- SigmaHQ/sigma/rules">SigmaHQ/sigma/rules
- application">application
- antivirus">antivirus
- django">django
- edr/windows">edr/windows
- python">python
- rpc_firewall">rpc_firewall
- Remote Schedule Task Lateral Movement via ATSvc
- Remote Schedule Task Recon via AtScv
- Possible DCSync Attack
- Remote Encrypting File System Abuse
- Remote Event Log Recon
- Remote Schedule Task Lateral Movement via ITaskSchedulerService
- Remote Schedule Task Recon via ITaskSchedulerService
- Remote Printing Abuse for Lateral Movement
- Remote DCOM/WMI Lateral Movement
- Remote Registry Lateral Movement
- Remote Registry Recon
- Remote Server Service Abuse
- Remote Server Service Abuse for Lateral Movement
- Remote Schedule Task Lateral Movement via SASec
- Remote Schedule Task Lateral Movement via SASec
- SharpHound Recon Account Discovery
- SharpHound Recon Sessions
- ruby">ruby
- spring">spring
- sql">sql
- apt">apt
- cloud">cloud
- compliance">compliance
- generic">generic
- linux">linux
- network">network
- proxy">proxy
- web">web
- windows">windows
- builtin">builtin
- application">application
- applocker">applocker
- bits_client">bits_client
- code_integrity">code_integrity
- dns_server">dns_server
- driverframeworks">driverframeworks
- firewall_as">firewall_as
- ldap">ldap
- msexchange">msexchange
- ntlm">ntlm
- printservice">printservice
- security">security
- servicebus">servicebus
- smbclient">smbclient
- system">system
- taskscheduler">taskscheduler
- windefend">windefend
- wmi">wmi
- Mimikatz Use
- create_remote_thread">create_remote_thread
- create_stream_hash">create_stream_hash
- deprecated">deprecated
- dns_query">dns_query
- driver_load">driver_load
- etw/file_rename">etw/file_rename
- file_delete">file_delete
- file_event">file_event
- image_load">image_load
- network_connection">network_connection
- pipe_created">pipe_created
- powershell">powershell
- powershell_classic">powershell_classic
- powershell_module">powershell_module
- powershell_script">powershell_script
- PowerShell ShellCode Base64ed
- Obfuscation
- Invoke-Obfuscation CLIP+Launcher
- Invoke-Obfuscation Obfuscated IEXInvocation
- Invoke-Obfuscation STDIN+Launcher
- Invoke-Obfuscation VAR+ Launcher
- Invoke-Obfuscation COMPRESS OBFUSCATION
- Invoke-Obfuscation RUNDLL LAUNCHER
- Invoke-Obfuscation Via Stdin
- Invoke-Obfuscation Via Use Clip
- Invoke-Obfuscation Via Use MSHTA
- Invoke-Obfuscation Via Use Rundll32
- Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
- process_access">process_access
- process_creation">process_creation
- APT
- proc_creation_win_apt_actinium_persistence.yml">proc_creation_win_apt_actinium_persistence.yml
- proc_creation_win_apt_apt29_thinktanks.yml">proc_creation_win_apt_apt29_thinktanks.yml
- proc_creation_win_apt_babyshark.yml">proc_creation_win_apt_babyshark.yml
- proc_creation_win_apt_bear_activity_gtr19.yml">proc_creation_win_apt_bear_activity_gtr19.yml
- proc_creation_win_apt_bluemashroom.yml">proc_creation_win_apt_bluemashroom.yml
- proc_creation_win_apt_chafer_mar18.yml">proc_creation_win_apt_chafer_mar18.yml
- proc_creation_win_apt_cloudhopper.yml">proc_creation_win_apt_cloudhopper.yml
- proc_creation_win_apt_dragonfly.yml">proc_creation_win_apt_dragonfly.yml
- proc_creation_win_apt_elise.yml">proc_creation_win_apt_elise.yml
- proc_creation_win_apt_emissarypanda_sep19.yml">proc_creation_win_apt_emissarypanda_sep19.yml
- proc_creation_win_apt_empiremonkey.yml">proc_creation_win_apt_empiremonkey.yml
- proc_creation_win_apt_equtiongroup_dll_u_load.yml">proc_creation_win_apt_equtiongroup_dll_u_load.yml
- proc_creation_win_apt_evilnum_jul20.yml">proc_creation_win_apt_evilnum_jul20.yml
- proc_creation_win_apt_gallium.yml">proc_creation_win_apt_gallium.yml
- proc_creation_win_apt_gallium_sha1.yml">proc_creation_win_apt_gallium_sha1.yml
- proc_creation_win_apt_greenbug_may20.yml">proc_creation_win_apt_greenbug_may20.yml
- proc_creation_win_apt_hafnium.yml">proc_creation_win_apt_hafnium.yml
- proc_creation_win_apt_hurricane_panda.yml">proc_creation_win_apt_hurricane_panda.yml
- proc_creation_win_apt_judgement_panda_gtr19.yml">proc_creation_win_apt_judgement_panda_gtr19.yml
- proc_creation_win_apt_ke3chang_regadd.yml">proc_creation_win_apt_ke3chang_regadd.yml
- proc_creation_wi_apt_lazarus_activity_apr21.yml">proc_creation_wi_apt_lazarus_activity_apr21.yml
- proc_creation_win_apt_lazarus_activity_dec20.yml">proc_creation_win_apt_lazarus_activity_dec20.yml
- proc_creation_win_apt_lazarus_loader.yml">proc_creation_win_apt_lazarus_loader.yml
- proc_creation_win_apt_lazarus_session_highjack.yml">proc_creation_win_apt_lazarus_session_highjack.yml
- proc_creation_win_apt_muddywater_dnstunnel.yml">proc_creation_win_apt_muddywater_dnstunnel.yml
- proc_creation_win_apt_mustangpanda.yml">proc_creation_win_apt_mustangpanda.yml
- proc_creation_win_apt_pandemic.yml">proc_creation_win_apt_pandemic.yml
- proc_creation_win_apt_revil_kaseya.yml">proc_creation_win_apt_revil_kaseya.yml
- proc_creation_win_apt_slingshot.yml">proc_creation_win_apt_slingshot.yml
- proc_creation_win_apt_sofacy.yml">proc_creation_win_apt_sofacy.yml
- proc_creation_win_apt_sourgrum.yml">proc_creation_win_apt_sourgrum.yml
- proc_creation_win_apt_ta17_293a_ps.yml">proc_creation_win_apt_ta17_293a_ps.yml
- proc_creation_win_apt_ta505_dropper.yml">proc_creation_win_apt_ta505_dropper.yml
- proc_creation_win_apt_taidoor.yml">proc_creation_win_apt_taidoor.yml
- proc_creation_win_apt_tropictrooper.yml">proc_creation_win_apt_tropictrooper.yml
- proc_creation_win_apt_turla_commands_critical.yml">proc_creation_win_apt_turla_commands_critical.yml
- proc_creation_win_apt_turla_commands_medium.yml">proc_creation_win_apt_turla_commands_medium.yml
- proc_creation_win_apt_turla_comrat_may20.yml">proc_creation_win_apt_turla_comrat_may20.yml
- proc_creation_win_apt_unc2452_cmds.yml">proc_creation_win_apt_unc2452_cmds.yml
- proc_creation_wi_apt_unc2452_ps.yml">proc_creation_wi_apt_unc2452_ps.yml
- proc_creation_win_apt_unidentified_nov_18.yml">proc_creation_win_apt_unidentified_nov_18.yml
- proc_creation_win_apt_winnti_mal_hk_jan20.yml">proc_creation_win_apt_winnti_mal_hk_jan20.yml
- proc_creation_win_apt_winnti_pipemon.yml">proc_creation_win_apt_winnti_pipemon.yml
- proc_creation_win_apt_wocao.yml">proc_creation_win_apt_wocao.yml
- proc_creation_win_apt_zxshell.yml">proc_creation_win_apt_zxshell.yml
- APT
- raw_access_thread">raw_access_thread
- registry_event">registry_event
- sysmon">sysmon
- wmi_event">wmi_event
- builtin">builtin
- application">application
SigmaHQ/sigma/rules
application
antivirus
Antivirus Exploitation Framework Detection
title: Antivirus Exploitation Framework Detection
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
status: test
description: Detects a highly relevant Antivirus alert that reports an exploitation framework
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
date: 2018/09/09
modified: 2021/11/27
logsource:
product: antivirus
detection:
selection:
Signature|contains:
- 'MeteTool'
- 'MPreter'
- 'Meterpreter'
- 'Metasploit'
- 'PowerSploit'
- 'CobaltStrike'
- 'Swrort'
- 'Rozena'
- 'Backdoor.Cobalt'
- 'CobaltStr'
- 'COBEACON'
- 'Cometer'
- 'Razy'
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical
tags:
- attack.execution
- attack.t1203
- attack.command_and_control
- attack.t1219
Antivirus Hacktool Detection
title: Antivirus Hacktool Detection
id: fa0c05b6-8ad3-468d-8231-c1cbccb64fba
description: Detects a highly relevant Antivirus alert that reports a hack tool or other attack tool
status: experimental
date: 2021/08/16
author: Florian Roth
references:
- https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/
logsource:
product: antivirus
detection:
selection:
- Signature|startswith:
- 'HTOOL'
- 'HKTL'
- 'SecurityTool'
- 'ATK/' # Sophos
- Signature|contains:
- 'Hacktool'
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: high
tags:
- attack.execution
- attack.t1204
Antivirus Password Dumper Detection
title: Antivirus Password Dumper Detection
id: 78cc2dd2-7d20-4d32-93ff-057084c38b93
status: test
description: Detects a highly relevant Antivirus alert that reports a password dumper
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
- https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619/detection
date: 2018/09/09
modified: 2021/11/27
logsource:
product: antivirus
detection:
selection:
Signature|contains:
- 'DumpCreds'
- 'Mimikatz'
- 'PWCrack'
- 'HTool/WCE'
- 'PSWtool'
- 'PWDump'
- 'SecurityTool'
- 'PShlSpy'
- 'Rubeus'
- 'Kekeo'
- 'LsassDump'
- 'Outflank'
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical
tags:
- attack.credential_access
- attack.t1003
- attack.t1558
- attack.t1003.001
- attack.t1003.002
Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
title: Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
id: 6fe1719e-ecdf-4caf-bffe-4f501cb0a561
status: stable
description: Detects the suspicious file that is created from PoC code against Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34527 (PrinterNightmare), CVE-2021-1675 .
references:
- https://twitter.com/mvelazco/status/1410291741241102338
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
author: Sittikorn S, Nuttakorn T
date: 2021/07/01
modified: 2021/11/23
tags:
- attack.privilege_escalation
- attack.t1055
logsource:
product: antivirus
detection:
selection:
Filename|contains: 'C:\Windows\System32\spool\drivers\x64\'
condition: selection
fields:
- Signature
- Filename
- ComputerName
falsepositives:
- Unlikely
level: critical
Antivirus Relevant File Paths Alerts
title: Antivirus Relevant File Paths Alerts
id: c9a88268-0047-4824-ba6e-4d81ce0b907c
description: Detects an Antivirus alert in a highly relevant file path or with a relevant file name
status: experimental
date: 2018/09/09
modified: 2021/11/23
author: Florian Roth, Arnim Rupp
references:
- https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
logsource:
product: antivirus
detection:
selection:
- Filename|startswith:
- 'C:\Windows\'
- 'C:\Temp\'
- 'C:\PerfLogs\'
- 'C:\Users\Public\'
- 'C:\Users\Default\'
- Filename|contains:
- '\Client\'
- '\tsclient\'
- '\inetpub\'
- '/www/'
- 'apache'
- 'tomcat'
- 'nginx'
- 'weblogic'
selection2:
Filename|endswith:
- '.ps1'
- '.psm1'
- '.vbs'
- '.bat'
- '.cmd'
- '.sh'
- '.chm'
- '.xml'
- '.txt'
- '.jsp'
- '.jspx'
- '.asp'
- '.aspx'
- '.ashx'
- '.asax'
- '.asmx'
- '.php'
- '.cfm'
- '.py'
- '.pyc'
- '.pl'
- '.rb'
- '.cgi'
- '.war'
- '.ear'
- '.hta'
- '.lnk'
- '.scf'
- '.sct'
- '.vbe'
- '.wsf'
- '.wsh'
- '.gif'
- '.png'
- '.jpg'
- '.jpeg'
- '.svg'
- '.dat'
condition: selection or selection2
fields:
- Signature
- User
falsepositives:
- Unlikely
level: high
tags:
- attack.resource_development
- attack.t1588
Antivirus Web Shell Detection
title: Antivirus Web Shell Detection
id: fdf135a2-9241-4f96-a114-bb404948f736
description: Detects a highly relevant Antivirus alert that reports a web shell. It's highly recommended to tune this rule to the specific strings used by your anti virus solution by downloading a big webshell repo from e.g. github and checking the matches.
status: experimental
date: 2018/09/09
modified: 2021/05/08
author: Florian Roth, Arnim Rupp
references:
- https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
- https://github.com/tennc/webshell
- https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection
- https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection
- https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection
- https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection
- https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection
- https://www.virustotal.com/gui/file/b219f7d3c26f8bad7e175934cd5eda4ddb5e3983503e94ff07d39c0666821b7e/detection
- https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection
tags:
- attack.persistence
- attack.t1505.003
logsource:
product: antivirus
detection:
selection:
- Signature|startswith:
- 'PHP/'
- 'JSP/'
- 'ASP/'
- 'Perl/'
- 'PHP.'
- 'JSP.'
- 'ASP.'
- 'Perl.'
- 'VBS/Uxor' # looking for 'VBS/' would also find downloaders and droppers meant for desktops
- 'IIS/BackDoor'
- 'JAVA/Backdoor'
- 'Troj/ASP'
- 'Troj/PHP'
- 'Troj/JSP'
- Signature|contains:
- 'Webshell'
- 'Chopper'
- 'SinoChoper'
- 'ASPXSpy'
- 'Aspdoor'
- 'filebrowser'
- 'PHP_'
- 'JSP_'
- 'ASP_' # looking for 'VBS_' would also find downloaders and droppers meant for desktops
- 'PHP:'
- 'JSP:'
- 'ASP:'
- 'Perl:'
- 'PHPShell'
- 'Trojan.PHP'
- 'Trojan.ASP'
- 'Trojan.JSP'
- 'Trojan.VBS'
- 'PHP?Agent'
- 'ASP?Agent'
- 'JSP?Agent'
- 'VBS?Agent'
- 'Backdoor?PHP'
- 'Backdoor?JSP'
- 'Backdoor?ASP'
- 'Backdoor?VBS'
- 'Backdoor?Java'
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical
django
Django Framework Exceptions
title: Django Framework Exceptions
id: fd435618-981e-4a7c-81f8-f78ce480d616
status: stable
description: Detects suspicious Django web application framework exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/05
modified: 2020/09/01
references:
- https://docs.djangoproject.com/en/1.11/ref/exceptions/
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
logsource:
category: application
product: django
detection:
keywords:
- SuspiciousOperation
# Subclasses of SuspiciousOperation
- DisallowedHost
- DisallowedModelAdminLookup
- DisallowedModelAdminToField
- DisallowedRedirect
- InvalidSessionKey
- RequestDataTooBig
- SuspiciousFileOperation
- SuspiciousMultipartForm
- SuspiciousSession
- TooManyFieldsSent
# Further security-related exceptions
- PermissionDenied
condition: keywords
falsepositives:
- Application bugs
- Penetration testing
level: medium
tags:
- attack.initial_access
- attack.t1190
edr/windows
EDR WMI Command Execution by Office Applications
title: EDR WMI Command Execution by Office Applications
id: 3ee1bba8-b9e2-4e35-bec5-7fb66b6b3815
description: Initial execution of malicious document calls wmic Win32_Process::Create to execute the file with regsvr32
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/main/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: 'Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)'
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
status: experimental
date: 2021/08/23
modified: 2021/11/09
logsource:
product: windows
category: edr
detection:
#useful_information: Add more office applications to the rule logic of choice
selection1:
EventLog: EDR
EventType: WMIExecution
WMIcommand|contains: 'Win32_Process\:\:Create'
selection2:
Image|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
condition: selection1 and selection2
falsepositives:
- Unknown
level: high
python
Python SQL Exceptions
title: Python SQL Exceptions
id: 19aefed0-ffd4-47dc-a7fc-f8b1425e84f9
status: stable
description: Generic rule for SQL exceptions in Python according to PEP 249
author: Thomas Patzke
date: 2017/08/12
modified: 2020/09/01
references:
- https://www.python.org/dev/peps/pep-0249/#exceptions
logsource:
category: application
product: python
detection:
exceptions:
- DataError
- IntegrityError
- ProgrammingError
- OperationalError
condition: exceptions
falsepositives:
- Application bugs
- Penetration testing
level: medium
tags:
- attack.initial_access
- attack.t1190
rpc_firewall
Remote Schedule Task Lateral Movement via ATSvc
title: Remote Schedule Task Lateral Movement via ATSvc
id: 0fcd1c79-4eeb-4746-aba9-1b458f7a79cb
description: Detects remote RPC calls to create or execute a scheduled task via ATSvc
references:
- https://attack.mitre.org/techniques/T1053/
- https://attack.mitre.org/tactics/TA0008/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
- attack.t1053
- attack.t1053.002
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:1ff70682-0a51-30e8-076d-740be8cee98b"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 1ff70682-0a51-30e8-076d-740be8cee98b
OpNum:
- 0
- 1
condition: selection
falsepositives:
- unknown
level: high
Remote Schedule Task Recon via AtScv
title: Remote Schedule Task Recon via AtScv
id: f177f2bc-5f3e-4453-b599-57eefce9a59c
description: Detects remote RPC calls to read information about scheduled tasks via AtScv
references:
- https://attack.mitre.org/tactics/TA0007/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/zeronetworks/rpcfirewall
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:1ff70682-0a51-30e8-076d-740be8cee98b"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 1ff70682-0a51-30e8-076d-740be8cee98b
filter:
OpNum:
- 0
- 1
condition: selection and not filter
falsepositives:
- unknown
level: high
Possible DCSync Attack
title: Possible DCSync Attack
id: 56fda488-113e-4ce9-8076-afc2457922c3
description: Detects remote RPC calls to MS-DRSR from non DC hosts, which could indicate DCSync / DCShadow attacks.
