-
Notifications
You must be signed in to change notification settings - Fork 26
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2024-02-24 20:11:49) (#609)
Co-authored-by: hach1yon <[email protected]>
- Loading branch information
1 parent
e60c2d8
commit fa53e02
Showing
29 changed files
with
649 additions
and
48 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
69 changes: 69 additions & 0 deletions
69
...ltin/process_creation/proc_creation_win_powershell_download_susp_file_sharing_domains.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
title: Potentially Suspicious File Download From File Sharing Domain Via PowerShell.EXE | ||
id: b6e04788-29e1-4557-bb14-77f761848ab8 | ||
status: experimental | ||
description: Detects potentially suspicious file downloads from file sharing domains using PowerShell.exe | ||
references: | ||
- https://labs.withsecure.com/publications/fin7-target-veeam-servers | ||
- https://github.com/WithSecureLabs/iocs/blob/344203de742bb7e68bd56618f66d34be95a9f9fc/FIN7VEEAM/iocs.csv | ||
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/ | ||
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708 | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/02/23 | ||
tags: | ||
- attack.execution | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
- NewProcessName|endswith: | ||
- \powershell.exe | ||
- \pwsh.exe | ||
- OriginalFileName: | ||
- PowerShell.EXE | ||
- pwsh.dll | ||
selection_websites: | ||
CommandLine|contains: | ||
# Note: You might want to baseline the github domain before including it | ||
#- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea). | ||
- anonfiles.com | ||
- cdn.discordapp.com | ||
- cdn.discordapp.com/attachments/ | ||
- ddns.net | ||
- dl.dropboxusercontent.com | ||
- ghostbin.co | ||
- glitch.me | ||
- gofile.io | ||
- hastebin.com | ||
- mediafire.com | ||
- mega.nz | ||
- onrender.com | ||
- paste.ee | ||
- pastebin.com | ||
- pastebin.pl | ||
- pastetext.net | ||
- privatlab.com | ||
- privatlab.net | ||
- send.exploit.in | ||
- sendspace.com | ||
- storage.googleapis.com | ||
- storjshare.io | ||
- supabase.co | ||
- temp.sh | ||
- transfer.sh | ||
- ufile.io | ||
selection_download: | ||
CommandLine|contains: | ||
- .DownloadString( | ||
- .DownloadFile( | ||
- 'Invoke-WebRequest ' | ||
- 'iwr ' | ||
- 'wget ' | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
43 changes: 43 additions & 0 deletions
43
...uiltin/process_creation/proc_creation_win_remote_access_tools_screenconnect_anomaly_2.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
title: Remote Access Tool - ScreenConnect Backstage Mode Anomaly 2 | ||
id: 51544ca6-51ab-48de-97e9-b1317707760c | ||
related: | ||
- id: d1a401ab-8c47-4e86-a7d8-2460b6a53e4a | ||
type: derived | ||
- id: 7b582f1a-b318-4c6a-bf4e-66fe49bf55a5 | ||
type: derived | ||
status: experimental | ||
description: Detects suspicious grand child processes started by the ScreenConnect client service. | ||
references: | ||
- https://www.mandiant.com/resources/telegram-malware-iranian-espionage | ||
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode | ||
author: Florian Roth (Nextron Systems) | ||
date: 2022/02/25 | ||
modified: 2023/03/05 | ||
tags: | ||
- attack.command_and_control | ||
- attack.t1219 | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
definition: 'Requirements: To make use of this rule, GrandParentImage field enrichment needs to be available for process creation events' | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
GrandParentImage|endswith: \ScreenConnect.ClientService.exe | ||
ParentProcessName|endswith: | ||
- \cmd.exe | ||
- \powershell.exe | ||
- \pwsh.exe | ||
NewProcessName|endswith: | ||
- \cmd.exe | ||
- \curl.exe | ||
- \powershell.exe | ||
- \pwsh.exe | ||
- \wevtutil.exe | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unlikely | ||
level: high | ||
ruletype: Sigma |
29 changes: 29 additions & 0 deletions
29
...iltin/process_creation/proc_creation_win_remote_access_tools_screenconnect_child_proc.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: Remote Access Tool - ScreenConnect Remote Execution | ||
id: d1a401ab-8c47-4e86-a7d8-2460b6a53e4a | ||
related: | ||
- id: b1f73849-6329-4069-bc8f-78a604bb8b23 | ||
type: derived | ||
- id: 7b582f1a-b318-4c6a-bf4e-66fe49bf55a5 | ||
type: derived | ||
status: experimental | ||
description: Detects remote binary or command execution via the ScreenConnect Service. | ||
references: | ||
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708 | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/02/23 | ||
tags: | ||
- attack.execution | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
ParentProcessName|endswith: \ScreenConnect.ClientService.exe | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
31 changes: 31 additions & 0 deletions
31
sigma/builtin/process_creation/proc_creation_win_remote_access_tools_simple_help.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
title: Remote Access Tool - Simple Help Execution | ||
id: 95e60a2b-4705-444b-b7da-ba0ea81a3ee2 | ||
status: experimental | ||
description: | | ||
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. | ||
These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. | ||
Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land) | ||
references: | ||
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708 | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/02/23 | ||
tags: | ||
- attack.command_and_control | ||
- attack.t1219 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection: | ||
NewProcessName|contains: | ||
- \JWrapper-Remote Access\ | ||
- \JWrapper-Remote Support\ | ||
NewProcessName|endswith: \SimpleService.exe | ||
condition: process_creation and selection | ||
falsepositives: | ||
- Legitimate usage of the tool | ||
level: medium | ||
ruletype: Sigma |
6 changes: 4 additions & 2 deletions
6
sigma/builtin/process_creation/proc_creation_win_susp_add_user_local_admin_group.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
41 changes: 41 additions & 0 deletions
41
sigma/builtin/process_creation/proc_creation_win_susp_add_user_privileged_group.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
title: User Added To Highly Privileged Group | ||
id: 10fb649c-3600-4d37-b1e6-56ea90bb7e09 # Privileged groups | ||
related: | ||
- id: ffa28e60-bdb1-46e0-9f82-05f7a61cc06e # Remote Desktop groups | ||
type: similar | ||
- id: ad720b90-25ad-43ff-9b5e-5c841facc8e5 # Admin groups | ||
type: similar | ||
status: test | ||
description: Detects addition of users to highly privileged groups via "Net" or "Add-LocalGroupMember". | ||
references: | ||
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708 | ||
author: Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/02/23 | ||
tags: | ||
- attack.persistence | ||
- attack.t1098 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_main: | ||
- CommandLine|contains|all: | ||
# net.exe | ||
- 'localgroup ' | ||
- ' /add' | ||
- CommandLine|contains|all: | ||
# powershell.exe | ||
- 'Add-LocalGroupMember ' | ||
- ' -Group ' | ||
selection_group: | ||
CommandLine|contains: | ||
- Group Policy Creator Owners | ||
- Schema Admins | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Administrative activity that must be investigated | ||
level: high | ||
ruletype: Sigma |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.