deletions
69
detections/endpoint/windows_credentials_from_web_browsers_saved_in_temp_folder.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
name: Windows Credentials from Web Browsers Saved in TEMP Folder | ||
id: b36b23ea-763c-417b-bd4a-6a378dabad1a | ||
version: 1 | ||
date: '2024-09-24' | ||
author: Teoderick Contreras, Splunk | ||
data_sources: | ||
- Sysmon Event ID 11 | ||
type: TTP | ||
status: production | ||
description: The following analytic detects the creation of files containing passwords, cookies, and saved login account information by the Braodo stealer malware in temporary folders. Braodo often collects these credentials from browsers and applications, storing them in temp directories before exfiltration. This detection focuses on monitoring for the creation of files with patterns or formats commonly associated with stolen credentials. By identifying these activities, security teams can take needed action to prevent sensitive login data from being leaked, reducing the risk of unauthorized access to user accounts and systems. | ||
search: '|tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem | ||
where Filesystem.file_name IN ("login*", "pass*","cookie*","master_key*") Filesystem.file_path = "*\\temp\\*" | ||
by _time Filesystem.file_name Filesystem.file_path Filesystem.dest Filesystem.file_create_time | ||
| `drop_dm_object_name(Filesystem)` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `windows_credentials_from_web_browsers_saved_in_temp_folder_filter`' | ||
how_to_implement: To successfully implement this search you need to be ingesting information | ||
on process that include the name of the process responsible for the changes from | ||
your endpoints into the `Endpoint` datamodel in the `Processes` node. In addition, | ||
confirm the latest CIM App 4.20 or higher is installed and the latest TA for the | ||
endpoint product. | ||
known_false_positives: unknown | ||
references: | ||
- https://x.com/suyog41/status/1825869470323056748 | ||
- https://g0njxa.medium.com/from-vietnam-to-united-states-malware-fraud-and-dropshipping-98b7a7b2c36d | ||
drilldown_searches: | ||
- name: View the detection results for "$dest$" | ||
search: '%original_detection_search% | search dest = "$dest$"' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: View risk events for the last 7 days for "$dest$" | ||
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
tags: | ||
analytic_story: | ||
- Braodo Stealer | ||
asset_type: Endpoint | ||
confidence: 80 | ||
impact: 80 | ||
message: A known credential file name - [$file_name$] was saved in %temp% folder of [$dest$]. | ||
mitre_attack_id: | ||
- T1555.003 | ||
- T1555 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- _time | ||
- Filesystem.dest | ||
- Filesystem.file_create_time | ||
- Filesystem.file_name | ||
- Filesystem.user | ||
- Filesystem.file_path | ||
risk_score: 64 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1555.003/browser_credential_info_temp/braodo_browser_info.log | ||
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational | ||
sourcetype: XmlWinEventLog |
Oops, something went wrong.