references:
- https://attack.mitre.org/techniques/T1033/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DRSR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.t1033
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes, enable DRSR UUID (e3514235-4b06-11d1-ab04-00c04fc2dcd2) for "dangerous" opcodes (not 0,1 or 12) only from trusted IPs (DCs)'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: e3514235-4b06-11d1-ab04-00c04fc2dcd2
filter:
OpNum:
- 0
- 1
- 12
condition: selection and not filter
falsepositives:
- Unknown
level: high
Remote Encrypting File System Abuse
title: Remote Encrypting File System Abuse
id: 5f92fff9-82e2-48eb-8fc1-8b133556a551
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-EFSR
references:
- https://attack.mitre.org/tactics/TA0008/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-EFSR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:df1941c5-fe89-4e79-bf10-463657acf44d or c681d488-d850-11d0-8c52-00c04fd90f7e'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- df1941c5-fe89-4e79-bf10-463657acf44d
- c681d488-d850-11d0-8c52-00c04fd90f7e
condition: selection
falsepositives:
- Legitimate usage of remote file encryption
level: high
Remote Event Log Recon
title: Remote Event Log Recon
id: 2053961f-44c7-4a64-b62d-f6e72800af0d
description: Detects remote RPC calls to get event log information via EVEN or EVEN6
references:
- https://attack.mitre.org/tactics/TA0007/
- https://github.com/zeronetworks/rpcfirewall
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:82273fdc-e32a-18c3-3f78-827929dc23ea and uuid:f6beaff7-1e19-4fbb-9f8f-b89e2018337c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 82273fdc-e32a-18c3-3f78-827929dc23ea
- f6beaff7-1e19-4fbb-9f8f-b89e2018337c
condition: selection
falsepositives:
- remote administrative tasks on Windows Events
level: high
Remote Schedule Task Lateral Movement via ITaskSchedulerService
title: Remote Schedule Task Lateral Movement via ITaskSchedulerService
id: ace3ff54-e7fd-46bd-8ea0-74b49a0aca1d
description: Detects remote RPC calls to create or execute a scheduled task
references:
- https://attack.mitre.org/techniques/T1053/
- https://attack.mitre.org/tactics/TA0008/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
- attack.t1053
- attack.t1053.002
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:86d35949-83c9-4044-b424-db363231fd0c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 86d35949-83c9-4044-b424-db363231fd0c
OpNum:
- 1
- 3
- 4
- 10
- 11
- 12
- 13
- 14
- 15
condition: selection
falsepositives:
- unknown
level: high
Remote Schedule Task Recon via ITaskSchedulerService
title: Remote Schedule Task Recon via ITaskSchedulerService
id: 7f7c49eb-2977-4ac8-8ab0-ab1bae14730e
description: Detects remote RPC calls to read information about scheduled tasks
references:
- https://attack.mitre.org/tactics/TA0007/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:86d35949-83c9-4044-b424-db363231fd0c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 86d35949-83c9-4044-b424-db363231fd0c
filter:
OpNum:
- 1
- 3
- 4
- 10
- 11
- 12
- 13
- 14
- 15
condition: selection and not filter
falsepositives:
- unknown
level: high
Remote Printing Abuse for Lateral Movement
title: Remote Printing Abuse for Lateral Movement
id: bc3a4b0c-e167-48e1-aa88-b3020950e560
description: Detects remote RPC calls to possibly abuse remote printing service via MS-RPRN / MS-PAR
references:
- https://attack.mitre.org/tactics/TA0008/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-pan/e44d984c-07d3-414c-8ffc-f8c8ad8512a8
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-RPRN-PAR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:12345678-1234-abcd-ef00-0123456789ab or 76f03f96-cdfd-44fc-a22c-64950a001209 or ae33069b-a2a8-46ee-a235-ddfd339be281 or 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 12345678-1234-abcd-ef00-0123456789ab
- 76f03f96-cdfd-44fc-a22c-64950a001209
- 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1
- ae33069b-a2a8-46ee-a235-ddfd339be281
condition: selection
falsepositives:
- actual printing
level: high
Remote DCOM/WMI Lateral Movement
title: Remote DCOM/WMI Lateral Movement
id: 68050b10-e477-4377-a99b-3721b422d6ef
description: Detects remote RPC calls that performs remote DCOM operations. These could be abused for lateral movement via DCOM or WMI.
references:
- https://attack.mitre.org/tactics/TA0008/
- https://attack.mitre.org/techniques/T1021/003/
- https://attack.mitre.org/techniques/T1047/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
- attack.t1021.003
- attack.t1047
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:367abb81-9844-35f1-ad32-98f038001003'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57
- 99fcfec4-5260-101b-bbcb-00aa0021347a
- 000001a0-0000-0000-c000-000000000046
- 00000131-0000-0000-c000-000000000046
- 00000143-0000-0000-c000-000000000046
- 00000000-0000-0000-c000-000000000046
condition: selection
falsepositives:
- Some administrative tasks on remote host
level: high
Remote Registry Lateral Movement
title: Remote Registry Lateral Movement
id: 35c55673-84ca-4e99-8d09-e334f3c29539
description: Detects remote RPC calls to modify the registry and possible execute code
references:
- https://attack.mitre.org/techniques/T1112/
- https://attack.mitre.org/tactics/TA0008/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-RRP.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:338cd001-2244-31f1-aaaa-900038001003"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 338cd001-2244-31f1-aaaa-900038001003
OpNum:
- 6
- 7
- 8
- 13
- 18
- 19
- 21
- 22
- 23
- 35
condition: selection
falsepositives:
- Remote administration of registry values
level: high
Remote Registry Recon
title: Remote Registry Recon
id: d8ffe17e-04be-4886-beb9-c1dd1944b9a8
description: Detects remote RPC calls to collect information
references:
- https://attack.mitre.org/tactics/TA0007/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-RRP.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:338cd001-2244-31f1-aaaa-900038001003"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 338cd001-2244-31f1-aaaa-900038001003
filter:
OpNum:
- 6
- 7
- 8
- 13
- 18
- 19
- 21
- 22
- 23
- 35
condition: selection and not filter
falsepositives:
- Remote administration of registry values
level: high
Remote Server Service Abuse
title: Remote Server Service Abuse
id: b6ea3cc7-542f-43ef-bbe4-980fbed444c7
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-SRVS
references:
- https://attack.mitre.org/tactics/TA0008/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-SRVS.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:4b324fc8-1670-01d3-1278-5a47bf6ee188'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 4b324fc8-1670-01d3-1278-5a47bf6ee188
condition: selection
falsepositives:
- Legitimate remote share creation
level: high
Remote Server Service Abuse for Lateral Movement
title: Remote Server Service Abuse for Lateral Movement
id: 10018e73-06ec-46ec-8107-9172f1e04ff2
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-EFSR
references:
- https://attack.mitre.org/tactics/TA0008/
- https://attack.mitre.org/techniques/T1569/002/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-SCMR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
- attack.t1569.002
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:367abb81-9844-35f1-ad32-98f038001003'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 367abb81-9844-35f1-ad32-98f038001003
condition: selection
falsepositives:
- Administrative tasks on remote services
level: high
Remote Schedule Task Lateral Movement via SASec
title: Remote Schedule Task Lateral Movement via SASec
id: aff229ab-f8cd-447b-b215-084d11e79eb0
description: Detects remote RPC calls to create or execute a scheduled task via SASec
references:
- https://attack.mitre.org/techniques/T1053/
- https://attack.mitre.org/tactics/TA0008/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.lateral_movement
- attack.t1053
- attack.t1053.002
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:378e52b0-c0a9-11cf-822d-00aa0051e40f"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 378e52b0-c0a9-11cf-822d-00aa0051e40f
OpNum:
- 0
- 1
condition: selection
falsepositives:
- unknown
level: high
Remote Schedule Task Lateral Movement via SASec
title: Remote Schedule Task Lateral Movement via SASec
id: 0a3ff354-93fc-4273-8a03-1078782de5b7
description: Detects remote RPC calls to read information about scheduled tasks via SASec
references:
- https://attack.mitre.org/tactics/TA0007/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:378e52b0-c0a9-11cf-822d-00aa0051e40f"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 378e52b0-c0a9-11cf-822d-00aa0051e40f
filter:
OpNum:
- 0
- 1
condition: selection and not filter
falsepositives:
- unknown
level: high
SharpHound Recon Account Discovery
title: SharpHound Recon Account Discovery
id: 65f77b1e-8e79-45bf-bb67-5988a8ce45a5
description: Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.
references:
- https://attack.mitre.org/techniques/T1087/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-WKST.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.t1087
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:6bffd098-a112-3610-9833-46c3f87e345a opnum:2'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 6bffd098-a112-3610-9833-46c3f87e345a
OpNum: 2
condition: selection
falsepositives:
- Unknown
level: high
SharpHound Recon Sessions
title: SharpHound Recon Sessions
id: 6d580420-ff3f-4e0e-b6b0-41b90c787e28
description: Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.
references:
- https://attack.mitre.org/techniques/T1033/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/02b1f559-fda2-4ba3-94c2-806eb2777183
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-SRVS.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
tags:
- attack.t1033
status: experimental
author: Sagie Dulce, Dekel Paz
date: 2022/01/01
modified: 2022/01/01
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:4b324fc8-1670-01d3-1278-5a47bf6ee188 opnum:12'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 4b324fc8-1670-01d3-1278-5a47bf6ee188
OpNum: 12
condition: selection
falsepositives:
- Unknown
level: high
ruby
Ruby on Rails Framework Exceptions
title: Ruby on Rails Framework Exceptions
id: 0d2c3d4c-4b48-4ac3-8f23-ea845746bb1a
status: stable
description: Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/06
modified: 2020/09/01
references:
- http://edgeguides.rubyonrails.org/security.html
- http://guides.rubyonrails.org/action_controller_overview.html
- https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception
- https://github.com/rails/rails/blob/master/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb
logsource:
category: application
product: ruby_on_rails
detection:
keywords:
- ActionController::InvalidAuthenticityToken
- ActionController::InvalidCrossOriginRequest
- ActionController::MethodNotAllowed
- ActionController::BadRequest
- ActionController::ParameterMissing
condition: keywords
falsepositives:
- Application bugs
- Penetration testing
level: medium
tags:
- attack.initial_access
- attack.t1190
spring
Spring Framework Exceptions
title: Spring Framework Exceptions
id: ae48ab93-45f7-4051-9dfe-5d30a3f78e33
status: stable
description: Detects suspicious Spring framework exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/06
modified: 2020/09/01
references:
- https://docs.spring.io/spring-security/site/docs/current/apidocs/overview-tree.html
logsource:
category: application
product: spring
detection:
keywords:
- AccessDeniedException
- CsrfException
- InvalidCsrfTokenException
- MissingCsrfTokenException
- CookieTheftException
- InvalidCookieException
- RequestRejectedException
condition: keywords
falsepositives:
- Application bugs
- Penetration testing
level: medium
tags:
- attack.initial_access
- attack.t1190
sql
Suspicious SQL Error Messages
title: Suspicious SQL Error Messages
id: 8a670c6d-7189-4b1c-8017-a417ca84a086
status: test
description: Detects SQL error messages that indicate probing for an injection attack
author: Bjoern Kimminich
references:
- http://www.sqlinjection.net/errors
date: 2017/11/27
modified: 2021/11/27
logsource:
category: application
product: sql
detection:
keywords:
# Oracle
- quoted string not properly terminated
# MySQL
- You have an error in your SQL syntax
# SQL Server
- Unclosed quotation mark
# SQLite
- 'near "*": syntax error'
- SELECTs to the left and right of UNION do not have the same number of result columns
condition: keywords
falsepositives:
- Application bugs
level: high
tags:
- attack.initial_access
- attack.t1190
apt
Silence.Downloader V3
title: Silence.Downloader V3
id: 170901d1-de11-4de7-bccb-8fa13678d857
status: test
description: Detects Silence downloader. These commands are hardcoded into the binary.
author: Alina Stepchenkova, Roman Rezvukhin, Group-IB, oscd.community
date: 2019/11/01
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection_recon:
Image|endswith:
- '\tasklist.exe'
- '\qwinsta.exe'
- '\ipconfig.exe'
- '\hostname.exe'
CommandLine|contains: '>>'
CommandLine|endswith: 'temps.dat'
selection_persistence:
CommandLine|contains: '/C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinNetworkSecurity" /t REG_SZ /d'
condition: selection_recon | near selection_persistence # requires both
fields:
- ComputerName
- User
- Image
- CommandLine
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.t1547.001
- attack.discovery
- attack.t1057
- attack.t1082
- attack.t1016
- attack.t1033
- attack.g0091
Silence EDA Detection
title: Silence EDA Detection
id: 3ceb2083-a27f-449a-be33-14ec1b7cc973
status: test
description: Detects Silence empireDNSagent
author: Alina Stepchenkova, Group-IB, oscd.community
date: 2019/11/01
modified: 2021/11/27
logsource:
product: windows
service: powershell
detection:
empire:
ScriptBlockText|contains|all: # better to randomise the order
- 'System.Diagnostics.Process'
- 'Stop-Computer'
- 'Restart-Computer'
- 'Exception in execution'
- '$cmdargs'
- 'Close-Dnscat2Tunnel'
dnscat:
ScriptBlockText|contains|all: # better to randomise the order
- 'set type=$LookupType`nserver'
- '$Command | nslookup 2>&1 | Out-String'
- 'New-RandomDNSField'
- '[Convert]::ToString($SYNOptions, 16)'
- '$Session.Dead = $True'
- '$Session["Driver"] -eq'
condition: empire and dnscat
falsepositives:
- Unknown
level: critical
tags:
- attack.execution
- attack.t1059.001
- attack.command_and_control
- attack.t1071.004
- attack.t1572
- attack.impact
- attack.t1529
- attack.g0091
- attack.s0363
cloud
aws
azure
gcp
gworkspace
m365
okta
onelogin
compliance
default_credentials_usage.yml
firewall_cleartext_protocols.yml
group_modification_logging.yml
Changedoublequotetoquote
host_without_firewall.yml
netflow_cleartext_protocols.yml
splitglobalcleartext_protocols.yml
workstation_was_locked.yml
generic
Brute Force
title: Brute Force
id: 53c7cca0-2901-493a-95db-d00d6fcf0a37
status: test
description: Detects many authentication failures from one source to one destination which is may indicate Brute Force activity
author: Aleksandr Akhremchik, oscd.community
date: 2019/10/25
modified: 2021/11/27
logsource:
category: authentication
detection:
selection:
action: failure
timeframe: 600s
condition: selection | count(category) by dst_ip > 30
fields:
- src_ip
- dst_ip
- user
falsepositives:
- Inventarization
- Penetration testing
- Vulnerability scanner
- Legitimate application
level: medium
tags:
- attack.credential_access
- attack.t1110
linux
auditd
builtin
file_create
macos
modsecurity
network_connection
other
process_creation
network
net_apt_equationgroup_c2.yml
net_dns_c2_detection.yml
net_firewall_high_dns_bytes_out.yml
net_firewall_high_dns_requests_rate.yml
net_high_dns_bytes_out.yml
net_high_dns_requests_rate.yml
net_high_null_records_requests_rate.yml
net_high_txt_records_requests_rate.yml
net_mal_dns_cobaltstrike.yml
net_pua_cryptocoin_mining_xmr.yml
Updatenet_pua_cryptocoin_mining_xmr.yml
net_susp_dns_b64_queries.yml
net_susp_dns_txt_exec_strings.yml
net_susp_network_scan_by_ip.yml
net_susp_network_scan_by_port.yml
splitglobalnet_susp_network_scan.yml
net_susp_telegram_api.yml
net_wannacry_killswitch_domain.yml
cisco/aaa
cisco_cli_clear_logs.yml
cisco_cli_collect_data.yml
cisco_cli_crypto_actions.yml
cisco_cli_disable_logging.yml
cisco_cli_discovery.yml
cisco_cli_dos.yml
cisco_cli_file_deletion.yml
cisco_cli_input_capture.yml
cisco_cli_local_accounts.yml
cisco_cli_modify_config.yml
cisco_cli_moving_data.yml
cisco_cli_net_sniff.yml
zeek
zeek_dce_rpc_domain_user_enumeration.yml
zeek_dce_rpc_mitre_bzar_execution.yml
zeek_dce_rpc_mitre_bzar_persistence.yml
zeek_dce_rpc_potential_petit_potam_efs_rpc_call.yml
zeek_dce_rpc_printnightmare_print_driver_install.yml
zeek_dce_rpc_smb_spoolss_named_pipe.yml
zeek_default_cobalt_strike_certificate.yml
zeek_dns_mining_pools.yml
zeek_dns_suspicious_zbit_flag.yml
zeek_dns_torproxy.yml
zeek_http_executable_download_from_webdav.yml
zeek_http_omigod_no_auth_rce.yml
zeek_http_webdav_put_request.yml
zeek_rdp_public_listener.yml
zeek_smb_converted_win_atsvc_task.yml
zeek_smb_converted_win_impacket_secretdump.yml
zeek_smb_converted_win_lm_namedpipe.yml
zeek_smb_converted_win_susp_psexec.yml
zeek_smb_converted_win_susp_raccess_sensitive_fext.yml
zeek_smb_converted_win_transferring_files_with_credential_data.yml
zeek_susp_kerberos_rc4.yml
proxy
proxy_download_susp_dyndns.yml
proxy_download_susp_tlds_blacklist.yml
proxy_download_susp_tlds_whitelist.yml
proxy_downloadcradle_webdav.yml
proxy_empire_ua_uri_combos.yml
proxy_empty_ua.yml
proxy_ios_implant.yml
proxy_java_class_download.yml
proxy_pwndrop.yml
proxy_raw_paste_service_access.yml
proxy_susp_flash_download_loc.yml
proxy_telegram_api.yml
proxy_ua_bitsadmin_susp_tld.yml
proxy_ua_cryptominer.yml
proxy_ua_frameworks.yml
proxy_ua_hacktool.yml
proxy_ua_malware.yml
proxy_ua_suspicious.yml
proxy_ursnif_malware_c2_url.yml
proxy_ursnif_malware_download_url.yml
APT
APT40 Dropbox Tool User Agent
title: APT40 Dropbox Tool User Agent
id: 5ba715b6-71b7-44fd-8245-f66893e81b3d
status: test
description: Detects suspicious user agent string of APT40 Dropbox tool
author: Thomas Patzke
references:
- Internal research from Florian Roth
date: 2019/11/12
modified: 2021/11/27
logsource:
category: proxy
detection:
selection:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36'
r-dns: 'api.dropbox.com'
condition: selection
fields:
- c-ip
- c-uri
falsepositives:
- Old browsers
level: high
tags:
- attack.command_and_control
- attack.t1071.001
- attack.exfiltration
- attack.t1567.002
Domestic Kitten FurBall Malware Pattern
title: Domestic Kitten FurBall Malware Pattern
id: 6c939dfa-c710-4e12-a4dd-47e1f10e68e1
status: experimental
description: Detects specific malware patterns used by FurBall malware linked to Iranian Domestic Kitten APT group
author: Florian Roth
references:
- https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/
date: 2021/02/08
tags:
- attack.command_and_control
logsource:
category: proxy
detection:
selection:
c-uri|contains:
- 'Get~~~AllBrowser'
- 'Get~~~HardwareInfo'
- 'Take~~RecordCall'
- 'Reset~~~AllCommand'
condition: selection
fields:
- c-ip
- c-uri
falsepositives:
- Unlikely
level: high
BabyShark Agent Pattern
title: BabyShark Agent Pattern
id: 304810ed-8853-437f-9e36-c4975c3dfd7e
status: experimental
description: Detects Baby Shark C2 Framework communication patterns
author: Florian Roth
date: 2021/06/09
references:
- https://nasbench.medium.com/understanding-detecting-c2-frameworks-babyshark-641be4595845
logsource:
category: proxy
detection:
selection:
c-uri|contains: 'momyshark?key='
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.command_and_control
- attack.t1071.001
Chafer Malware URL Pattern
title: Chafer Malware URL Pattern
id: fb502828-2db0-438e-93e6-801c7548686d
status: test
description: Detects HTTP requests used by Chafer malware
author: Florian Roth
references:
- https://securelist.com/chafer-used-remexi-malware/89538/
date: 2019/01/31
modified: 2021/11/27
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/asp.asp?ui='
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Unknown
level: critical
tags:
- attack.command_and_control
- attack.t1071.001
Turla ComRAT
title: Turla ComRAT
id: 7857f021-007f-4928-8b2c-7aedbe64bb82
status: test
description: Detects Turla ComRAT patterns
author: Florian Roth
references:
- https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf
date: 2020/05/26
modified: 2021/11/27
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/index/index.php?h='
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
- attack.g0010
APT UserAgent
title: APT UserAgent
