-
Notifications
You must be signed in to change notification settings - Fork 26
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2024-01-10 20:07:57) (#563)
Co-authored-by: hach1yon <[email protected]>
1 parent
e5895af
commit 9d456e2
Showing
39 changed files
with
734 additions
and
168 deletions.
There are no files selected for viewing
56 changes: 56 additions & 0 deletions
56
...ts/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_combined_commands_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
title: Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE | ||
id: e5144106-8198-4f6e-bfc2-0a551cc8dd94 | ||
status: experimental | ||
description: 'Detects the execution of concatenated commands via "cmd.exe". Pikabot | ||
often executes a combination of multiple commands via the command handler "cmd | ||
/c" in order to download and execute additional payloads. | ||
Commands such as "curl", "wget" in order to download extra payloads. "ping" and | ||
"timeout" are abused to introduce delays in the command execution and "Rundll32" | ||
is also used to execute malicious DLL files. | ||
In the observed Pikabot infections, a combination of the commands described above | ||
are used to orchestrate the download and execution of malicious DLL files. | ||
' | ||
references: | ||
- https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_30.10.2023.txt | ||
- https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_22.12.2023.txt | ||
author: Alejandro Houspanossian ('@lekz86') | ||
date: 2024/01/02 | ||
tags: | ||
- attack.execution | ||
- attack.t1059.003 | ||
- attack.t1105 | ||
- attack.t1218 | ||
- detection.emerging_threats | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_cmd: | ||
CommandLine|contains|all: | ||
- cmd | ||
- /c | ||
selection_pipes: | ||
CommandLine|contains: | ||
- ' & ' | ||
- ' || ' | ||
selection_commands_1: | ||
CommandLine|contains: | ||
- ' curl' | ||
- ' wget' | ||
- ' timeout ' | ||
- ' ping ' | ||
selection_commands_2: | ||
CommandLine|contains: | ||
- ' rundll32' | ||
- ' mkdir ' | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
31 changes: 31 additions & 0 deletions
31
sigma/builtin/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
title: Binary Proxy Execution Via Dotnet-Trace.EXE | ||
id: 9257c05b-4a4a-48e5-a670-b7b073cf401b | ||
status: experimental | ||
description: Detects commandline arguments for executing a child process via dotnet-trace.exe | ||
references: | ||
- https://twitter.com/bohops/status/1740022869198037480 | ||
author: Jimmy Bayne (@bohops) | ||
date: 2024/01/02 | ||
tags: | ||
- attack.execution | ||
- attack.defense_evasion | ||
- attack.t1218 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
- NewProcessName|endswith: \dotnet-trace.exe | ||
- OriginalFileName: dotnet-trace.dll | ||
selection_cli: | ||
CommandLine|contains|all: | ||
- '-- ' | ||
- collect | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Legitimate usage of the utility in order to debug and trace a program. | ||
level: medium | ||
ruletype: Sigma |
41 changes: 41 additions & 0 deletions
41
sigma/builtin/process_creation/proc_creation_win_forfiles_child_process_masquerading.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
title: Forfiles.EXE Child Process Masquerading | ||
id: f53714ec-5077-420e-ad20-907ff9bb2958 | ||
status: experimental | ||
description: 'Detects the execution of "forfiles" from a non-default location, in | ||
order to potentially spawn a custom "cmd.exe" from the current working directory. | ||
' | ||
references: | ||
- https://www.hexacorn.com/blog/2023/12/31/1-little-known-secret-of-forfiles-exe/ | ||
author: Nasreddine Bencherchali (Nextron Systems), Anish Bogati | ||
date: 2024/01/05 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1036 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
ParentCommandLine|endswith: | ||
- .exe | ||
- .exe" | ||
CommandLine|startswith: /c echo " | ||
NewProcessName|endswith: \cmd.exe | ||
filter_main_parent_not_sys: | ||
ParentProcessName|contains: | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
ParentProcessName|endswith: \forfiles.exe | ||
NewProcessName|contains: | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
NewProcessName|endswith: \cmd.exe | ||
condition: process_creation and (selection and not 1 of filter_main_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
31 changes: 31 additions & 0 deletions
31
sigma/builtin/process_creation/proc_creation_win_hktl_edrsilencer.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
title: HackTool - EDRSilencer Execution | ||
id: eb2d07d4-49cb-4523-801a-da002df36602 | ||
status: experimental | ||
description: 'Detects the execution of EDRSilencer, a tool that leverages Windows | ||
Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents | ||
from reporting security events to the server based on PE metadata information. | ||
' | ||
references: | ||