id: 6ec820f2-e963-4801-9127-d8b2dce4d31b
status: test
description: Detects suspicious user agent strings used in APT malware in proxy logs
author: Florian Roth, Markus Neis
references:
- Internal Research
date: 2019/11/12
modified: 2021/11/30
logsource:
category: proxy
detection:
selection:
c-useragent:
# APT Related
- 'SJZJ (compatible; MSIE 6.0; Win32)' # APT Backspace
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0' # APT GrizzlySteppe - ChopStick - US CERT https://goo.gl/1DTHwi
- 'User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC' # Comment Crew Miniasp
- 'Mozilla/4.0 (compatible; MSIE 7.4; Win32;32-bit)' # Comment Crew Miniasp
- 'webclient' # Naikon APT
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/200' # Naikon APT
- 'Mozilla/4.0 (compatible; MSI 6.0;' # SnowGlobe Babar - yes, it is cut
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # Sofacy - Xtunnel
- 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:20.0) Gecko/20100101 Firefox/' # Sofacy - Xtunnel
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/2' # Sofacy - Xtunnel
- 'Mozilla/4.0' # Derusbi backdoor ELF https://github.com/fideliscyber/indicators/tree/master/FTA-1021
- 'Netscape' # Unit78020 Malware
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7' # Unit78020 Malware
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Firefox/3.6.13 GTB7.1' # Winnti related
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)' # Winnti related
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NETCLR 2.0.50727)' # APT17
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; SV1)' # Bronze Butler - Daserf
- 'Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; SV1)' # Bronze Butler - Daserf
- 'Mozilla/4.0 (compatible; MSIE 8.0; Win32)' # TSCookie https://app.any.run/tasks/0996b314-5133-491b-8d23-d431ffdec597
- 'Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1' # Delphi downloader https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/
- 'Mozilla/6.1 (compatible; MSIE 9.0; Windows NT 5.3; Trident/5.0)' # VPNFilter https://blog.talosintelligence.com/2018/05/VPNFilter.html
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.1)' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) WinHttp/1.6.3.8 (WinHTTP/5.1) like Gecko' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
- 'Mozilla v5.1 *' # Sofacy Zebrocy samples
- 'MSIE 8.0' # Sofacy Azzy Backdoor from https://www.hybrid-analysis.com/sample/a80e29c0757bee05338fd5c22a542d852ad86c477068e3eb4aacc1c3e59e2eef?environmentId=100
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)' # https://www.fireeye.com/blog/threat-research/2018/07/microsoft-office-vulnerabilities-used-to-distribute-felixroot-backdoor.html
- 'Mozilla/4.0 (compatible; RMS)' # Attacks on industrial enterprises using RMS and TeamViewer https://goo.gl/GthvTw
- 'Mozilla/4.0 (compatible; MSIE 6.0; DynGate)' # Attacks on industrial enterprises using RMS and TeamViewer https://goo.gl/GthvTw
- 'O/9.27 (W; U; Z)' # Cmstar https://www.virustotal.com/#/file/e4328011bb2b04abc856ccd04404c9f95d67167f6c291d343e8ffa8aa2aa2099/details
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; Trident/5.0*' # KerrDown UA https://goo.gl/s2WU6o
- 'Mozilla/5.0 (Windows NT 9; *' # Suspicious 'Windows NT 9' user agent - used by APT33 malware in 2018
- 'hots scot' # Unknown iOS zero-day implant https://twitter.com/craiu/status/1176437994288484352?s=20
- 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT)' # https://blog.telsy.com/meeting-powerband-the-apt33-net-powerton-variant/
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) Chrome/28.0.1500.95 Safari/537.36' # Hidden Cobra malware
- 'Mozilla/5.0 (Windows NT 6.2; Win32; rv:47.0)' # Strong Pity loader https://twitter.com/VK_Intel/status/1264185981118406657
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;' # Mustang Panda https://insights.oem.avira.com/new-wave-of-plugx-targets-hong-kong/
- 'Mozilla/5.0 (X11; Linux i686; rv:22.0) Firefox/22.0' # BackdoorDiplomacy https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/
- 'Mozilla/5.0 Chrome/72.0.3626.109 Safari/537.36' # SideWalk malware used by Sparkling Goblin
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:FTS_06) Gecko/22.36.35.06 Firefox/2.0' # LitePower stager used by WRITE https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044/
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Old browsers
level: high
tags:
- attack.command_and_control
- attack.t1071.001
CobaltStrike
🙋♀️🙋♀️🙋♀️Cobalt Strike Malleable Amazon Browsing Traffic Profile
title: CobaltStrike Malleable Amazon Browsing Traffic Profile
id: 953b895e-5cc9-454b-b183-7f3db555452e
status: test
description: Detects Malleable Amazon Profile
author: Markus Neis
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/amazon.profile
- https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100
date: 2019/11/12
modified: 2021/11/27
logsource:
category: proxy
detection:
selection1:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'GET'
c-uri: '/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books'
cs-host: 'www.amazon.com'
cs-cookie|endswith: '=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996'
selection2:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'POST'
c-uri: '/N4215/adj/amzn.us.sr.aps'
cs-host: 'www.amazon.com'
condition: selection1 or selection2
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
🙋♀️🙋♀️🙋♀️Cobalt Strike Malformed UAs in Malleable Profiles
title: CobaltStrike Malformed UAs in Malleable Profiles
id: 41b42a36-f62c-4c34-bd40-8cb804a34ad8
status: experimental
description: Detects different malformed user agents used in Malleable Profiles used with Cobalt Strike
author: Florian Roth
date: 2021/05/06
modified: 2021/11/02
references:
- https://github.com/yeyintminthuhtut/Malleable-C2-Profiles-Collection/
logsource:
category: proxy
detection:
selection1:
c-useragent:
- 'Mozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.1)'
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E )'
- 'Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2) Java/1.5.0_08'
selection2:
c-useragent|endswith: '; MANM; MANM)'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
CobaltStrike Malleable (OCSP) Profile
title: CobaltStrike Malleable (OCSP) Profile
id: 37325383-740a-403d-b1a2-b2b4ab7992e7
status: test
description: Detects Malleable (OCSP) Profile with Typo (OSCP) in URL
author: Markus Neis
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/ocsp.profile
date: 2019/11/12
modified: 2021/11/27
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/oscp/'
cs-host: 'ocsp.verisign.com'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
CobaltStrike Malleable OneDrive Browsing Traffic Profile
title: CobaltStrike Malleable OneDrive Browsing Traffic Profile
id: c9b33401-cc6a-4cf6-83bb-57ddcb2407fc
status: test
description: Detects Malleable OneDrive Profile
author: Markus Neis
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/onedrive_getonly.profile
date: 2019/11/12
modified: 2022/01/07
logsource:
category: proxy
detection:
selection:
cs-method: 'GET'
c-uri|endswith: '?manifest=wac'
cs-host: 'onedrive.live.com'
filter:
c-uri|startswith: 'http'
c-uri|contains: '://onedrive.live.com/'
condition: selection and not filter
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
Windows PowerShell User Agent
title: Windows PowerShell User Agent
id: c8557060-9221-4448-8794-96320e6f3e74
status: test
description: Detects Windows PowerShell Web Access
author: Florian Roth
references:
- https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
date: 2017/03/13
modified: 2021/11/27
logsource:
category: proxy
detection:
selection:
c-useragent|contains: ' WindowsPowerShell/'
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
level: medium
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
web
web_apache_segfault.yml
web_apache_threading_error.yml
web_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml
web_citrix_cve_2019_19781_exploit.yml
web_citrix_cve_2020_8193_8195_exploit.yml
web_cve_2010_5278_exploitation_attempt.yml
web_cve_2018_2894_weblogic_exploit.yml
web_cve_2019_3398_confluence.yml
web_cve_2020_0688_msexchange.yml
web_cve_2020_14882_weblogic_exploit.yml
web_cve_2020_3452_cisco_asa_ftd.yml
web_cve_2020_5902_f5_bigip.yml
web_cve_2021_2109_weblogic_rce_exploit.yml
web_cve_2021_21978_vmware_view_planner_exploit.yml
web_cve_2021_22005_vmware_file_upload.yml
Updateweb_cve_2021_22005_vmware_file_upload.yml
web_cve_2021_22893_pulse_secure_rce_exploit.yml
web_cve_2021_26814_wzuh_rce.yml
web_cve_2021_26858_iis_rce.yml
web_cve_2021_33766_msexchange_proxytoken.yml
web_cve_2021_40539_adselfservice.yml
Updateweb_cve_2021_40539_adselfservice.yml
web_cve_2021_40539_manageengine_adselfservice_exploit.yml
Updateweb_cve_2021_40539_manageengine_adselfservice_exploit.yml
web_cve_2021_41773_apache_path_traversal.yml
web_cve_2021_42237_sitecore_report_ashx.yml
web_cve_2021_43798_grafana.yml
web_cve_2021_44228_log4j.yml
web_cve_2021_44228_log4j_fields.yml
web_exchange_cve_2020_0688_exploit.yml
web_exchange_exploitation_hafnium.yml
web_exchange_proxyshell.yml
web_exchange_proxyshell_successful.yml
web_expl_exchange_cve_2021_28480.yml
web_fortinet_cve_2018_13379_preauth_read_exploit.yml
web_fortinet_cve_2021_22123_exploit.yml
web_iis_tilt_shortname_scan.yml
web_jndi_exploit.yml
web_multiple_suspicious_resp_codes_single_source.yml
web_nginx_core_dump.yml
web_path_traversal_exploitation_attempt.yml
web_pulsesecure_cve_2019_11510.yml
web_solarwinds_cve_2020_10148.yml
web_solarwinds_supernova_webshell.yml
web_sonicwall_jarrewrite_exploit.yml
web_source_code_enumeration.yml
web_terramaster_cve_2020_28188_rce_exploit.yml
web_unc2546_dewmode_php_webshell.yml
web_vsphere_cve_2021_21972_unauth_rce_exploit.yml
win_powershell_snapins_hafnium.yml
win_webshell_regeorg.yml
KeyWords
Detect Sql Injection By Keywords
title: Detect Sql Injection By Keywords
id: 5513deaf-f49a-46c2-a6c8-3f111b5cb453
status: test
description: Detects sql injection that use GET requests by keyword searches in URL strings
author: Saw Win Naung
date: 2020/02/22
modified: 2021/11/27
logsource:
category: webserver
detection:
keywords:
- '=select'
- '=union'
- '=concat'
condition: keywords
fields:
- client_ip
- vhost
- url
- response
falsepositives:
- Java scripts and CSS Files
- User searches in search boxes of the respective website
level: high
Webshell Detection by Keyword
title: Webshell Detection by Keyword
id: 7ff9db12-1b94-4a79-ba68-a2402c5d6729
status: test
description: Detects webshells that use GET requests by keyword searches in URL strings
author: Florian Roth
date: 2017/02/19
modified: 2021/11/27
logsource:
category: webserver
detection:
keywords:
- =whoami
- =net%20user
- =cmd%20/c%20
condition: keywords
fields:
- client_ip
- vhost
- url
- response
falsepositives:
- Web sites like wikis with articles on os commands and pages that include the os commands in the URLs
- User searches in search boxes of the respective website
level: high
tags:
- attack.persistence
- attack.t1505.003
Detect XSS Attempts By Keywords
title: Detect XSS Attempts By Keywords
id: 65354b83-a2ea-4ea6-8414-3ab38be0d409
status: experimental
description: Detects XSS that use GET requests by keyword searches in URL strings
author: Saw Win Naung
date: 2021/08/15
logsource:
category: webserver
detection:
keywords:
- '=cookie'
- '=script'
- '=onload'
- '=onmouseover'
condition: keywords
fields:
- client_ip
- vhost
- url
- response
falsepositives:
- Java scripts,CSS Files and PNG files
- User searches in search boxes of the respective website
level: high
windows
builtin
application
applocker
bits_client
code_integrity
dns_server
driverframeworks
firewall_as
ldap
msexchange
ntlm
printservice
security
servicebus
smbclient
system
win_hack_smbexec.yml
win_invoke_obfuscation_clip_services.yml
win_invoke_obfuscation_obfuscated_iex_services.yml
win_invoke_obfuscation_stdin_services.yml
win_invoke_obfuscation_var_services.yml
win_invoke_obfuscation_via_compress_services.yml
win_invoke_obfuscation_via_rundll_services.yml
win_invoke_obfuscation_via_stdin_services.yml
win_invoke_obfuscation_via_use_clip_services.yml
win_invoke_obfuscation_via_use_mshta_services.yml
win_invoke_obfuscation_via_use_rundll32_services.yml
win_invoke_obfuscation_via_var_services.yml
win_mal_creddumper.yml
win_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
win_ntfs_vuln_exploit.yml
win_pcap_drivers.yml
win_possible_zerologon_exploitation_using_wellknown_tools.yml
win_powershell_script_installed_as_service.yml
win_quarkspwdump_clearing_hive_access_history.yml
win_rare_service_installs.yml
win_rdp_potential_cve_2019_0708.yml
win_susp_dhcp_config.yml
win_susp_dhcp_config_failed.yml
win_susp_proceshacker.yml
win_susp_sam_dump.yml
win_susp_system_update_error.yml
win_system_defender_disabled.yml
win_system_susp_eventlog_cleared.yml
win_tap_driver_installation.yml
win_tool_psexec.yml
win_volume_shadow_copy_mount.yml
win_vul_cve_2020_1472.yml
win_vul_cve_2021_42278_or_cve_2021_42287.yml
🙋♀️🙋♀️🙋♀️APT🙋♀️🙋♀️🙋♀️
Turla Service Install
title: Turla Service Install
id: 1df8b3da-b0ac-4d8a-b7c7-6cb7c24160e4
status: test
description: This method detects a service install of malicious services mentioned in Carbon Paper - Turla report by ESET
author: Florian Roth
references:
- https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/
date: 2017/03/31
modified: 2021/11/30
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName:
- 'srservice'
- 'ipvpn'
- 'hkmsvc'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.g0010
- attack.t1543.003
Chafer Activity
title: Chafer Activity
id: 53ba33fd-3a50-4468-a5ef-c583635cfa92
description: Detects Chafer activity attributed to OilRig as reported in Nyotron report in March 2018
status: experimental
references:
- https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
tags:
- attack.persistence
- attack.g0049
- attack.t1053.005
- attack.s0111
- attack.t1543.003
- attack.defense_evasion
- attack.t1112
- attack.command_and_control
- attack.t1071.004
date: 2018/03/23
modified: 2021/11/30
author: Florian Roth, Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
logsource:
product: windows
service: system
detection:
selection_service:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName:
- 'SC Scheduled Scan'
- 'UpdatMachine'
condition: selection_service
falsepositives:
- Unknown
level: critical
StoneDrill Service Install
title: StoneDrill Service Install
id: 9e987c6c-4c1e-40d8-bd85-dd26fba8fdd6
status: test
description: This method detects a service install of the malicious Microsoft Network Realtime Inspection Service service described in StoneDrill report by Kaspersky
author: Florian Roth
references:
- https://securelist.com/blog/research/77725/from-shamoon-to-stonedrill/
date: 2017/03/07
modified: 2021/11/30
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName: NtsSrv
ServiceFileName|endswith: ' LocalService'
condition: selection
falsepositives:
- Unlikely
level: high
tags:
- attack.persistence
- attack.g0064
- attack.t1543.003
Turla PNG Dropper Service
title: Turla PNG Dropper Service
id: 1228f8e2-7e79-4dea-b0ad-c91f1d5016c1
status: test
description: This method detects malicious services mentioned in Turla PNG dropper report by NCC Group in November 2018
author: Florian Roth
references:
- https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/
date: 2018/11/23
modified: 2021/11/30
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName: 'WerFaultSvc'
condition: selection
falsepositives:
- unlikely
level: critical
tags:
- attack.persistence
- attack.g0010
- attack.t1543.003
CobaltStrike Service Installations
title: CobaltStrike Service Installations
id: 5a105d34-05fc-401e-8553-272b45c1522d
description: Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement
status: experimental
author: Florian Roth, Wojciech Lesicki
references:
- https://www.sans.org/webcasts/119395
- https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/
- https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
date: 2021/05/26
modified: 2021/09/30
tags:
- attack.execution
- attack.privilege_escalation
- attack.lateral_movement
- attack.t1021.002
- attack.t1543.003
- attack.t1569.002
logsource:
product: windows
service: system
detection:
selection_id:
Provider_Name: 'Service Control Manager'
EventID: 7045
selection1:
ImagePath|contains|all:
- 'ADMIN$'
- '.exe'
selection2:
ImagePath|contains|all:
- '%COMSPEC%'
- 'start'
- 'powershell'
selection3:
ImagePath|contains: 'powershell -nop -w hidden -encodedcommand'
selection4:
ImagePath|base64offset|contains: "IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:"
condition: selection_id and (selection1 or selection2 or selection3 or selection4)
falsepositives:
- Unknown
level: critical
Moriya Rootkit
title: Moriya Rootkit
id: 25b9c01c-350d-4b95-bed1-836d04a4f324
description: Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report
status: experimental
author: Bhabesh Raj
date: 2021/05/06
modified: 2021/11/30
references:
- https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1543.003
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ServiceName: ZzNetSvc
condition: selection
level: critical
falsepositives:
- None
taskscheduler
Rare Scheduled Task Creations
title: Rare Scheduled Task Creations
id: b20f6158-9438-41be-83da-a5a16ac90c2b
status: test
description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count function selects tasks with rare names.
author: Florian Roth
date: 2017/03/17
modified: 2021/12/28
logsource:
product: windows
service: taskscheduler
detection:
selection:
EventID: 106
filter1:
TaskName:
- \Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan
timeframe: 7d
condition: selection and not 1 of filter* | count() by TaskName < 5
falsepositives:
- Software installation
level: low
tags:
- attack.persistence
- attack.s0111
- attack.t1053.005
windefend
wmi
Mimikatz Use
title: Mimikatz Use
id: 06d71506-7beb-4f22-8888-e2e5e2ca7fd8
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
status: experimental
author: Florian Roth (rule), David ANDRE (additional keywords)
date: 2017/01/10
modified: 2022/01/05
references:
- https://tools.thehacker.recipes/mimikatz/modules
tags:
- attack.s0002
- attack.lateral_movement
- attack.credential_access
- car.2013-07-001
- car.2019-04-004
- attack.t1003.002
- attack.t1003.004
- attack.t1003.001
- attack.t1003.006
logsource:
product: windows
detection:
keywords:
- 'dpapi::masterkey'
- 'eo.oe.kiwi'
- 'event::clear'
- 'event::drop'
- 'gentilkiwi.com'
- 'kerberos::golden'
- 'kerberos::ptc'
- 'kerberos::ptt'
- 'kerberos::tgt'
- 'Kiwi Legit Printer'
- 'lsadump::'
- 'mimidrv.sys'
- '\mimilib.dll'
- 'misc::printnightmare'
- 'misc::shadowcopies'
- 'misc::skeleton'
- 'privilege::backup'
- 'privilege::debug'
- 'privilege::driver'
- 'sekurlsa::'
filter:
EventID: 15 # Sysmon's FileStream Events (could cause false positives when Sigma rules get copied on/to a system)
condition: keywords and not filter
falsepositives:
- Naughty administrators
- Penetration test
- AV Signature updates
- Files with Mimikatz in their filename
level: critical
create_remote_thread
CobaltStrike Process Injection
title: CobaltStrike Process Injection
id: 6309645e-122d-4c5b-bb2b-22e4f9c2fa42
description: Detects a possible remote threat creation with certain characteristics which are typical for Cobalt Strike beacons
references:
- https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f
- https://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/
tags:
- attack.defense_evasion
- attack.t1055.001
status: experimental
author: Olaf Hartong, Florian Roth, Aleksey Potapov, oscd.community
date: 2018/11/30
modified: 2021/11/20
logsource:
product: windows
category: create_remote_thread
detection:
selection:
StartAddress|endswith:
- '0B80'
- '0C7C'
- '0C88'
condition: selection
falsepositives:
- unknown
level: high
CreateRemoteThread API and LoadLibrary
title: CreateRemoteThread API and LoadLibrary
id: 052ec6f6-1adc-41e6-907a-f1c813478bee
status: test
description: Detects potential use of CreateRemoteThread api and LoadLibrary function to inject DLL into a process
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://threathunterplaybook.com/notebooks/windows/05_defense_evasion/WIN-180719170510.html
date: 2019/08/11
modified: 2021/11/27
logsource:
product: windows
category: create_remote_thread
detection:
selection:
StartModule|endswith: '\kernel32.dll'
StartFunction: 'LoadLibraryA'
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.defense_evasion
- attack.t1055.001
Accessing WinAPI in PowerShell. Code Injection.
title: Accessing WinAPI in PowerShell. Code Injection.
id: eeb2e3dc-c1f4-40dd-9bd5-149ee465ad50
status: test
description: Detecting Code injection with PowerShell in another process
author: Nikita Nazarov, oscd.community
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
date: 2020/10/06
modified: 2021/11/27
logsource:
product: windows
category: create_remote_thread
definition: 'Note that you have to configure logging for CreateRemoteThread in Symson config'
detection:
selection:
SourceImage|endswith: '\powershell.exe'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.execution
- attack.t1059.001
PowerShell Rundll32 Remote Thread Creation
title: PowerShell Rundll32 Remote Thread Creation
id: 99b97608-3e21-4bfe-8217-2a127c396a0e
status: experimental
description: Detects PowerShell remote thread creation in Rundll32.exe
author: Florian Roth
references:
- https://www.fireeye.com/blog/threat-research/2018/06/bring-your-own-land-novel-red-teaming-technique.html
date: 2018/06/25
modified: 2021/11/12
logsource:
product: windows
category: create_remote_thread
detection:
selection:
SourceImage|endswith: '\powershell.exe'
TargetImage|endswith: '\rundll32.exe'
condition: selection
tags:
- attack.defense_evasion
- attack.execution
- attack.t1218.011
- attack.t1059.001
falsepositives:
- Unknown
level: high
Suspicious Remote Thread Created
title: Suspicious Remote Thread Created
id: 66d31e5f-52d6-40a4-9615-002d3789a119
description: Offensive tradecraft is switching away from using APIs like "CreateRemoteThread", however, this is still largely observed in the wild. This rule aims
to detect suspicious processes (those we would not expect to behave in this way like word.exe or outlook.exe) creating remote threads on other processes. It is
a generalistic rule, but it should have a low FP ratio due to the selected range of processes.
notes:
- MonitoringHost.exe is a process that loads .NET CLR by default and thus a favorite for process injection for .NET in-memory offensive tools.
status: experimental
date: 2019/10/27
modified: 2021/06/27
author: Perez Diego (@darkquassar), oscd.community
references:
- Personal research, statistical analysis
- https://lolbas-project.github.io
logsource:
product: windows
category: create_remote_thread
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1055
detection:
selection:
SourceImage|endswith:
- '\bash.exe'
- '\cvtres.exe'
- '\defrag.exe'
- '\dnx.exe'
- '\esentutl.exe'
- '\excel.exe'
- '\expand.exe'
- '\explorer.exe'
- '\find.exe'
- '\findstr.exe'
- '\forfiles.exe'
- '\git.exe'
- '\gpupdate.exe'
- '\hh.exe'
- '\iexplore.exe'
- '\installutil.exe'
- '\lync.exe'
- '\makecab.exe'
- '\mDNSResponder.exe'
- '\monitoringhost.exe'
- '\msbuild.exe'
- '\mshta.exe'
- '\msiexec.exe'
- '\mspaint.exe'
- '\outlook.exe'
- '\ping.exe'
- '\powerpnt.exe'
- '\powershell.exe'
- '\provtool.exe'
- '\python.exe'
- '\regsvr32.exe'
- '\robocopy.exe'
- '\runonce.exe'
- '\sapcimc.exe'
- '\schtasks.exe'
- '\smartscreen.exe'
- '\spoolsv.exe'
# - '\taskhost.exe' # disabled due to false positives
- '\tstheme.exe'
- '\userinit.exe'
- '\vssadmin.exe'
- '\vssvc.exe'
- '\w3wp.exe'
- '\winlogon.exe'
- '\winscp.exe'
- '\wmic.exe'
- '\word.exe'
- '\wscript.exe'
filter:
SourceImage|contains: 'Visual Studio'
condition: selection and not filter
fields:
- ComputerName
- User
- SourceImage
- TargetImage
level: high
falsepositives:
- Unknown
Password Dumper Remote Thread in LSASS
title: Password Dumper Remote Thread in LSASS
id: f239b326-2f41-4d6b-9dfa-c846a60ef505
description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events.
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm
status: stable
author: Thomas Patzke
date: 2017/02/19
modified: 2021/06/21
logsource:
product: windows
category: create_remote_thread
detection:
selection:
TargetImage|endswith: '\lsass.exe'
StartModule: ''
condition: selection
tags:
- attack.credential_access
- attack.s0005
- attack.t1003.001
falsepositives:
- Antivirus products
level: high
CACTUSTORCH Remote Thread Creation
title: CACTUSTORCH Remote Thread Creation
id: 2e4e488a-6164-4811-9ea1-f960c7359c40
description: Detects remote thread creation from CACTUSTORCH as described in references.
references:
- https://twitter.com/SBousseaden/status/1090588499517079552
- https://github.com/mdsecactivebreach/CACTUSTORCH
status: experimental
author: '@SBousseaden (detection), Thomas Patzke (rule)'
date: 2019/02/01
modified: 2021/11/12
logsource:
product: windows
category: create_remote_thread
detection:
selection:
SourceImage|endswith:
- '\System32\cscript.exe'
- '\System32\wscript.exe'
- '\System32\mshta.exe'
- '\winword.exe'
- '\excel.exe'
TargetImage|contains: '\SysWOW64\'
StartModule: null
condition: selection
tags:
- attack.defense_evasion
- attack.t1055.012
- attack.execution
- attack.t1059.005
- attack.t1059.007
- attack.t1218.005
falsepositives:
- unknown
level: high
create_stream_hash
sysmon_ads_executable.yml
sysmon_regedit_export_to_ads.yml
deprecated
powershell_suspicious_download.yml
powershell_suspicious_invocation_generic.yml
powershell_suspicious_invocation_specific.yml
powershell_syncappvpublishingserver_exe.yml
process_creation_syncappvpublishingserver_exe.yml
sysmon_mimikatz_detection_lsass.yml
sysmon_rclone_execution.yml
win_susp_esentutl_activity.yml
win_susp_rclone_exec.yml
win_susp_vssadmin_ntds_activity.yml
dns_query
dns_query_win_gotoopener.yml
dns_query_win_hybridconnectionmgr_servicebus.yml
dns_query_win_lobas_appinstaller.yml
dns_query_win_logmein.yml
dns_query_win_mal_cobaltstrike.yml
dns_query_win_mega_nz.yml
dns_query_win_possible_dns_rebinding.yml
dns_query_win_regsvr32_network_activity.yml
dns_query_win_susp_ipify.yml
dns_query_win_susp_teamviewer.yml
dns_query_win_tor_onion.yml
driver_load
driver_load_mal_creddumper.yml
driver_load_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
driver_load_powershell_script_installed_as_service.yml
driver_load_susp_temp_use.yml
driver_load_vuln_dell_driver.yml
driver_load_windivert.yml
etw/file_rename
file_rename_win_not_dll_to_dll.yml
file_delete
file_delete_win_cve_2021_1675_printspooler_del.yml
file_delete_win_delete_appli_log.yml
file_delete_win_delete_backup_file.yml
file_delete_win_delete_prefetch.yml
file_delete_win_sysinternals_sdelete_file_deletion.yml
file_event
file_event_win_access_susp_unattend_xml.yml
file_event_win_advanced_ip_scanner.yml
file_event_win_anydesk_artefact.yml
file_event_win_apt_unidentified_nov_18.yml
file_event_win_creation_new_shim_database.yml
file_event_win_creation_scr_binary_file.yml
file_event_win_creation_system_file.yml
file_event_win_creation_unquoted_service_path.yml
file_event_win_cred_dump_tools_dropped_files.yml
file_event_win_csharp_compile_artefact.yml
file_event_win_cve_2021_1675_printspooler.yml
file_event_win_cve_2021_26858_msexchange.yml
file_event_win_cve_2021_31979_cve_2021_33771_exploits.yml
file_event_win_cve_2021_41379_msi_lpe.yml
file_event_win_detect_powerup_dllhijacking.yml
file_event_win_ghostpack_safetykatz.yml
file_event_win_gotoopener_artefact.yml
file_event_win_hack_dumpert.yml
file_event_win_hivenightmare_file_exports.yml
file_event_win_hktl_createminidump.yml
file_event_win_hktl_nppspy.yml
file_event_win_install_teamviewer_desktop.yml
file_event_win_iso_file_recent.yml
file_event_win_lsass_dump.yml
file_event_win_lsass_memory_dump_file_creation.yml
file_event_win_mal_adwind.yml
file_event_win_mal_octopus_scanner.yml
file_event_win_mal_vhd_download.yml
file_event_win_mimikatz_kirbi_file_creation.yml
ile_event_win_mimimaktz_memssp_log_file.yml
file_event_win_office_persistence.yml
file_event_win_outlook_c2_macro_creation.yml
file_event_win_outlook_newform.yml
file_event_win_pcre_net_temp_file.yml
file_event_win_pingback_backdoor.yml
file_event_win_powershell_exploit_scripts.yml
file_event_win_powershell_startup_shortcuts.yml
file_event_win_quarkspw_filedump.yml
file_event_win_rclone_exec_file.yml
file_event_win_redmimicry_winnti_filedrop.yml
file_event_win_sam_dump.yml
file_event_win_screenconnect_artefact.yml
file_event_win_script_creation_by_office_using_file_ext.yml
file_event_win_susp_adsi_cache_usage.yml
file_event_win_susp_clr_logs.yml
file_event_win_susp_colorcpl.yml
file_event_win_susp_desktop_ini.yml
file_event_win_susp_desktop_txt.yml
file_event_win_susp_desktopimgdownldr_file.yml
file_event_win_susp_exchange_aspx_write.yml
file_event_win_susp_ntds_dit.yml
file_event_win_susp_pfx_file_creation.yml
file_event_win_susp_procexplorer_driver_created_in_tmp_folder.yml
file_event_win_susp_system_interactive_powershell.yml
file_event_win_susp_task_write.yml
file_event_win_susp_teamviewer_remote_session.yml
file_event_win_suspicious_powershell_profile_create.yml
file_event_win_tool_psexec.yml
file_event_win_tsclient_filewrite_startup.yml
file_event_win_uac_bypass_consent_comctl32.yml
file_event_win_uac_bypass_dotnet_profiler.yml
file_event_win_uac_bypass_ieinstal.yml
file_event_win_uac_bypass_msconfig_gui.yml
file_event_win_uac_bypass_ntfs_reparse_point.yml
file_event_win_uac_bypass_winsat.yml
file_event_win_uac_bypass_wmp.yml
file_event_win_webshell_creation_detect.yml
file_event_win_win_cscript_wscript_dropper.yml
file_event_win_win_shell_write_susp_directory.yml
file_event_win_winrm_awl_bypass.yml
file_event_win_winword_cve_2021_40444.yml
file_event_win_wmi_persistence_script_event_consumer_write.yml
file_event_win_wmiprvse_wbemcomn_dll_hijack.yml
file_event_win_writing_local_admin_share.yml
Startup Folder File Write
title: Startup Folder File Write
id: 2aa0a6b4-a865-495b-ab51-c28249537b75
status: test
description: A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/12
- https://threathunterplaybook.com/evals/apt29/detections/5.B.1_611FCA99-97D0-4873-9E51-1C1BA2DBB40D.html
date: 2020/05/02
modified: 2021/11/27
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains: 'ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp'
condition: selection
falsepositives:
- unknown
level: low
tags:
- attack.persistence
- attack.t1547.001
PowerShell Writing Startup Shortcuts
title: PowerShell Writing Startup Shortcuts
id: 92fa78e7-4d39-45f1-91a3-8b23f3f1088d
description: Attempts to detect PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files into the startup directory to establish persistence. Accordingly, this detection opportunity is likely to identify persistence mechanisms in multiple threats. In the context of Yellow Cockatoo, this persistence mechanism eventually launches the command-line script that leads to the installation of a malicious DLL"
status: experimental
references:
- https://redcanary.com/blog/intelligence-insights-october-2021/
- https://github.com/redcanaryco/atomic-red-team/blob/36d49de4c8b00bf36054294b4a1fcbab3917d7c5/atomics/T1547.001/T1547.001.md#atomic-test-7---add-executable-shortcut-link-to-user-startup-folder
tags:
- attack.registry_run_keys_/_startup_folder
- attack.t1547.001
date: 2021/10/24
author: Christopher Peacock '@securepeacock', SCYTHE
level: high
logsource:
product: windows
category: file_event
detection:
selection:
Image|endswith: '\powershell.exe'
TargetFilename|contains: '\start menu\programs\startup\'
TargetFilename|endswith: '.lnk'
condition: selection
falsepositives:
- Unknown
- Depending on your environment accepted applications may leverage this at times. It is recomended to search for anomolies inidicative of malware.
Moriya Rootkit
title: Moriya Rootkit
id: a1507d71-0b60-44f6-b17c-bf53220fdd88
related:
- id: 25b9c01c-350d-4b95-bed1-836d04a4f324
type: derived
description: Detects the use of Moriya rootkit as described in the securelist's Operation TunnelSnake report
status: experimental
author: Bhabesh Raj
date: 2021/05/06
modified: 2021/09/21
references:
- https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1543.003
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename: 'C:\Windows\System32\drivers\MoriyaStreamWatchmen.sys'
condition: selection
level: critical
falsepositives:
- None
Dump Office Macro Files from Commandline
title: Dump Office Macro Files from Commandline
id: b1c50487-1967-4315-a026-6491686d860e
status: experimental
description: A office file with macro is created from a commandline or a script
author: frack113
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1566.001/T1566.001.md
- https://docs.microsoft.com/en-us/deployoffice/compat/office-file-format-reference
date: 2022/01/23
logsource:
category: file_event
product: windows
detection:
selection_ext:
TargetFilename|endswith:
- .docm
- .dotm
- .xlsm
- .xltm
- .potm
- .pptm
- .pptx
selection_cmd:
- Image|endswith:
- \cmd.exe
- \powershell.exe
- ParentImage|endswith:
- \cmd.exe
- \powershell.exe
condition: all of selection_*
falsepositives:
- Unknown
level: medium
tags:
- attack.initial_access
- attack.t1566.001
image_load
image_load_abusing_azure_browser_sso.yml
image_load_alternate_powershell_hosts_moduleload.yml
image_load_foggyweb_nobelium.yml
image_load_in_memory_powershell.yml
image_load_mimikatz_inmemory_detection.yml
image_load_pcre_net_load.yml
image_load_pingback_backdoor.yml
image_load_scrcons_imageload_wmi_scripteventconsumer.yml
image_load_silenttrinity_stage_use.yml
image_load_spoolsv_dll_load.yml
image_load_susp_advapi32_dll.yml
image_load_susp_fax_dll.yml
image_load_susp_image_load.yml
image_load_susp_office_dotnet_assembly_dll_load.yml
image_load_susp_office_dotnet_clr_dll_load.yml
image_load_susp_office_dotnet_gac_dll_load.yml
image_load_susp_office_dsparse_dll_load.yml
image_load_susp_office_kerberos_dll_load.yml
image_load_susp_python_image_load.yml
image_load_susp_script_dotnet_clr_dll_load.yml
image_load_susp_system_drawing_load.yml
image_load_susp_winword_vbadll_load.yml
image_load_susp_winword_wmidll_load.yml
image_load_suspicious_dbghelp_dbgcore_load.yml
image_load_suspicious_vss_ps_load.yml
image_load_svchost_dll_search_order_hijack.yml
image_load_tttracer_mod_load.yml
image_load_uac_bypass_via_dism.yml
image_load_uipromptforcreds_dlls.yml
image_load_unsigned_image_loaded_into_lsass.yml
image_load_usp_svchost_clfsw32.yml
image_load_wmi_module_load.yml
image_load_wmi_persistence_commandline_event_consumer.yml
image_load_wmic_remote_xsl_scripting_dlls.yml
image_load_wmiprvse_wbemcomn_dll_hijack.yml
image_load_wsman_provider_image_load.yml
network_connection
net_connection_win_binary_github_com.yml
net_connection_win_binary_susp_com.yml
net_connection_win_crypto_mining.yml
net_connection_win_dllhost_net_connections.yml
net_connection_win_excel_outbound_network_connection.yml
net_connection_win_imewdbld.yml
net_connection_win_malware_backconnect_ports.yml
net_connection_win_mega_nz.yml
net_connection_win_msiexec.yml
net_connection_win_notepad_network_connection.yml
net_connection_win_powershell_network_connection.yml
net_connection_win_python.yml
net_connection_win_rdp_reverse_tunnel.yml
net_connection_win_regsvr32_network_activity.yml
net_connection_win_remote_powershell_session_network.yml
net_connection_win_rundll32_net_connections.yml
net_connection_win_silenttrinity_stager_msbuild_activity.yml
net_connection_win_susp_outbound_smtp_connections.yml
net_connection_win_susp_prog_location_network_connection.yml
net_connection_win_susp_rdp.yml
net_connection_win_suspicious_outbound_kerberos_connection.yml
net_connection_win_wuauclt_network_connection.yml
pipe_created
pipe_created_alternate_powershell_hosts_pipe.yml
pipe_created_apt_turla_namedpipes.yml
pipe_created_cred_dump_tools_named_pipes.yml
pipe_created_efspotato_namedpipe.yml
pipe_created_mal_cobaltstrike.yml
pipe_created_mal_cobaltstrike_re.yml
pipe_created_mal_namedpipes.yml
pipe_created_powershell_execution_pipe.yml
pipe_created_psexec_pipes_artifacts.yml
pipe_created_susp_adfs_namedpipe_connection.yml
pipe_created_susp_cobaltstrike_pipe_patterns.yml
pipe_created_susp_wmi_consumer_namedpipe.yml
pipe_created_tool_psexec.yml
powershell
powershell_classic
posh_pc_alternate_powershell_hosts.yml
posh_pc_delete_volume_shadow_copies.yml
posh_pc_downgrade_attack.yml
posh_pc_exe_calling_ps.yml
posh_pc_powercat.yml
posh_pc_remote_powershell_session.yml
posh_pc_renamed_powershell.yml
posh_pc_susp_athremotefxvgpudisablementcommand.yml
posh_pc_susp_get_nettcpconnection.yml
posh_pc_susp_zip_compress.yml
posh_pc_suspicious_download.yml
posh_pc_tamper_with_windows_defender.yml
posh_pc_wsman_com_provider_no_powershell.yml
posh_pc_xor_commandline.yml
powershell_module
posh_pm_alternate_powershell_hosts.yml
posh_pm_bad_opsec_artifacts.yml
posh_pm_clear_powershell_history.yml
posh_pm_decompress_commands.yml
posh_pm_get_clipboard.yml
posh_pm_invoke_obfuscation_clip.yml
posh_pm_invoke_obfuscation_obfuscated_iex.yml
posh_pm_invoke_obfuscation_stdin.yml
posh_pm_invoke_obfuscation_var.yml
posh_pm_invoke_obfuscation_via_compress.yml
posh_pm_invoke_obfuscation_via_rundll.yml
posh_pm_invoke_obfuscation_via_stdin.yml
posh_pm_invoke_obfuscation_via_use_clip.yml
posh_pm_invoke_obfuscation_via_use_mhsta.yml
posh_pm_invoke_obfuscation_via_use_rundll32.yml
posh_pm_invoke_obfuscation_via_var.yml
posh_pm_powercat.yml
posh_pm_remote_powershell_session.yml
posh_pm_susp_athremotefxvgpudisablementcommand.yml
posh_pm_susp_get_nettcpconnection.yml
posh_pm_susp_zip_compress.yml
posh_pm_suspicious_ad_group_reco.yml
posh_pm_suspicious_download.yml
posh_pm_suspicious_invocation_generic.yml
posh_pm_suspicious_invocation_specific.yml
posh_pm_suspicious_local_group_reco.yml
posh_pm_suspicious_reset_computermachinepassword.yml
posh_pm_suspicious_smb_share_reco.yml
posh_pm_syncappvpublishingserver_exe.yml
powershell_script
posh_ps_access_to_browser_login_data.yml
posh_ps_access_to_chrome_login_data.yml
posh_ps_accessing_win_api.yml
posh_ps_adrecon_execution.yml
posh_ps_automated_collection.yml
posh_ps_azurehound_commands.yml
posh_ps_capture_screenshots.yml
posh_ps_cl_invocation_lolscript.yml
posh_ps_cl_invocation_lolscript_count.yml
posh_ps_cl_mutexverifiers_lolscript.yml
posh_ps_cl_mutexverifiers_lolscript_count.yml
posh_ps_clear_powershell_history.yml
posh_ps_clearing_windows_console_history.yml
posh_ps_cmdlet_scheduled_task.yml
posh_ps_copy_item_system32.yml
posh_ps_cor_profiler.yml
posh_ps_create_local_user.yml
posh_ps_create_volume_shadow_copy.yml
posh_ps_data_compressed.yml
posh_ps_detect_vm_env.yml
posh_ps_directorysearcher.yml
posh_ps_directoryservices_accountmanagement.yml
posh_ps_dnscat_execution.yml
posh_ps_dump_password_windows_credential_manager.yml
posh_ps_enable_psremoting.yml
posh_ps_enumerate_password_windows_credential_manager.yml
posh_ps_file_and_directory_discovery.yml
posh_ps_get_acl_service.yml
posh_ps_get_adreplaccount.yml
posh_ps_get_childitem_bookmarks.yml