- https://github.com/netero1010/EDRSilencer | ||
author: '@gott_cyber' | ||
date: 2024/01/02 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
- NewProcessName|endswith: \EDRSilencer.exe | ||
- OriginalFileName: EDRSilencer.exe | ||
- Description|contains: EDRSilencer | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unlikely | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
34 changes: 34 additions & 0 deletions
34
...in/registry/registry_set/registry_set_persistence_app_cpmpat_layer_registerapprestart.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
title: Potential Persistence Via AppCompat RegisterAppRestart Layer | ||
id: b86852fb-4c77-48f9-8519-eb1b2c308b59 | ||
status: experimental | ||
description: 'Detects the setting of the REGISTERAPPRESTART compatibility layer on | ||
an application. | ||
This compatibility layer allows an application to register for restart using the | ||
"RegisterApplicationRestart" API. | ||
This can be potentially abused as a persistence mechanism. | ||
' | ||
references: | ||
- https://github.com/nasbench/Misc-Research/blob/d114d6a5e0a437d3818e492ef9864367152543e7/Other/Persistence-Via-RegisterAppRestart-Shim.md | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/01/01 | ||
tags: | ||
- attack.persistence | ||
- attack.t1546.011 | ||
logsource: | ||
category: registry_set | ||
product: windows | ||
detection: | ||
registry_set: | ||
EventID: 4657 | ||
Channel: Security | ||
selection: | ||
ObjectName|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers\ | ||
NewValue|contains: REGISTERAPPRESTART | ||
condition: registry_set and selection | ||
falsepositives: | ||
- Legitimate applications making use of this feature for compatibility reasons | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
title: HackTool - NoFilter Execution | ||
id: 7b14c76a-c602-4ae6-9717-eff868153fc0 | ||
status: experimental | ||
description: 'Detects execution of NoFilter, a tool for abusing the Windows Filtering | ||
Platform for privilege escalation via hardcoded policy name indicators | ||
' | ||
references: | ||
- https://github.com/deepinstinct/NoFilter/blob/121d215ab130c5e8e3ad45a7e7fcd56f4de97b4d/NoFilter/Consts.cpp | ||
- https://github.com/deepinstinct/NoFilter | ||
- https://www.deepinstinct.com/blog/nofilter-abusing-windows-filtering-platform-for-privilege-escalation | ||
- https://x.com/_st0pp3r_/status/1742203752361128162?s=20 | ||
author: Stamatis Chatzimangou (st0pp3r) | ||
date: 2024/01/05 | ||
tags: | ||
- attack.privilege_escalation | ||
- attack.t1134 | ||
- attack.t1134.001 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: 'Requirements: Audit Filtering Platform Policy Change needs to be | ||
enabled' | ||
detection: | ||
security: | ||
Channel: Security | ||
selection_5447: | ||
EventID: 5447 | ||
FilterName|contains: RonPolicy | ||
selection_5449: | ||
EventID: 5449 | ||
ProviderContextName|contains: RonPolicy | ||
condition: security and (1 of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
57 changes: 57 additions & 0 deletions
57
...ts/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_combined_commands_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
title: Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE | ||
id: e5144106-8198-4f6e-bfc2-0a551cc8dd94 | ||
status: experimental | ||
description: 'Detects the execution of concatenated commands via "cmd.exe". Pikabot | ||
often executes a combination of multiple commands via the command handler "cmd | ||
/c" in order to download and execute additional payloads. | ||
Commands such as "curl", "wget" in order to download extra payloads. "ping" and | ||
"timeout" are abused to introduce delays in the command execution and "Rundll32" | ||
is also used to execute malicious DLL files. | ||
In the observed Pikabot infections, a combination of the commands described above | ||
are used to orchestrate the download and execution of malicious DLL files. | ||
' | ||
references: | ||
- https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_30.10.2023.txt | ||
- https://github.com/pr0xylife/Pikabot/blob/7f7723a74ca325ec54c6e61e076acce9a4b20538/Pikabot_22.12.2023.txt | ||
author: Alejandro Houspanossian ('@lekz86') | ||
date: 2024/01/02 | ||
tags: | ||
- attack.execution | ||
- attack.t1059.003 | ||
- attack.t1105 | ||
- attack.t1218 | ||
- detection.emerging_threats | ||
- sysmon | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
process_creation: | ||
EventID: 1 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection_cmd: | ||
CommandLine|contains|all: | ||
- cmd | ||
- /c | ||
selection_pipes: | ||
CommandLine|contains: | ||
- ' & ' | ||
- ' || ' | ||
selection_commands_1: | ||
CommandLine|contains: | ||
- ' curl' | ||
- ' wget' | ||
- ' timeout ' | ||
- ' ping ' | ||
selection_commands_2: | ||
CommandLine|contains: | ||
- ' rundll32' | ||
- ' mkdir ' | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