posh_ps_icmp_exfiltration.yml
posh_ps_invoke_command_remote.yml
posh_ps_invoke_dnsexfiltration.yml
posh_ps_invoke_nightmare.yml
posh_ps_keylogging.yml
posh_ps_localuser.yml
posh_ps_malicious_commandlets.yml
posh_ps_malicious_keywords.yml
posh_ps_memorydump_getstoragediagnosticinfo.yml
posh_ps_msxml_com.yml
posh_ps_nishang_malicious_commandlets.yml
posh_ps_ntfs_ads_access.yml
posh_ps_office_comobject_registerxll.yml
posh_ps_powerview_malicious_commandlets.yml
posh_ps_prompt_credentials.yml
posh_ps_psattack.yml
posh_ps_remote_session_creation.yml
posh_ps_remove_item_path.yml
posh_ps_request_kerberos_ticket.yml
posh_ps_root_certificate_installed.yml
posh_ps_run_from_mount_diskimage.yml
posh_ps_security_software_discovery.yml
posh_ps_send_mailmessage.yml
posh_ps_set_policies_to_unsecure_level.yml
posh_ps_shellintel_malicious_commandlets.yml
posh_ps_software_discovery.yml
posh_ps_store_file_in_alternate_data_stream.yml
posh_ps_susp_invoke_webrequest_useragent.yml
posh_ps_susp_remove_adgroupmember.yml
posh_ps_susp_ssl_keyword.yml
posh_ps_susp_wallpaper.yml
posh_ps_susp_win32_shadowcopy.yml
posh_ps_susp_zip_compress.yml
posh_ps_suspicious_ad_group_reco.yml
posh_ps_suspicious_download.yml
posh_ps_suspicious_execute_batch_script.yml
posh_ps_suspicious_export_pfxcertificate.yml
posh_ps_suspicious_extracting.yml
posh_ps_suspicious_getprocess_lsass.yml
posh_ps_suspicious_gwmi.yml
posh_ps_suspicious_invocation_generic.yml
posh_ps_suspicious_invocation_specific.yml
posh_ps_suspicious_iofilestream.yml
posh_ps_suspicious_keywords.yml
posh_ps_suspicious_local_group_reco.yml
posh_ps_suspicious_mail_acces.yml
posh_ps_suspicious_mount_diskimage.yml
posh_ps_suspicious_mounted_share_deletion.yml
posh_ps_suspicious_networkcredential.yml
posh_ps_suspicious_new_psdrive.yml
posh_ps_suspicious_recon.yml
posh_ps_suspicious_smb_share_reco.yml
posh_ps_suspicious_start_process.yml
posh_ps_suspicious_unblock_file.yml
posh_ps_suspicious_win32_pnpentity.yml
posh_ps_suspicious_windowstyle.yml
posh_ps_syncappvpublishingserver_exe.yml
posh_ps_tamper_defender.yml
posh_ps_test_netconnection.yml
posh_ps_timestomp.yml
posh_ps_trigger_profiles.yml
posh_ps_upload.yml
posh_ps_web_request.yml
posh_ps_windows_firewall_profile_disabled.yml
posh_ps_winlogon_helper_dll.yml
posh_ps_wmi_persistence.yml
posh_ps_wmimplant.yml
posh_ps_xml_iex.yml
PowerShell ShellCode Base64ed
- AAAAYInlM
- OiCAAAAYInlM
- OiJAAAAYInlM
原始数据是啥呀?&input=QUFBQVlJbmxNCk9pQ0FBQUFZSW5sTQpPaUpBQUFBWUlubE0)
title: PowerShell ShellCode
id: 16b37b70-6fcf-4814-a092-c36bd3aafcbd
status: experimental
description: Detects Base64 encoded Shellcode
references:
- https://twitter.com/cyb3rops/status/1063072865992523776
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
- attack.execution
- attack.t1059.001
author: David Ledbetter (shellcode), Florian Roth (rule)
date: 2018/11/17
modified: 2021/10/16
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection:
ScriptBlockText|contains: 'AAAAYInlM'
selection2:
ScriptBlockText|contains:
- 'OiCAAAAYInlM'
- 'OiJAAAAYInlM'
condition: selection and selection2
falsepositives:
- Unknown
level: critical
Obfuscation
Invoke-Obfuscation CLIP+Launcher
title: Invoke-Obfuscation CLIP+ Launcher
id: 73e67340-0d25-11eb-adc1-0242ac120002
description: Detects Obfuscated use of Clip.exe to execute PowerShell
status: experimental
author: Jonathan Cheong, oscd.community
date: 2020/10/13
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task 26)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '.*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation Obfuscated IEXInvocation
title: Invoke-Obfuscation Obfuscated IEX Invocation
id: 1b9dc62e-6e9e-42a3-8990-94d7a10007f7
description: Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014
references:
- https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888
status: experimental
author: 'Daniel Bohannon (@Mandiant/@FireEye), oscd.community'
date: 2019/11/08
modified: 2022/01/27
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_iex:
- ScriptBlockText|re: '\$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\['
- ScriptBlockText|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- ScriptBlockText|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
- ScriptBlockText|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
- ScriptBlockText|re: '\\\\*mdr\\\\*\W\s*\)\.Name'
- ScriptBlockText|re: '\$VerbosePreference\.ToString\('
condition: selection_iex
falsepositives:
- Unknown
level: high
Invoke-Obfuscation STDIN+Launcher
title: Invoke-Obfuscation STDIN+Launcher
id: 779c8c12-0eb1-11eb-adc1-0242ac120002
description: Detects Obfuscated use of stdin to execute PowerShell
status: experimental
author: Jonathan Cheong, oscd.community
date: 2020/10/15
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task 25)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '.*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation VAR+ Launcher
title: Invoke-Obfuscation VAR+ Launcher
id: 0adfbc14-0ed1-11eb-adc1-0242ac120002
description: Detects Obfuscated use of Environment Variables to execute PowerShell
status: experimental
author: Jonathan Cheong, oscd.community
date: 2020/10/15
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task 24)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '.*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation COMPRESS OBFUSCATION
title: Invoke-Obfuscation COMPRESS OBFUSCATION
id: 20e5497e-331c-4cd5-8d36-935f6e2a9a07
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
status: experimental
author: Timur Zinniatullin, oscd.community
date: 2020/10/18
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task 19)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend'
condition: selection_4104
falsepositives:
- unknown
level: medium
Invoke-Obfuscation RUNDLL LAUNCHER
title: Invoke-Obfuscation RUNDLL LAUNCHER
id: e6cb92b4-b470-4eb8-8a9d-d63e8583aae0
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
status: experimental
author: Timur Zinniatullin, oscd.community
date: 2020/10/18
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task 23)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"'
condition: selection_4104
falsepositives:
- Unknown
level: medium
Invoke-Obfuscation Via Stdin
title: Invoke-Obfuscation Via Stdin
id: 86b896ba-ffa1-4fea-83e3-ee28a4c915c7
description: Detects Obfuscated Powershell via Stdin in Scripts
status: experimental
author: Nikita Nazarov, oscd.community
date: 2020/10/12
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task28)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation Via Use Clip
title: Invoke-Obfuscation Via Use Clip
id: db92dd33-a3ad-49cf-8c2c-608c3e30ace0
description: Detects Obfuscated Powershell via use Clip.exe in Scripts
status: experimental
author: Nikita Nazarov, oscd.community
date: 2020/10/09
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task29)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation Via Use MSHTA
title: Invoke-Obfuscation Via Use MSHTA
id: e55a5195-4724-480e-a77e-3ebe64bd3759
description: Detects Obfuscated Powershell via use MSHTA in Scripts
status: experimental
author: Nikita Nazarov, oscd.community
date: 2020/10/08
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task31)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation Via Use Rundll32
title: Invoke-Obfuscation Via Use Rundll32
id: a5a30a6e-75ca-4233-8b8c-42e0f2037d3b
description: Detects Obfuscated Powershell via use Rundll32 in Scripts
status: experimental
author: Nikita Nazarov, oscd.community
date: 2019/10/08
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"'
condition: selection_4104
falsepositives:
- Unknown
level: high
Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
id: e54f5149-6ba3-49cf-b153-070d24679126
description: Detects Obfuscated Powershell via VAR++ LAUNCHER
status: experimental
author: Timur Zinniatullin, oscd.community
date: 2020/10/13
modified: 2021/10/16
references:
- https://github.com/Neo23x0/sigma/issues/1009 #(Task27)
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_4104:
ScriptBlockText|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
condition: selection_4104
falsepositives:
- Unknown
level: high
process_access
proc_access_win_cmstp_execution_by_access.yml
proc_access_win_cobaltstrike_bof_injection_pattern.yml
proc_access_win_cred_dump_lsass_access.yml
proc_access_win_direct_syscall_ntopenprocess.yml
proc_access_win_in_memory_assembly_execution.yml
proc_access_win_invoke_phantom.yml
proc_access_win_lazagne_cred_dump_lsass_access.yml
proc_access_win_littlecorporal_generated_maldoc.yml
proc_access_win_load_undocumented_autoelevated_com_interface.yml
proc_access_win_lsass_dump_comsvcs_dll.yml
proc_access_win_lsass_memdump.yml
proc_access_win_lsass_memdump_evasion.yml
proc_access_win_lsass_memdump_indicators.yml
proc_access_win_malware_verclsid_shellcode.yml
proc_access_win_mimikatz_trough_winrm.yml
proc_access_win_pypykatz_cred_dump_lsass_access.yml
proc_access_win_susp_proc_access_lsass.yml
proc_access_win_susp_proc_access_lsass_susp_source.yml
proc_access_win_svchost_cred_dump.yml
proc_access_win_uac_bypass_wow64_logger.yml
process_creation
proc_creation_win_abusing_debug_privilege.yml
proc_creation_win_abusing_windows_telemetry_for_persistence.yml
proc_creation_win_accesschk_usage_after_priv_escalation.yml
proc_creation_win_ad_find_discovery.yml
proc_creation_win_advanced_ip_scanner.yml
proc_creation_win_advanced_port_scanner.yml
proc_creation_win_alternate_data_streams.yml
proc_creation_win_always_install_elevated_msi_spawned_cmd_powershell.yml
proc_creation_win_always_install_elevated_windows_installer.yml
proc_creation_win_anydesk.yml
proc_creation_win_anydesk_silent_install.yml
proc_creation_win_atlassian_confluence_cve_2021_26084_exploit.yml
proc_creation_win_attrib_hiding_files.yml
proc_creation_win_attrib_system.yml
proc_creation_win_automated_collection.yml
proc_creation_win_bad_opsec_sacrificial_processes.yml
proc_creation_win_base64_listing_shadowcopy.yml
proc_creation_win_base64_reflective_assembly_load.yml
proc_creation_win_bitsadmin_download.yml
proc_creation_win_bootconf_mod.yml
proc_creation_win_bypass_squiblytwo.yml
proc_creation_win_c3_load_by_rundll32.yml
proc_creation_win_certoc_execution.yml
proc_creation_win_change_default_file_association.yml
proc_creation_win_cl_invocation_lolscript.yml
proc_creation_win_cl_mutexverifiers_lolscript.yml
proc_creation_win_class_exec_xwizard.yml
proc_creation_win_cleanwipe.yml
proc_creation_win_clip.yml
proc_creation_win_cmd_delete.yml
proc_creation_win_cmd_dosfuscation.yml
proc_creation_win_cmd_redirect.yml
proc_creation_win_cmdkey_recon.yml
proc_creation_win_cmstp_com_object_access.yml
proc_creation_win_cmstp_execution_by_creation.yml
proc_creation_win_cobaltstrike_load_by_rundll32.yml
proc_creation_win_cobaltstrike_process_patterns.yml
proc_creation_win_commandline_path_traversal.yml
proc_creation_win_commandline_path_traversal_evasion.yml
proc_creation_win_conti_cmd_ransomware.yml
proc_creation_win_control_panel_item.yml
proc_creation_win_copying_sensitive_files_with_credential_data.yml
proc_creation_win_coti_sqlcmd.yml
proc_creation_win_creation_mavinject_dll.yml
proc_creation_win_credential_access_via_password_filter.yml
proc_creation_win_crime_fireball.yml
proc_creation_win_crime_maze_ransomware.yml
proc_creation_win_crime_snatch_ransomware.yml
proc_creation_win_crypto_mining_monero.yml
proc_creation_win_cve_2021_26857_msexchange.yml
proc_creation_win_data_compressed_with_rar.yml
proc_creation_win_delete_systemstatebackup.yml
proc_creation_win_detecting_fake_instances_of_hxtsr.yml
proc_creation_win_dinjector.yml
proc_creation_win_discover_private_keys.yml
proc_creation_win_dll_sideload_xwizard.yml
proc_creation_win_dns_exfiltration_tools_execution.yml
proc_creation_win_dns_serverlevelplugindll.yml
proc_creation_win_dnscat2_powershell_implementation.yml
proc_creation_win_dotnet.yml
proc_creation_win_dsim_remove.yml
proc_creation_win_dumpstack_log_evasion.yml
proc_creation_win_embed_exe_lnk.yml
proc_creation_win_encoded_frombase64string.yml
proc_creation_win_encoded_iex.yml
proc_creation_win_enumeration_for_credentials_in_registry.yml
proc_creation_win_esentutl_webcache.yml
proc_creation_win_etw_modification_cmdline.yml
proc_creation_win_etw_trace_evasion.yml
proc_creation_win_evil_winrm.yml
proc_creation_win_exfiltration_and_tunneling_tools_execution.yml
proc_creation_win_expand_cabinet_files.yml
proc_creation_win_exploit_cve_2015_1641.yml
proc_creation_win_exploit_cve_2017_0261.yml
proc_creation_win_exploit_cve_2017_11882.yml
proc_creation_win_exploit_cve_2017_8759.yml
proc_creation_win_exploit_cve_2019_1378.yml
proc_creation_win_exploit_cve_2019_1388.yml
proc_creation_win_exploit_cve_2020_10189.yml
proc_creation_win_exploit_cve_2020_1048.yml
proc_creation_win_exploit_cve_2020_1350.yml
proc_creation_win_exploit_lpe_cve_2021_41379.yml
proc_creation_win_exploit_systemnightmare.yml
proc_creation_win_false_sysinternalsuite.yml
proc_creation_win_file_permission_modifications.yml
proc_creation_win_findstr_gpp_passwords.yml
proc_creation_win_fsutil_symlinkevaluation.yml
proc_creation_win_gotoopener.yml
proc_creation_win_grabbing_sensitive_hives_via_reg.yml
proc_creation_win_hack_adcspwn.yml
proc_creation_win_hack_bloodhound.yml
proc_creation_win_hack_dumpert.yml
proc_creation_win_hack_hydra.yml
proc_creation_win_hack_koadic.yml
proc_creation_win_hack_rubeus.yml
proc_creation_win_hack_secutyxploded.yml
proc_creation_win_hack_wce.yml
proc_creation_win_hashcat.yml
proc_creation_win_headless_browser_file_download.yml
proc_creation_win_hh_chm.yml
proc_creation_win_hiding_malware_in_fonts_folder.yml
proc_creation_win_high_integrity_sdclt.yml
proc_creation_win_hktl_createminidump.yml
proc_creation_win_hktl_uacme_uac_bypass.yml
proc_creation_win_html_help_spawn.yml
proc_creation_win_hwp_exploits.yml
proc_creation_win_iis_http_logging.yml
proc_creation_win_impacket_compiled_tools.yml
proc_creation_win_impacket_lateralization.yml
proc_creation_win_indirect_cmd.yml
proc_creation_win_indirect_cmd_compatibility_assistant.yml
proc_creation_win_infdefaultinstall.yml
proc_creation_win_install_reg_debugger_backdoor.yml
proc_creation_win_interactive_at.yml
proc_creation_win_invoke_obfuscation_clip.yml
proc_creation_win_invoke_obfuscation_obfuscated_iex_commandline.yml
proc_creation_win_invoke_obfuscation_stdin.yml
proc_creation_win_invoke_obfuscation_var.yml
proc_creation_win_invoke_obfuscation_via_compress.yml
proc_creation_win_invoke_obfuscation_via_rundll.yml
proc_creation_win_invoke_obfuscation_via_stdin.yml
proc_creation_win_invoke_obfuscation_via_use_clip.yml
proc_creation_win_invoke_obfuscation_via_use_mhsta.yml
proc_creation_win_invoke_obfuscation_via_use_rundll32.yml
proc_creation_win_invoke_obfuscation_via_var.yml
proc_creation_win_lethalhta.yml
proc_creation_win_lobas_aspnet_compiler.yml
proc_creation_win_lobas_bash.yml
proc_creation_win_local_system_owner_account_discovery.yml
proc_creation_win_logmein.yml
proc_creation_win_logon_scripts_userinitmprlogonscript_proc.yml
proc_creation_win_lolbas_configsecuritypolicy.yml
proc_creation_win_lolbas_data_exfiltration_by_using_datasvcutil.yml
proc_creation_win_lolbas_diantz_ads.yml
proc_creation_win_lolbas_diantz_remote_cab.yml
proc_creation_win_lolbas_execution_of_wuauclt.yml
proc_creation_win_lolbas_extexport.yml
proc_creation_win_lolbas_extrac32.yml
proc_creation_win_lolbas_extrac32_ads.yml
proc_creation_win_lolbin_cscript_gathernetworkinfo.yml
proc_creation_win_lolbin_execution_via_winget.yml
proc_creation_win_lolbin_wlrmdr.yml
proc_creation_win_lolbins_by_office_applications.yml
proc_creation_win_lolbins_suspicious_driver_installed_by_pnputil.yml
proc_creation_win_lolbins_with_wmiprvse_parent_process.yml
proc_creation_win_long_powershell_commandline.yml
proc_creation_win_lsass_dump.yml
proc_creation_win_mailboxexport_share.yml
proc_creation_win_mal_adwind.yml
proc_creation_win_mal_blue_mockingbird.yml
proc_creation_win_mal_darkside_ransomware.yml
proc_creation_win_mal_hermetic_wiper_activity.yml
proc_creation_win_mal_lockergoga_ransomware.yml
proc_creation_win_mal_ryuk.yml
proc_creation_win_malware_conti.yml
proc_creation_win_malware_conti_7zip.yml
proc_creation_win_malware_conti_shadowcopy.yml
proc_creation_win_malware_dridex.yml
proc_creation_win_malware_dtrack.yml
proc_creation_win_malware_emotet.yml
proc_creation_win_malware_formbook.yml
proc_creation_win_malware_notpetya.yml
proc_creation_win_malware_qbot.yml
proc_creation_win_malware_ryuk.yml
proc_creation_win_malware_script_dropper.yml
proc_creation_win_malware_trickbot_recon_activity.yml
proc_creation_win_malware_trickbot_wermgr.yml
proc_creation_win_malware_wannacry.yml
proc_creation_win_manage_bde_lolbas.yml
proc_creation_win_mavinject_proc_inj.yml
proc_creation_win_meterpreter_or_cobaltstrike_getsystem_service_start.yml
proc_creation_win_mimikatz_command_line.yml
proc_creation_win_mmc20_lateral_movement.yml
proc_creation_win_mmc_spawn_shell.yml
proc_creation_win_modif_of_services_for_via_commandline.yml
proc_creation_win_monitoring_for_persistence_via_bits.yml
proc_creation_win_mouse_lock.yml
proc_creation_win_msdeploy.yml
proc_creation_win_msedge_minimized_download.yml
proc_creation_win_mshta_javascript.yml
proc_creation_win_mshta_spawn_shell.yml
proc_creation_win_msiexec_execute_dll.yml
proc_creation_win_msiexec_install_quiet.yml
proc_creation_win_mstsc.yml
proc_creation_win_multiple_suspicious_cli.yml
proc_creation_win_net_enum.yml
proc_creation_win_net_use_admin_share.yml
proc_creation_win_net_user_add.yml
proc_creation_win_netcat_execution.yml
proc_creation_win_netsh_allow_port_rdp.yml
proc_creation_win_netsh_fw_add.yml
proc_creation_win_netsh_fw_add_susp_image.yml
proc_creation_win_netsh_fw_enable_group_rule.yml
proc_creation_win_netsh_packet_capture.yml
proc_creation_win_netsh_port_fwd.yml
proc_creation_win_netsh_port_fwd_3389.yml
proc_creation_win_netsh_wifi_credential_harvesting.yml
proc_creation_win_network_sniffing.yml
proc_creation_win_new_service_creation.yml
proc_creation_win_nltest_recon.yml
proc_creation_win_non_interactive_powershell.yml
proc_creation_win_non_priv_reg_or_ps.yml
proc_creation_win_office_applications_spawning_wmi_commandline.yml
proc_creation_win_office_from_proxy_executing_regsvr32_payload.yml
proc_creation_win_office_from_proxy_executing_regsvr32_payload2.yml
proc_creation_win_office_shell.yml
proc_creation_win_office_spawn_exe_from_users_directory.yml
proc_creation_win_office_spawning_wmi_commandline.yml
proc_creation_win_outlook_shell.yml
proc_creation_win_pingback_backdoor.yml
proc_creation_win_plugx_susp_exe_locations.yml
proc_creation_win_possible_applocker_bypass.yml
proc_creation_win_possible_privilege_escalation_via_service_reg_perm.yml
proc_creation_win_powershell_amsi_bypass.yml
proc_creation_win_powershell_audio_capture.yml
proc_creation_win_powershell_b64_shellcode.yml
proc_creation_win_powershell_bitsjob.yml
proc_creation_win_powershell_cmdline_reversed_strings.yml
proc_creation_win_powershell_cmdline_special_characters.yml
proc_creation_win_powershell_cmdline_specific_comb_methods.yml
proc_creation_win_powershell_defender_disable_feature.yml
proc_creation_win_powershell_defender_exclusion.yml
proc_creation_win_powershell_disable_windef_av.yml
proc_creation_win_powershell_dll_execution.yml
proc_creation_win_powershell_downgrade_attack.yml
proc_creation_win_powershell_download.yml
proc_creation_win_powershell_download_patterns.yml
proc_creation_win_powershell_frombase64string.yml
proc_creation_win_powershell_reverse_shell_connection.yml
proc_creation_win_powershell_suspicious_parameter_variation.yml
proc_creation_win_powershell_xor_commandline.yml
proc_creation_win_powersploit_empire_schtasks.yml
proc_creation_win_proc_dump_createdump.yml
proc_creation_win_proc_dump_rdrleakdiag.yml
proc_creation_win_proc_wrong_parent.yml
proc_creation_win_procdump.yml
proc_creation_win_procdump_evasion.yml
proc_creation_win_process_dump_rdrleakdiag.yml
proc_creation_win_process_dump_rundll32_comsvcs.yml
proc_creation_win_protocolhandler_suspicious_file.yml
proc_creation_win_proxy_execution_wuauclt.yml
proc_creation_win_psexesvc_start.yml
proc_creation_win_public_folder_parent.yml
proc_creation_win_purplesharp_indicators.yml
proc_creation_win_pypykatz.yml
proc_creation_win_query_registry.yml
proc_creation_win_ransom_blackbyte.yml
proc_creation_win_rasautou_dll_execution.yml
proc_creation_win_rdp_hijack_shadowing.yml
proc_creation_win_redirect_to_stream.yml
proc_creation_win_redmimicry_winnti_proc.yml
proc_creation_win_reg_add_run_key.yml
proc_creation_win_reg_defender_exclusion.yml
proc_creation_win_reg_dump_sam.yml
proc_creation_win_reg_service_imagepath_change.yml
proc_creation_win_regedit_export_critical_keys.yml
proc_creation_win_regedit_export_keys.yml
proc_creation_win_regedit_import_keys.yml
proc_creation_win_regedit_import_keys_ads.yml
proc_creation_win_regini.yml
proc_creation_win_regini_ads.yml
proc_creation_win_remote_powershell_session_process.yml
proc_creation_win_remote_time_discovery.yml
proc_creation_win_remove_windows_defender_definition_files.yml
proc_creation_win_renamed_binary.yml
proc_creation_win_renamed_binary_highly_relevant.yml
proc_creation_win_renamed_jusched.yml
proc_creation_win_renamed_megasync.yml
proc_creation_win_renamed_paexec.yml
proc_creation_win_renamed_powershell.yml
proc_creation_win_renamed_procdump.yml
proc_creation_win_renamed_psexec.yml
proc_creation_win_renamed_whoami.yml
proc_creation_win_root_certificate_installed.yml
proc_creation_win_run_executable_invalid_extension.yml
proc_creation_win_run_from_zip.yml
proc_creation_win_run_powershell_script_from_ads.yml
proc_creation_win_run_powershell_script_from_input_stream.yml
proc_creation_win_run_virtualbox.yml
proc_creation_win_rundll32_not_from_c_drive.yml
proc_creation_win_rundll32_registered_com_objects.yml
proc_creation_win_rundll32_without_parameters.yml
proc_creation_win_screenconnect.yml
proc_creation_win_screenconnect_anomaly.yml
proc_creation_win_script_event_consumer_spawn.yml
proc_creation_win_sdbinst_shim_persistence.yml
proc_creation_win_sdclt_child_process.yml
proc_creation_win_sdelete.yml
proc_creation_win_service_execution.yml
proc_creation_win_service_stop.yml
proc_creation_win_set_policies_to_unsecure_level.yml
proc_creation_win_shadow_copies_access_symlink.yml
proc_creation_win_shadow_copies_creation.yml
proc_creation_win_shadow_copies_deletion.yml
proc_creation_win_shell_spawn_by_java.yml
proc_creation_win_shell_spawn_mshta.yml
proc_creation_win_shell_spawn_susp_program.yml
proc_creation_win_silenttrinity_stage_use.yml
proc_creation_win_software_discovery.yml
proc_creation_win_soundrec_audio_capture.yml
proc_creation_win_spn_enum.yml
proc_creation_win_sqlcmd_veeam_dump.yml
proc_creation_win_sticky_keys_unauthenticated_privileged_cmd_access.yml
proc_creation_win_stickykey_like_backdoor.yml
proc_creation_win_stordiag_execution.yml
proc_creation_win_sus_auditpol_usage.yml
proc_creation_win_susp_7z.yml
proc_creation_win_susp_acccheckconsole.yml
proc_creation_win_susp_add_user_remote_desktop.yml
proc_creation_win_susp_adfind.yml
proc_creation_win_susp_adfind_enumerate.yml
proc_creation_win_susp_adidnsdump.yml
proc_creation_win_susp_advancedrun.yml
proc_creation_win_susp_advancedrun_priv_user.yml
proc_creation_win_susp_atbroker.yml
proc_creation_win_susp_athremotefxvgpudisablementcommand.yml
proc_creation_win_susp_bcdedit.yml
proc_creation_win_susp_bginfo.yml
proc_creation_win_susp_bitstransfer.yml
proc_creation_win_susp_calc.yml
proc_creation_win_susp_cdb.yml
proc_creation_win_susp_certreq_download.yml
proc_creation_win_susp_certutil_command.yml
proc_creation_win_susp_certutil_encode.yml
proc_creation_win_susp_char_in_cmd.yml
proccreation_win_susp_child_process_as_system.yml
proc_creation_win_susp_cipher.yml
proc_creation_win_susp_cli_escape.yml
proc_creation_win_susp_cmd_http_appdata.yml
proc_creation_win_susp_cmd_shadowcopy_access.yml
proc_creation_win_susp_cmdl32_lolbas.yml
proc_creation_win_susp_codepage_switch.yml
proc_creation_win_susp_commands_recon_activity.yml
proc_creation_win_susp_compression_params.yml
proc_creation_win_susp_comsvcs_procdump.yml
proc_creation_win_susp_conhost.yml
proc_creation_win_susp_control_cve_2021_40444.yml
proc_creation_win_susp_control_dll_load.yml
proc_creation_win_susp_copy_lateral_movement.yml
proc_creation_win_susp_copy_system32.yml
proc_creation_win_susp_covenant.yml
proc_creation_win_susp_crackmapexec_execution.yml
proc_creation_win_susp_crackmapexec_flags.yml
proc_creation_win_susp_crackmapexec_powershell_obfuscation.yml
proc_creation_win_susp_csc.yml
proc_creation_win_susp_csc_folder.yml
proc_creation_win_susp_cscript_vbs.yml
proc_creation_win_susp_csi.yml
proc_creation_win_susp_curl_download.yml
proc_creation_win_susp_curl_fileupload.yml
proc_creation_win_susp_curl_start_combo.yml
proc_creation_win_susp_curl_useragent.yml
proc_creation_win_susp_dctask64_proc_inject.yml
proc_creation_win_susp_del.yml
proc_creation_win_susp_desktopimgdownldr.yml
proc_creation_win_susp_devinit_lolbin.yml
proc_creation_win_susp_devtoolslauncher.yml
proc_creation_win_susp_dir.yml
proc_creation_win_susp_direct_asep_reg_keys_modification.yml
proc_creation_win_susp_disable_eventlog.yml
proc_creation_win_susp_disable_ie_features.yml
proc_creation_win_susp_disable_raccine.yml
proc_creation_win_susp_diskshadow.yml
proc_creation_win_susp_ditsnap.yml
proc_creation_win_susp_dnx.yml
proc_creation_win_susp_double_extension.yml
proc_creation_win_susp_download_office_domain.yml
proc_creation_win_susp_dtrace_kernel_dump.yml
proc_creation_win_susp_dxcap.yml
proc_creation_win_susp_emotet_rundll32_execution.yml
proc_creation_win_susp_esentutl_params.yml
proc_creation_win_susp_eventlog_clear.yml
proc_creation_win_susp_execution_path.yml
proc_creation_win_susp_execution_path_webserver.yml
proc_creation_win_susp_explorer.yml
proc_creation_win_susp_explorer_break_proctree.yml
proc_creation_win_susp_explorer_nouaccheck.yml
proc_creation_win_susp_file_characteristics.yml
proc_creation_win_susp_file_download_via_gfxdownloadwrapper.yml
proc_creation_win_susp_findstr.yml
proc_creation_win_susp_findstr_385201.yml
proc_creation_win_susp_findstr_lnk.yml
proc_creation_win_susp_finger_usage.yml
proc_creation_win_susp_firewall_disable.yml
proc_creation_win_susp_format.yml
proc_creation_win_susp_fsutil_usage.yml
proc_creation_win_susp_ftp.yml
proc_creation_win_susp_gup.yml
proc_creation_win_susp_hostname.yml
proc_creation_win_susp_image_missing.yml
proc_creation_win_susp_instalutil.yml
proc_creation_win_susp_iss_module_install.yml
proc_creation_win_susp_lsass_clone.yml
proc_creation_win_susp_machineguid.yml
proc_creation_win_susp_mounted_share_deletion.yml
proc_creation_win_susp_mpcmdrun_download.yml
proc_creation_win_susp_mpiexec_lolbin.yml
proc_creation_win_susp_mshta_execution.yml
proc_creation_win_susp_mshta_pattern.yml
proc_creation_win_susp_msiexec_cwd.yml
proc_creation_win_susp_msiexec_web_install.yml
proc_creation_win_susp_msoffice.yml
proc_creation_win_susp_net_execution.yml
proc_creation_win_susp_net_use_password_plaintext.yml
proc_creation_win_susp_netsh_command.yml
proc_creation_win_susp_netsh_dll_persistence.yml
proc_creation_win_susp_network_command.yml
proc_creation_win_susp_network_listing_connections.yml
proc_creation_win_susp_ngrok_pua.yml
proc_creation_win_susp_nmap.yml
proc_creation_win_susp_non_exe_image.yml
proc_creation_win_susp_nt_resource_kit_auditpol_usage.yml
proc_creation_win_susp_ntdsutil.yml
proc_creation_win_susp_odbcconf.yml
proc_creation_win_susp_openwith.yml
proc_creation_win_susp_outlook.yml
proc_creation_win_susp_outlook_temp.yml
proc_creation_win_susp_pcwutl.yml
proc_creation_win_susp_pester.yml
proc_creation_win_susp_ping_hex_ip.yml
proc_creation_win_susp_plink_remote_forward.yml
proc_creation_win_susp_powershell_empire_launch.yml
proc_creation_win_susp_powershell_empire_uac_bypass.yml
proc_creation_win_susp_powershell_enc_cmd.yml
proc_creation_win_susp_powershell_encode.yml
proc_creation_win_susp_powershell_encoded_param.yml
proc_creation_win_susp_powershell_getprocess_lsass.yml
proc_creation_win_susp_powershell_hidden_b64_cmd.yml
proc_creation_win_susp_powershell_parent_combo.yml
proc_creation_win_susp_powershell_parent_process.yml
proc_creation_win_susp_powershell_sam_access.yml
proc_creation_win_susp_pressynkey_lolbin.yml
proc_creation_win_susp_print.yml
proc_creation_win_susp_procdump.yml
proc_creation_win_susp_procdump_lsass.yml
proc_creation_win_susp_progname.yml
proc_creation_win_susp_ps_appdata.yml
proc_creation_win_susp_ps_downloadfile.yml
proc_creation_win_susp_psexec_eula.yml
proc_creation_win_susp_psexex_paexec_escalate_system.yml
proc_creation_win_susp_psexex_paexec_flags.yml
proc_creation_win_susp_psloglist.yml
proc_creation_win_susp_psr_capture_screenshots.yml
proc_creation_win_susp_radmin.yml
proc_creation_win_susp_rar_flags.yml
proc_creation_win_susp_rasdial_activity.yml
proc_creation_win_susp_razorinstaller_explorer.yml
proc_creation_win_susp_rclone_execution.yml
proc_creation_win_susp_recon.yml
proc_creation_win_susp_recon_activity.yml
proc_creation_win_susp_recon_net_activity.yml
proc_creation_win_susp_redir_local_admin_share.yml
proc_creation_win_susp_reg_bitlocker.yml
proc_creation_win_susp_reg_disable_sec_services.yml
proc_creation_win_susp_reg_open_command.yml
proc_creation_win_susp_regedit_trustedinstaller.yml
proc_creation_win_susp_register_cimprovider.yml
proc_creation_win_susp_registration_via_cscript.yml
proc_creation_win_susp_regsvr32_anomalies.yml
proc_creation_win_susp_regsvr32_flags_anomaly.yml
proc_creation_win_susp_regsvr32_http_pattern.yml
proc_creation_win_susp_regsvr32_image.yml
proc_creation_win_susp_regsvr32_no_dll.yml
proc_creation_win_susp_renamed_dctask64.yml
proc_creation_win_susp_renamed_debugview.yml
proc_creation_win_susp_renamed_paexec.yml
proc_creation_win_susp_rpcping.yml
proc_creation_win_susp_run_folder.yml
proc_creation_win_susp_run_locations.yml
proc_creation_win_susp_rundll32_activity.yml
proc_creation_win_susp_rundll32_by_ordinal.yml
proc_creation_win_susp_rundll32_inline_vbs.yml
proc_creation_win_susp_rundll32_js_runhtmlapplication.yml
proc_creation_win_susp_rundll32_no_params.yml
proc_creation_win_susp_rundll32_script_run.yml
proc_creation_win_susp_rundll32_setupapi_installhinfsection.yml
proc_creation_win_susp_rundll32_sys.yml
proc_creation_win_susp_runonce_execution.yml
proc_creation_win_susp_runscripthelper.yml
proc_creation_win_susp_sc_query.yml
proc_creation_win_susp_schtask_creation.yml
proc_creation_win_susp_schtask_creation_temp_folder.yml
proc_creation_win_susp_schtasks_disable.yml
proc_creation_win_susp_schtasks_env_folder.yml
proc_creation_win_susp_schtasks_parent.yml
proc_creation_win_susp_schtasks_pattern.yml
proc_creation_win_susp_schtasks_user_temp.yml
proc_creation_win_susp_screenconnect_access.yml
proc_creation_win_susp_screensaver_reg.yml
proc_creation_win_susp_script_exec_from_env_folder.yml
proc_creation_win_susp_script_exec_from_temp.yml
proc_creation_win_susp_script_execution.yml
proc_creation_win_susp_service_dacl_modification.yml
proc_creation_win_susp_service_dir.yml
proc_creation_win_susp_service_modification.yml
proc_creation_win_susp_service_path_modification.yml
proc_creation_win_susp_servu_exploitation_cve_2021_35211.yml
proc_creation_win_susp_servu_process_pattern.yml
proc_creation_win_susp_sharpview.yml
proc_creation_win_susp_shell_spawn_by_java.yml
proc_creation_win_susp_shell_spawn_by_java_keytool.yml
proc_creation_win_susp_shell_spawn_from_mssql.yml
proc_creation_win_susp_shell_spawn_from_winrm.yml
proc_creation_win_susp_shimcache_flush.yml
proc_creation_win_susp_shutdown.yml
proc_creation_win_susp_splwow64.yml
proc_creation_win_susp_spoolsv_child_processes.yml
proc_creation_win_susp_sqldumper_activity.yml
proc_creation_win_susp_squirrel_lolbin.yml
proc_creation_win_susp_svchost.yml
proc_creation_win_susp_svchost_no_cli.yml
proc_creation_win_susp_sysprep_appdata.yml
proc_creation_win_susp_system_user_anomaly.yml
proc_creation_win_susp_systeminfo.yml
proc_creation_win_susp_sysvol_access.yml
proc_creation_win_susp_takeown.yml
proc_creation_win_susp_target_location_shell32.yml
proc_creation_win_susp_taskkill.yml
proc_creation_win_susp_tasklist_command.yml
proc_creation_win_susp_taskmgr_localsystem.yml
proc_creation_win_susp_taskmgr_parent.yml
proc_creation_win_susp_tracker_execution.yml
proc_creation_win_susp_trolleyexpress_procdump.yml
proc_creation_win_susp_tscon_localsystem.yml
proc_creation_win_susp_tscon_rdp_redirect.yml
proc_creation_win_susp_uac_bypass_trustedpath.yml
proc_creation_win_susp_use_of_csharp_console.yml
proc_creation_win_susp_use_of_sqlps_bin.yml
proc_creation_win_susp_use_of_sqltoolsps_bin.yml
proc_creation_win_susp_use_of_te_bin.yml
proc_creation_win_susp_use_of_vsjitdebugger_bin.yml
proc_creation_win_susp_userinit_child.yml
proc_creation_win_susp_vboxdrvinst.yml
proc_creation_win_susp_vbscript_unc2452.yml
proc_creation_win_susp_volsnap_disable.yml
proc_creation_win_susp_web_request_cmd.yml
proc_creation_win_susp_webdav_client_execution.yml
proc_creation_win_susp_where_execution.yml
proc_creation_win_susp_whoami.yml
proc_creation_win_susp_whoami_anomaly.yml
proc_creation_win_susp_whoami_as_param.yml
proc_creation_win_susp_winrar_dmp.yml
proc_creation_win_susp_winrar_execution.yml
proc_creation_win_susp_winrm_awl_bypass.yml
proc_creation_win_susp_winrm_execution.yml
proc_creation_win_susp_winzip.yml
proc_creation_win_susp_wmi_execution.yml
proc_creation_win_susp_wmic_eventconsumer_create.yml
proc_creation_win_susp_wmic_proc_create_rundll32.yml
proc_creation_win_susp_wmic_security_product_uninstall.yml
proc_creation_win_susp_workfolders.yml
proc_creation_win_susp_wsl_lolbin.yml
proc_creation_win_susp_wuauclt.yml
proc_creation_win_susp_wuauclt_cmdline.yml
proc_creation_win_susp_zip_compress.yml
proc_creation_win_susp_zipexec.yml
proc_creation_win_suspicious_ad_reco.yml
proc_creation_win_syncappvpublishingserver_execute_powershell.yml
proc_creation_win_syncappvpublishingserver_vbs_execute_powershell.yml
proc_creation_win_sysinternals_eula_accepted.yml
proc_creation_win_sysmon_driver_unload.yml
proc_creation_win_sysmon_uac_bypass_eventvwr.yml
proc_creation_win_system_exe_anomaly.yml
proc_creation_win_tap_installer_execution.yml
proc_creation_win_task_folder_evasion.yml
proc_creation_win_termserv_proc_spawn.yml
proc_creation_win_tool_nircmd.yml
proc_creation_win_tool_nircmd_as_system.yml
proc_creation_win_tool_nsudo_as_system.yml
proc_creation_win_tool_psexec.yml
proc_creation_win_tool_runx_as_system.yml
proc_creation_win_tools_relay_attacks.yml
proc_creation_win_tor_browser.yml
proc_creation_win_trust_discovery.yml
proc_creation_win_tttracer_mod_load.yml
proc_creation_win_uac_bypass_changepk_slui.yml
proc_creation_win_uac_bypass_cleanmgr.yml
proc_creation_win_uac_bypass_computerdefaults.yml
proc_creation_win_uac_bypass_consent_comctl32.yml
proc_creation_win_uac_bypass_dismhost.yml
proc_creation_win_uac_bypass_ieinstal.yml
proc_creation_win_uac_bypass_msconfig_gui.yml
proc_creation_win_uac_bypass_ntfs_reparse_point.yml
proc_creation_win_uac_bypass_pkgmgr_dism.yml
proc_creation_win_uac_bypass_winsat.yml
proc_creation_win_uac_bypass_wmp.yml
proc_creation_win_uac_bypass_wsreset.yml
proc_creation_win_uac_cmstp.yml
proc_creation_win_uac_fodhelper.yml
proc_creation_win_uac_wsreset.yml
proc_creation_win_uninstall_crowdstrike_falcon.yml
proc_creation_win_uninstall_sysmon.yml
proc_creation_win_using_sc_to_change_sevice_image_path_by_non_admin.yml
proc_creation_win_using_sc_to_hide_sevices.yml
proc_creation_win_using_settingsynchost_as_lolbin.yml
proc_creation_win_verclsid_runs_com.yml
proc_creation_win_visual_basic_compiler.yml
proc_creation_win_vmtoolsd_susp_child_process.yml
proc_creation_win_vul_java_remote_debugging.yml
proc_creation_win_webshell_detection.yml
proc_creation_win_webshell_recon_detection.yml
proc_creation_win_webshell_spawn.yml
proc_creation_win_whoami_as_priv_user.yml
proc_creation_win_whoami_as_system.yml
proc_creation_win_whoami_priv.yml
proc_creation_win_win10_sched_task_0day.yml
proc_creation_win_win_exchange_transportagent.yml
proc_creation_win_win_lolbas_dump64.yml
proc_creation_win_winword_dll_load.yml
proc_creation_win_wmi_backdoor_exchange_transport_agent.yml
proc_creation_win_wmi_persistence_script_event_consumer.yml
proc_creation_win_wmi_spwns_powershell.yml
proc_creation_win_wmic_reconnaissance.yml
proc_creation_win_wmic_remote_service.yml
proc_creation_win_wmic_remove_application.yml
proc_creation_win_wmiprvse_spawning_process.yml
proc_creation_win_workflow_compiler.yml
proc_creation_win_write_protect_for_storage_disabled.yml
proc_creation_win_wsreset_uac_bypass.yml
proc_creation_win_xordump.yml
proc_creation_win_xsl_script_processing.yml
APT
proc_creation_win_apt_actinium_persistence.yml
title: Scheduled Task WScript VBScript
id: e1118a8f-82f5-44b3-bb6b-8a284e5df602
status: experimental
description: Detects specific process parameters as used by ACTINIUM scheduled task persistence creation.