32 changes: 32 additions & 0 deletions
32
sigma/sysmon/process_creation/proc_creation_win_dotnet_trace_lolbin_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
title: Binary Proxy Execution Via Dotnet-Trace.EXE | ||
id: 9257c05b-4a4a-48e5-a670-b7b073cf401b | ||
status: experimental | ||
description: Detects commandline arguments for executing a child process via dotnet-trace.exe | ||
references: | ||
- https://twitter.com/bohops/status/1740022869198037480 | ||
author: Jimmy Bayne (@bohops) | ||
date: 2024/01/02 | ||
tags: | ||
- attack.execution | ||
- attack.defense_evasion | ||
- attack.t1218 | ||
- sysmon | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 1 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection_img: | ||
- Image|endswith: \dotnet-trace.exe | ||
- OriginalFileName: dotnet-trace.dll | ||
selection_cli: | ||
CommandLine|contains|all: | ||
- '-- ' | ||
- collect | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Legitimate usage of the utility in order to debug and trace a program. | ||
level: medium | ||
ruletype: Sigma |
42 changes: 42 additions & 0 deletions
42
sigma/sysmon/process_creation/proc_creation_win_forfiles_child_process_masquerading.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
title: Forfiles.EXE Child Process Masquerading | ||
id: f53714ec-5077-420e-ad20-907ff9bb2958 | ||
status: experimental | ||
description: 'Detects the execution of "forfiles" from a non-default location, in | ||
order to potentially spawn a custom "cmd.exe" from the current working directory. | ||
' | ||
references: | ||
- https://www.hexacorn.com/blog/2023/12/31/1-little-known-secret-of-forfiles-exe/ | ||
author: Nasreddine Bencherchali (Nextron Systems), Anish Bogati | ||
date: 2024/01/05 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1036 | ||
- sysmon | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 1 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection: | ||
ParentCommandLine|endswith: | ||
- .exe | ||
- .exe" | ||
Image|endswith: \cmd.exe | ||
CommandLine|startswith: /c echo " | ||
filter_main_parent_not_sys: | ||
ParentImage|contains: | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
ParentImage|endswith: \forfiles.exe | ||
Image|contains: | ||
- :\Windows\System32\ | ||
- :\Windows\SysWOW64\ | ||
Image|endswith: \cmd.exe | ||
condition: process_creation and (selection and not 1 of filter_main_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
32 changes: 32 additions & 0 deletions
32
sigma/sysmon/process_creation/proc_creation_win_hktl_edrsilencer.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
title: HackTool - EDRSilencer Execution | ||
id: eb2d07d4-49cb-4523-801a-da002df36602 | ||
status: experimental | ||
description: 'Detects the execution of EDRSilencer, a tool that leverages Windows | ||
Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents | ||
from reporting security events to the server based on PE metadata information. | ||
' | ||
references: | ||
- https://github.com/netero1010/EDRSilencer | ||
author: '@gott_cyber' | ||
date: 2024/01/02 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562 | ||
- sysmon | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 1 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection: | ||
- Image|endswith: \EDRSilencer.exe | ||
- OriginalFileName: EDRSilencer.exe | ||
- Description|contains: EDRSilencer | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unlikely | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 35 additions & 0 deletions
35
...on/registry/registry_set/registry_set_persistence_app_cpmpat_layer_registerapprestart.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: Potential Persistence Via AppCompat RegisterAppRestart Layer | ||
id: b86852fb-4c77-48f9-8519-eb1b2c308b59 | ||
status: experimental | ||
description: 'Detects the setting of the REGISTERAPPRESTART compatibility layer on | ||
an application. | ||
This compatibility layer allows an application to register for restart using the | ||
"RegisterApplicationRestart" API. | ||
This can be potentially abused as a persistence mechanism. | ||
' | ||
references: | ||
- https://github.com/nasbench/Misc-Research/blob/d114d6a5e0a437d3818e492ef9864367152543e7/Other/Persistence-Via-RegisterAppRestart-Shim.md | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/01/01 | ||
tags: | ||
- attack.persistence | ||
- attack.t1546.011 | ||
- sysmon | ||
logsource: | ||
category: registry_set | ||
product: windows | ||
detection: | ||
registry_set: | ||
EventID: 13 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection: | ||
TargetObject|contains: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers\ | ||
Details|contains: REGISTERAPPRESTART | ||
condition: registry_set and selection | ||
falsepositives: | ||
- Legitimate applications making use of this feature for compatibility reasons | ||
level: medium | ||
ruletype: Sigma |