author: Andreas Hunkeler (@Karneades)
references:
- https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainian-organizations
date: 2022/02/07
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'schtasks'
- 'create'
- 'wscript'
- 'e:vbscript'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: high
proc_creation_win_apt_apt29_thinktanks.yml
title: APT29
id: 033fe7d6-66d1-4240-ac6b-28908009c71f
status: test
description: This method detects a suspicious PowerShell command line combination as used by APT29 in a campaign against U.S. think tanks.
author: Florian Roth
references:
- https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
- https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html
date: 2018/12/04
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- '-noni'
- '-ep'
- 'bypass'
- '$'
condition: selection
falsepositives:
- unknown
level: critical
tags:
- attack.execution
- attack.g0016
- attack.t1059.001
proc_creation_win_apt_babyshark.yml
title: Baby Shark Activity
id: 2b30fa36-3a18-402f-a22d-bf4ce2189f35
status: test
description: Detects activity that could be related to Baby Shark malware
author: Florian Roth
references:
- https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/
date: 2019/02/24
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default"
- powershell.exe mshta.exe http*
- cmd.exe /c taskkill /im cmd.exe
condition: selection
falsepositives:
- unknown
level: high
tags:
- attack.execution
- attack.t1059.003
- attack.t1059.001
- attack.discovery
- attack.t1012
- attack.defense_evasion
- attack.t1218.005
proc_creation_win_apt_bear_activity_gtr19.yml
title: Judgement Panda Credential Access Activity
id: b83f5166-9237-4b5e-9cd4-7b5d52f4d8ee
status: test
description: Detects Russian group activity as described in Global Threat Report 2019 by Crowdstrike
author: Florian Roth
references:
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
date: 2019/02/21
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\xcopy.exe'
CommandLine|contains|all:
- '/S'
- '/E'
- '/C'
- '/Q'
- '/H'
- '\\'
selection2:
Image|endswith: '\adexplorer.exe'
CommandLine|contains|all:
- '-snapshot'
- '""'
- 'c:\users\'
condition: selection1 or selection2
falsepositives:
- unknown
level: critical
tags:
- attack.credential_access
- attack.t1552.001
- attack.t1003.003
proc_creation_win_apt_bluemashroom.yml
title: BlueMashroom DLL Load
id: bd70d3f8-e60e-4d25-89f0-0b5a9cff20e0
status: test
description: Detects a suspicious DLL loading from AppData Local path as described in BlueMashroom report
author: Florian Roth, Tim Shelton
references:
- https://www.virusbulletin.com/conference/vb2019/abstracts/apt-cases-exploiting-vulnerabilities-region-specific-software
date: 2019/10/02
modified: 2022/03/02
logsource:
category: process_creation
product: windows
detection:
selection:
- CommandLine|contains|all:
- '\regsvr32'
- '\AppData\Local\'
- CommandLine|contains|all:
- '\AppData\Local\'
- ',DllEntry'
filter_1:
- CommandLine|contains: 'AppData\Local\Microsoft\TeamsMeetingAddin\'
- CommandLine|endswith:
- '\x86\Microsoft.Teams.AddinLoader.dll'
- '\x86\Microsoft.Teams.AddinLoader.dll"'
- '\x64\Microsoft.Teams.AddinLoader.dll'
- '\x64\Microsoft.Teams.AddinLoader.dll"'
condition: selection and not 1 of filter*
falsepositives:
- Unlikely
level: critical
tags:
- attack.defense_evasion
- attack.t1218.010
proc_creation_win_apt_chafer_mar18.yml
title: Chafer Activity
id: ce6e34ca-966d-41c9-8d93-5b06c8b97a06
related:
- id: 53ba33fd-3a50-4468-a5ef-c583635cfa92
type: derived
description: Detects Chafer activity attributed to OilRig as reported in Nyotron report in March 2018
status: experimental
references:
- https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
tags:
- attack.persistence
- attack.g0049
- attack.t1053.005
- attack.s0111
- attack.t1543.003
- attack.defense_evasion
- attack.t1112
- attack.command_and_control
- attack.t1071.004
date: 2018/03/23
modified: 2021/09/19
author: Florian Roth, Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
logsource:
category: process_creation
product: windows
detection:
selection_process0:
CommandLine|contains: '\Service.exe'
CommandLine|endswith:
- 'i'
- 'u'
selection_process1:
- CommandLine|endswith: '\microsoft\Taskbar\autoit3.exe'
- CommandLine|startswith: 'C:\wsc.exe'
selection_process2:
Image|contains: '\Windows\Temp\DB\'
Image|endswith: '.exe'
selection_process3:
CommandLine|contains|all:
- '\nslookup.exe'
- '-q=TXT'
ParentImage|contains: '\Autoit'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
proc_creation_win_apt_cloudhopper.yml
title: WMIExec VBS Script
id: 966e4016-627f-44f7-8341-f394905c361f
status: test
description: Detects suspicious file execution by wscript and cscript
author: Florian Roth
references:
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
date: 2017/04/07
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\cscript.exe'
CommandLine|contains|all:
- '.vbs'
- '/shell'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: critical
tags:
- attack.execution
- attack.g0045
- attack.t1059.005
proc_creation_win_apt_dragonfly.yml
title: CrackMapExecWin
id: 04d9079e-3905-4b70-ad37-6bdf11304965
status: test
description: Detects CrackMapExecWin Activity as Described by NCSC
author: Markus Neis
references:
- https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control
- https://attack.mitre.org/software/S0488/
date: 2018/04/08
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\crackmapexec.exe'
condition: selection
falsepositives:
- None
level: critical
tags:
- attack.g0035
- attack.credential_access
- attack.discovery
- attack.t1110
- attack.t1087
proc_creation_win_apt_elise.yml
title: Elise Backdoor
id: e507feb7-5f73-4ef6-a970-91bb6f6d744f
status: test
description: Detects Elise backdoor acitivty as used by APT32
author: Florian Roth
references:
- https://community.rsa.com/community/products/netwitness/blog/2018/02/13/lotus-blossom-continues-asean-targeting
date: 2018/01/31
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
Image: 'C:\Windows\SysWOW64\cmd.exe'
CommandLine|contains: '\Windows\Caches\NavShExt.dll '
selection2:
CommandLine|endswith: '\AppData\Roaming\MICROS~1\Windows\Caches\NavShExt.dll,Setting'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
tags:
- attack.g0030
- attack.g0050
- attack.s0081
- attack.execution
- attack.t1059.003
proc_creation_win_apt_emissarypanda_sep19.yml
title: Emissary Panda Malware SLLauncher
id: 9aa01d62-7667-4d3b-acb8-8cb5103e2014
status: test
description: Detects the execution of DLL side-loading malware used by threat group Emissary Panda aka APT27
author: Florian Roth
references:
- https://app.any.run/tasks/579e7587-f09d-4aae-8b07-472833262965
- https://twitter.com/cyb3rops/status/1168863899531132929
date: 2018/09/03
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\sllauncher.exe'
Image|endswith: '\svchost.exe'
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.defense_evasion
- attack.t1574.002
proc_creation_win_apt_empiremonkey.yml
title: Empire Monkey
id: 10152a7b-b566-438f-a33c-390b607d1c8d
status: test
description: Detects EmpireMonkey APT reported Activity
author: Markus Neis
references:
- https://app.any.run/tasks/a4107649-8cb0-41af-ad75-113152d4d57b
date: 2019/04/02
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection_cutil:
CommandLine|endswith: '/i:%APPDATA%\logs.txt scrobj.dll'
Image|endswith: '\cutil.exe'
selection_regsvr32:
CommandLine|endswith: '/i:%APPDATA%\logs.txt scrobj.dll'
Description: 'Microsoft(C) Registerserver'
condition: 1 of selection*
falsepositives:
- Very Unlikely
level: critical
tags:
- attack.defense_evasion
- attack.t1218.010
proc_creation_win_apt_equtiongroup_dll_u_load.yml
title: Equation Group DLL_U Load
id: d465d1d8-27a2-4cca-9621-a800f37cf72e
status: test
description: Detects a specific tool and export used by EquationGroup
author: Florian Roth
references:
- https://github.com/adamcaudill/EquationGroupLeak/search?utf8=%E2%9C%93&q=dll_u&type=
- https://securelist.com/apt-slingshot/84312/
- https://twitter.com/cyb3rops/status/972186477512839170
date: 2019/03/04
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\rundll32.exe'
CommandLine|endswith: ',dll_u'
selection2:
CommandLine|contains: ' -export dll_u '
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
tags:
- attack.g0020
- attack.defense_evasion
- attack.t1218.011
proc_creation_win_apt_evilnum_jul20.yml
title: EvilNum Golden Chickens Deployment via OCX Files
id: 8acf3cfa-1e8c-4099-83de-a0c4038e18f0
status: test
description: Detects Golden Chickens deployment method as used by Evilnum in report published in July 2020
author: Florian Roth
references:
- https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/
- https://app.any.run/tasks/33d37fdf-158d-4930-aa68-813e1d5eb8ba/
date: 2020/07/10
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'regsvr32'
- '/s'
- '/i'
- '\AppData\Roaming\'
- '.ocx'
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.defense_evasion
- attack.t1218.011
proc_creation_win_apt_gallium.yml
title: GALLIUM Artefacts
id: 18739897-21b1-41da-8ee4-5b786915a676
related:
- id: 440a56bf-7873-4439-940a-1c8a671073c2
type: derived
status: experimental
description: Detects artefacts associated with activity group GALLIUM - Microsoft Threat Intelligence Center indicators released in December 2019.
author: Tim Burrell
date: 2020/02/07
modified: 2021/09/19
references:
- https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)
tags:
- attack.credential_access
- attack.t1212
- attack.command_and_control
- attack.t1071
logsource:
product: windows
category: process_creation
detection:
legitimate_process_path:
Image|contains:
- ':\Program Files(x86)\'
- ':\Program Files\'
legitimate_executable:
sha1:
- 'e570585edc69f9074cb5e8a790708336bd45ca0f'
condition: legitimate_executable and not legitimate_process_path
falsepositives:
- unknown
level: high
proc_creation_win_apt_gallium_sha1.yml
title: GALLIUM Artefacts
id: 440a56bf-7873-4439-940a-1c8a671073c2
status: experimental
description: Detects artefacts associated with activity group GALLIUM - Microsoft Threat Intelligence Center indicators released in December 2019.
author: Tim Burrell
date: 2020/02/07
modified: 2021/09/19
references:
- https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)
tags:
- attack.credential_access
- attack.t1212
- attack.command_and_control
- attack.t1071
logsource:
product: windows
category: process_creation
detection:
exec_selection:
sha1:
- '53a44c2396d15c3a03723fa5e5db54cafd527635'
- '9c5e496921e3bc882dc40694f1dcc3746a75db19'
- 'aeb573accfd95758550cf30bf04f389a92922844'
- '79ef78a797403a4ed1a616c68e07fff868a8650a'
- '4f6f38b4cec35e895d91c052b1f5a83d665c2196'
- '1e8c2cac2e4ce7cbd33c3858eb2e24531cb8a84d'
- 'e841a63e47361a572db9a7334af459ddca11347a'
- 'c28f606df28a9bc8df75a4d5e5837fc5522dd34d'
- '2e94b305d6812a9f96e6781c888e48c7fb157b6b'
- 'dd44133716b8a241957b912fa6a02efde3ce3025'
- '8793bf166cb89eb55f0593404e4e933ab605e803'
- 'a39b57032dbb2335499a51e13470a7cd5d86b138'
- '41cc2b15c662bc001c0eb92f6cc222934f0beeea'
- 'd209430d6af54792371174e70e27dd11d3def7a7'
- '1c6452026c56efd2c94cea7e0f671eb55515edb0'
- 'c6b41d3afdcdcaf9f442bbe772f5da871801fd5a'
- '4923d460e22fbbf165bbbaba168e5a46b8157d9f'
- 'f201504bd96e81d0d350c3a8332593ee1c9e09de'
- 'ddd2db1127632a2a52943a2fe516a2e7d05d70d2'
condition: exec_selection
falsepositives:
- unknown
level: high
proc_creation_win_apt_greenbug_may20.yml
title: Greenbug Campaign Indicators
id: 3711eee4-a808-4849-8a14-faf733da3612
status: experimental
description: Detects tools and process executions as observed in a Greenbug campaign in May 2020
references:
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia
author: Florian Roth
date: 2020/05/20
modified: 2021/09/21
tags:
- attack.g0049
- attack.execution
- attack.t1059.001
- attack.command_and_control
- attack.t1105
- attack.defense_evasion
- attack.t1036.005
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'bitsadmin'
- '/transfer'
- 'CSIDL_APPDATA'
selection2:
CommandLine|contains:
- 'CSIDL_SYSTEM_DRIVE'
selection3:
CommandLine|contains:
- '\msf.ps1'
- '8989 -e cmd.exe'
- 'system.Data.SqlClient.SqlDataAdapter($cmd); [void]$da.fill'
- '-nop -w hidden -c $k=new-object'
- '[Net.CredentialCache]::DefaultCredentials;IEX '
- ' -nop -w hidden -c $m=new-object net.webclient;$m'
- '-noninteractive -executionpolicy bypass whoami'
- '-noninteractive -executionpolicy bypass netstat -a'
- 'L3NlcnZlcj1' # base64 encoded '/server='
selection4:
Image|endswith:
- '\adobe\Adobe.exe'
- '\oracle\local.exe'
- '\revshell.exe'
- 'infopagesbackup\ncat.exe'
- 'CSIDL_SYSTEM\cmd.exe'
- '\programdata\oracle\java.exe'
- 'CSIDL_COMMON_APPDATA\comms\comms.exe'
- '\Programdata\VMware\Vmware.exe'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
proc_creation_win_apt_hafnium.yml
title: Exchange Exploitation Activity
id: bbb2dedd-a0e3-46ab-ba6c-6c82ae7a9aa7
description: Detects activity observed by different researchers to be HAFNIUM group activity (or related) on Exchange servers
author: Florian Roth
date: 2021/03/09
modified: 2021/03/16
status: experimental
references:
- https://blog.truesec.com/2021/03/07/exchange-zero-day-proxylogon-and-hafnium/
- https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
- https://discuss.elastic.co/t/detection-and-response-for-hafnium-activity/266289/3
- https://twitter.com/GadixCRK/status/1369313704869834753?s=20
- https://twitter.com/BleepinComputer/status/1372218235949617161
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'attrib'
- ' +h '
- ' +s '
- ' +r '
- '.aspx'
selection2:
CommandLine|contains|all:
- 'schtasks'
- 'VSPerfMon'
selection3:
CommandLine|contains|all:
- 'vssadmin list shadows'
- 'Temp\__output'
selection4:
CommandLine|contains: '%TEMP%\execute.bat'
selection5:
Image|endswith: 'Users\Public\opera\Opera_browser.exe'
selection6:
Image|endswith: 'Opera_browser.exe'
ParentImage|endswith:
- '\services.exe'
- '\svchost.exe'
selection7:
Image|contains: '\ProgramData\VSPerfMon\'
selection8:
CommandLine|contains|all:
- ' -t7z '
- 'C:\Programdata\pst'
- '\it.zip'
selection9:
Image|endswith: '\makecab.exe'
CommandLine|contains:
- 'Microsoft\Exchange Server\'
- 'inetpub\wwwroot'
selection10:
CommandLine|contains:
- '\Temp\xx.bat'
- 'Windows\WwanSvcdcs'
- 'Windows\Temp\cw.exe'
selection11:
CommandLine|contains|all:
- '\comsvcs.dll'
- 'Minidump'
- '\inetpub\wwwroot'
selection12:
CommandLine|contains|all:
- 'dsquery'
- ' -uco '
- '\inetpub\wwwroot'
condition: 1 of selection*
falsepositives:
- Unknown
level: high
tags:
- attack.persistence
- attack.t1546
- attack.t1053
proc_creation_win_apt_hurricane_panda.yml
title: Hurricane Panda Activity
id: 0eb2107b-a596-422e-b123-b389d5594ed7
status: test
description: Detects Hurricane Panda Activity
author: Florian Roth
references:
- https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/
date: 2019/03/04
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
- CommandLine|contains|all:
- 'localgroup'
- 'admin'
- '/add'
- CommandLine|contains:
- '\Win64.exe'
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
proc_creation_win_apt_judgement_panda_gtr19.yml
title: Judgement Panda Exfil Activity
id: 03e2746e-2b31-42f1-ab7a-eb39365b2422
status: test
description: Detects Judgement Panda activity as described in Global Threat Report 2019 by Crowdstrike
author: Florian Roth
references:
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
date: 2019/02/21
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
- CommandLine|endswith: 'eprod.ldf'
- CommandLine|contains:
- '\ldifde.exe -f -n '
- '\7za.exe a 1.7z '
- '\aaaa\procdump64.exe'
- '\aaaa\netsess.exe'
- '\aaaa\7za.exe'
- 'copy .\1.7z \'
- 'copy \\client\c$\aaaa\'
selection2:
Image: C:\Users\Public\7za.exe
condition: selection1 or selection2
falsepositives:
- unknown
level: critical
tags:
- attack.lateral_movement
- attack.g0010
- attack.credential_access
- attack.t1003.001
- attack.exfiltration
- attack.t1560.001
proc_creation_win_apt_ke3chang_regadd.yml
title: Ke3chang Registry Key Modifications
id: 7b544661-69fc-419f-9a59-82ccc328f205
status: test
description: Detects Registry modifications performed by Ke3chang malware in campaigns running in 2019 and 2020
author: Markus Neis, Swisscom
references:
- https://www.verfassungsschutz.de/embed/broschuere-2020-06-bfv-cyber-brief-2020-01.pdf
- https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/
date: 2020/06/18
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
# Ke3chang and TidePool both modify the IEHarden registry key, as well as the following list of keys.
# Setting these registry keys is unique to the Ke3chang and TidePool malware families.
# HKCU\Software\Microsoft\Internet Explorer\Main\Check_Associations
# HKCU\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize
# HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IEharden
CommandLine|contains:
- '-Property DWORD -name DisableFirstRunCustomize -value 2 -Force'
- '-Property String -name Check_Associations -value'
- '-Property DWORD -name IEHarden -value 0 -Force'
condition: selection1
falsepositives:
- Will need to be looked for combinations of those processes
level: critical
tags:
- attack.g0004
- attack.defense_evasion
- attack.t1562.001
proc_creation_wi_apt_lazarus_activity_apr21.yml
title: Lazarus Activity
id: 4a12fa47-c735-4032-a214-6fab5b120670
description: Detects different process creation events as described in Malwarebytes's threat report on Lazarus group activity
status: experimental
references:
- https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
tags:
- attack.g0032
- attack.execution
- attack.t1106
author: Bhabesh Raj
date: 2021/04/20
modified: 2021/06/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'mshta'
- '.zip'
selection2:
ParentImage:
- 'C:\Windows\System32\wbem\wmiprvse.exe'
Image:
- 'C:\Windows\System32\mshta.exe'
selection3:
ParentImage|contains:
- ':\Users\Public\'
Image:
- 'C:\Windows\System32\rundll32.exe'
condition: 1 of selection*
falsepositives:
- Should not be any false positives
level: critical
proc_creation_win_apt_lazarus_activity_dec20.yml
title: Lazarus Activity
id: 24c4d154-05a4-4b99-b57d-9b977472443a
description: Detects different process creation events as described in various threat reports on Lazarus group activity
status: experimental
references:
- https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
- https://www.hvs-consulting.de/lazarus-report/
tags:
- attack.g0032
- attack.execution
- attack.t1059
author: Florian Roth
date: 2020/12/23
modified: 2021/06/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'reg.exe save hklm\sam %temp%\~reg_sam.save'
- '1q2w3e4r@#$@#$@#$'
- ' -hp1q2w3e4 '
- '.dat data03 10000 -p '
selection2:
CommandLine|contains|all:
- 'process call create'
- ' > %temp%\~'
selection3:
CommandLine|contains|all:
- 'netstat -aon | find '
- ' > %temp%\~'
# Network share discovery
selection4:
CommandLine|contains:
- '.255 10 C:\ProgramData\'
condition: 1 of selection*
falsepositives:
- Overlap with legitimate process activity in some cases (especially selection 3 and 4)
level: critical
proc_creation_win_apt_lazarus_loader.yml
title: Lazarus Loaders
id: 7b49c990-4a9a-4e65-ba95-47c9cc448f6e
description: Detects different loaders as described in various threat reports on Lazarus group activity
status: experimental
references:
- https://www.hvs-consulting.de/lazarus-report/
- https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
tags:
- attack.g0032
- attack.execution
- attack.t1059
author: Florian Roth, wagga
date: 2020/12/23
modified: 2021/06/27
logsource:
category: process_creation
product: windows
detection:
selection_cmd1:
CommandLine|contains|all:
- 'cmd.exe /c '
- ' -p 0x'
selection_cmd2:
CommandLine|contains:
- 'C:\ProgramData\'
- 'C:\RECYCLER\'
selection_rundll1:
CommandLine|contains|all:
- 'rundll32.exe '
- 'C:\ProgramData\'
selection_rundll2:
CommandLine|contains:
- '.bin,'
- '.tmp,'
- '.dat,'
- '.io,'
- '.ini,'
- '.db,'
condition: ( selection_cmd1 and selection_cmd2 ) or ( selection_rundll1 and selection_rundll2 )
falsepositives:
- unknown
level: critical
proc_creation_win_apt_lazarus_session_highjack.yml
title: Lazarus Session Highjacker
id: 3f7f5b0b-5b16-476c-a85f-ab477f6dd24b
status: test
description: Detects executables launched outside their default directories as used by Lazarus Group (Bluenoroff)
author: Trent Liffick (@tliffick), Bartlomiej Czyz (@bczyz1)
references:
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
date: 2020/06/03
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\msdtc.exe'
- '\gpvc.exe'
filter:
Image|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\SysWOW64\'
condition: selection and not filter
falsepositives:
- unknown
level: high
tags:
- attack.defense_evasion
- attack.t1036.005
proc_creation_win_apt_muddywater_dnstunnel.yml
title: DNS Tunnel Technique from MuddyWater
id: 36222790-0d43-4fe8-86e4-674b27809543
status: test
description: Detecting DNS tunnel activity for Muddywater actor
author: '@caliskanfurkan_'
references:
- https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/
- https://www.vmray.com/analyses/5ad401c3a568/report/overview.html
date: 2020/06/04
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\powershell.exe'
ParentImage|endswith:
- '\excel.exe'
CommandLine|contains:
- 'DataExchange.dll'
condition: selection
falsepositives:
- Unknown
level: critical
tags:
- attack.command_and_control
- attack.t1071.004
proc_creation_win_apt_mustangpanda.yml
title: Mustang Panda Dropper
id: 2d87d610-d760-45ee-a7e6-7a6f2a65de00
status: test
description: Detects specific process parameters as used by Mustang Panda droppers
author: Florian Roth, oscd.community
references:
- https://app.any.run/tasks/7ca5661d-a67b-43ec-98c1-dd7a8103c256/
- https://app.any.run/tasks/b12cccf3-1c22-4e28-9d3e-c7a6062f3914/
- https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
date: 2019/10/30
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
- CommandLine|contains:
- 'Temp\wtask.exe /create'
- '%windir:~-3,1%%PUBLIC:~-9,1%'
- '/tn "Security Script '
- '%windir:~-1,1%'
- CommandLine|contains|all:
- '/E:vbscript'
- 'C:\Users\'
- '.txt'
- '/F'
selection2:
Image|endswith: 'Temp\winwsh.exe'
condition: 1 of selection*
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: high
tags:
- attack.t1587.001
- attack.resource_development
proc_creation_win_apt_pandemic.yml
title: Pandemic Registry Key
id: 9fefd33c-339d-4495-9cba-b96ca006f512
related:
- id: 47e0852a-cf81-4494-a8e6-31864f8c86ed
type: derived
status: experimental
description: Detects Pandemic Windows Implant
references:
- https://wikileaks.org/vault7/#Pandemic
- https://twitter.com/MalwareJake/status/870349480356454401
tags:
- attack.lateral_movement
- attack.t1105
author: Florian Roth
date: 2017/06/01
modified: 2021/09/12
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: 'loaddll -a '
condition: selection
falsepositives:
- unknown
level: critical
fields:
- EventID
- CommandLine
- ParentCommandLine
- Image
- User
- TargetObject
proc_creation_win_apt_revil_kaseya.yml
title: REvil Kaseya Incident Malware Patterns
id: 5de632bc-7fbd-4c8a-944a-fce55c59eae5
status: experimental
description: Detects process command line patterns and locations used by REvil group in Kaseya incident (can also match on other malware)
references:
- https://community.sophos.com/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers
- https://www.joesandbox.com/analysis/443736/0/html
- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b
- https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/
- https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/
author: Florian Roth
date: 2021/07/03
modified: 2022/02/28
tags:
- attack.execution
- attack.t1059
- attack.g0115
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'C:\Windows\cert.exe'
- 'Set-MpPreference -DisableRealtimeMonitoring $true -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled'
- 'del /q /f c:\kworking\agent.crt'
- 'Kaseya VSA Agent Hot-fix'
- '\AppData\Local\Temp\MsMpEng.exe'
- 'rmdir /s /q %SystemDrive%\inetpub\logs'
- 'del /s /q /f %SystemDrive%\\*.log'
- 'c:\kworking1\agent.exe'
- 'c:\kworking1\agent.crt'
selection2:
Image:
- 'C:\Windows\MsMpEng.exe'
- 'C:\Windows\cert.exe'
- 'C:\kworking\agent.exe'
- 'C:\kworking1\agent.exe'
selection3:
CommandLine|contains|all:
- 'del /s /q /f'
- 'WebPages\Errors\webErrorLog.txt'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
proc_creation_win_apt_slingshot.yml
title: Defrag Deactivation
id: 958d81aa-8566-4cea-a565-59ccd4df27b0
description: Detects the deactivation and disabling of the Scheduled defragmentation task as seen by Slingshot APT group
status: experimental
author: Florian Roth, Bartlomiej Czyz (@bczyz1)
date: 2019/03/04
modified: 2021/09/19
references:
- https://securelist.com/apt-slingshot/84312/
tags:
- attack.persistence
- attack.t1053.005
- attack.s0111
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\schtasks.exe'
CommandLine|contains:
- '/delete'
- '/change'
CommandLine|contains|all:
- '/TN'
- '\Microsoft\Windows\Defrag\ScheduledDefrag'
condition: selection
falsepositives:
- Unknown
level: medium
proc_creation_win_apt_sofacy.yml
title: Sofacy Trojan Loader Activity
id: ba778144-5e3d-40cf-8af9-e28fb1df1e20
author: Florian Roth, Jonhnathan Ribeiro, oscd.community
status: experimental
date: 2018/03/01
modified: 2021/12/08
description: Detects Trojan loader acitivty as used by APT28
references:
- https://researchcenter.paloaltonetworks.com/2018/02/unit42-sofacy-attacks-multiple-government-entities/
- https://www.reverse.it/sample/e3399d4802f9e6d6d539e3ae57e7ea9a54610a7c4155a6541df8e94d67af086e?environmentId=100
- https://twitter.com/ClearskySec/status/960924755355369472
tags:
- attack.g0007
- attack.execution
- attack.t1059.003
- attack.defense_evasion
- car.2013-10-002
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'rundll32.exe'
- '%APPDATA%\'
selection2:
- CommandLine|contains: '.dat",'
- CommandLine|endswith:
- '.dll",#1'
- '.dll #1'
- '.dll" #1'
condition: selection1 and selection2
falsepositives:
- Unknown
level: critical
proc_creation_win_apt_sourgrum.yml
title: SOURGUM Actor Behaviours
id: 7ba08e95-1e0b-40cd-9db5-b980555e42fd
description: Suspicious behaviours related to an actor tracked by Microsoft as SOURGUM
author: MSTIC, FPT.EagleEye
status: experimental
level: high
references:
- https://www.virustotal.com/gui/file/c299063e3eae8ddc15839767e83b9808fd43418dc5a1af7e4f44b97ba53fbd3d/detection
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/MultipleDataSources/SOURGUM_IOC.yaml
- https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/
date: 2021/06/15
modified: 2021/07/30
tags:
- attack.t1546
- attack.t1546.015
- attack.persistence
- attack.privilege_escalation
logsource:
product: windows
category: process_creation
detection:
selection1:
Image|contains: 'windows\system32\Physmem.sys'
selection2:
Image|contains:
- 'Windows\system32\ime\SHARED\WimBootConfigurations.ini'
- 'Windows\system32\ime\IMEJP\WimBootConfigurations.ini'
- 'Windows\system32\ime\IMETC\WimBootConfigurations.ini'
selection3:
Image|contains:
- 'windows\system32\filepath2'
- 'windows\system32\ime'
registry_command:
CommandLine|contains:
- 'reg add'
registry_key:
CommandLine|contains:
- 'HKEY_LOCAL_MACHINE\software\classes\clsid\{7c857801-7381-11cf-884d-00aa004b2e24}\inprocserver32'
- 'HKEY_LOCAL_MACHINE\software\classes\clsid\{cf4cc405-e2c5-4ddd-b3ce-5e7582d8c9fa}\inprocserver32'
condition: selection1 or selection2 or (selection3 and registry_command and registry_key)
falsepositives:
- Unknown
proc_creation_win_apt_ta17_293a_ps.yml
title: Ps.exe Renamed SysInternals Tool
id: 18da1007-3f26-470f-875d-f77faf1cab31
status: test
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report
author: Florian Roth
references:
- https://www.us-cert.gov/ncas/alerts/TA17-293A
date: 2017/10/22
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: 'ps.exe -accepteula'
condition: selection
falsepositives:
- Renamed SysInternals tool
level: high
tags:
- attack.defense_evasion
- attack.g0035
- attack.t1036.003
- car.2013-05-009
proc_creation_win_apt_ta505_dropper.yml
title: TA505 Dropper Load Pattern
id: 18cf6cf0-39b0-4c22-9593-e244bdc9a2d4
status: test
description: Detects mshta loaded by wmiprvse as parent as used by TA505 malicious documents
author: Florian Roth
references:
- https://twitter.com/ForensicITGuy/status/1334734244120309760
date: 2020/12/08
modified: 2022/01/07
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\mshta.exe'
ParentImage|endswith: '\wmiprvse.exe'
condition: selection
falsepositives:
- unknown
level: critical
tags:
- attack.execution
- attack.g0092
- attack.t1106
proc_creation_win_apt_taidoor.yml
title: TAIDOOR RAT DLL Load
id: d1aa3382-abab-446f-96ea-4de52908210b
status: test
description: Detects specific process characteristics of Chinese TAIDOOR RAT malware load
author: Florian Roth
references:
- https://us-cert.cisa.gov/ncas/analysis-reports/ar20-216a
date: 2020/07/30
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'dll,MyStart'
- 'dll MyStart'
selection2a:
CommandLine|endswith:
- ' MyStart'
selection2b:
CommandLine|contains:
- 'rundll32.exe'
condition: selection1 or ( selection2a and selection2b )
falsepositives:
- Unknown
level: critical
tags:
- attack.execution
- attack.t1055.001
proc_creation_win_apt_tropictrooper.yml
title: TropicTrooper Campaign November 2018
id: 8c7090c3-e0a0-4944-bd08-08c3a0cecf79
author: '@41thexplorer, Microsoft Defender ATP'
status: stable
date: 2019/11/12
modified: 2020/08/27
description: Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia
references:
- https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/
tags:
- attack.execution
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: 'abCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCc'
condition: selection
level: high
proc_creation_win_apt_turla_commands_critical.yml
title: Turla Group Lateral Movement
id: c601f20d-570a-4cde-a7d6-e17f99cb8e7f
status: experimental
description: Detects automated lateral movement by Turla group
references:
- https://securelist.com/the-epic-turla-operation/65545/
tags:
- attack.g0010
- attack.execution
- attack.t1059
- attack.lateral_movement
- attack.t1021.002
- attack.discovery
- attack.t1083
- attack.t1135
author: Markus Neis
date: 2017/11/07
modified: 2021/09/19
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- 'net use \\%DomainController%\C$ "P@ssw0rd" *'
- 'dir c:\\*.doc* /s'
- 'dir %TEMP%\\*.exe'
condition: selection
level: critical
falsepositives:
- Unknown
proc_creation_win_apt_turla_commands_medium.yml
title: Turla Group Lateral Movement
id: 75925535-ca97-4e0a-a850-00b5c00779dc
status: experimental
description: Detects automated lateral movement by Turla group
references:
- https://securelist.com/the-epic-turla-operation/65545/
tags:
- attack.g0010
- attack.execution
- attack.t1059
- attack.lateral_movement
- attack.t1021.002
- attack.discovery
- attack.t1083
- attack.t1135
author: Markus Neis
date: 2017/11/07
modified: 2021/09/19
logsource:
category: process_creation
product: windows
detection:
netCommand1:
CommandLine: 'net view /DOMAIN'
netCommand2:
CommandLine: 'net session'
netCommand3:
CommandLine: 'net share'
timeframe: 1m
condition: netCommand1 | near netCommand2 and netCommand3
level: medium
falsepositives:
- Unknown
proc_creation_win_apt_turla_comrat_may20.yml
title: Turla Group Commands May 2020
id: 9e2e51c5-c699-4794-ba5a-29f5da40ac0c
status: test
description: Detects commands used by Turla group as reported by ESET in May 2020
author: Florian Roth
references:
- https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf
date: 2020/05/26
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'tracert -h 10 yahoo.com'
- '.WSqmCons))|iex;'
- 'Fr`omBa`se6`4Str`ing'
selection2:
CommandLine|contains|all:
- 'net use https://docs.live.net'
- '@aol.co.uk'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
tags:
- attack.g0010
- attack.execution
- attack.t1059.001
- attack.t1053.005
- attack.t1027
proc_creation_win_apt_unc2452_cmds.yml
title: UNC2452 Process Creation Patterns
id: 9be34ad0-b6a7-4fbd-91cf-fc7ec1047f5f
description: Detects a specific process creation patterns as seen used by UNC2452 and provided by Microsoft as Microsoft Defender ATP queries
status: experimental
references:
- https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
tags:
- attack.execution
- attack.t1059.001
# - sunburst
# - unc2452
author: Florian Roth
date: 2021/01/22
modified: 2021/06/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- '7z.exe a -v500m -mx9 -r0 -p'
selection2:
ParentCommandLine|contains|all:
- 'wscript.exe'
- '.vbs'
CommandLine|contains|all:
- 'rundll32.exe'
- 'C:\Windows'
- '.dll,Tk_'
selection3:
ParentImage|endswith: '\rundll32.exe'
ParentCommandLine|contains: 'C:\Windows'
CommandLine|contains: 'cmd.exe /C '
selection4:
CommandLine|contains|all:
- 'rundll32 c:\windows\'
- '.dll '
specific1:
ParentImage|endswith: '\rundll32.exe'
Image|endswith: '\dllhost.exe'
filter1:
CommandLine:
- ' '
- ''
condition: selection1 or selection2 or selection3 or selection4 or ( specific1 and not filter1 )
falsepositives:
- Unknown
level: critical
proc_creation_wi_apt_unc2452_ps.yml
title: UNC2452 PowerShell Pattern
id: b7155193-8a81-4d8f-805d-88de864ca50c
description: Detects a specific PowerShell command line pattern used by the UNC2452 actors as mentioned in Microsoft and Symantec reports
status: experimental
references:
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-raindrop-malware
- https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1047/T1047.md#atomic-test-7---create-a-process-using-wmi-query-and-an-encoded-command
tags:
- attack.execution
- attack.t1059.001
- attack.t1047
# - sunburst
author: Florian Roth
date: 2021/01/20
modified: 2021/01/22
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'Invoke-WMIMethod win32_process -name create -argumentlist'
- 'rundll32 c:\windows'
selection2:
CommandLine|contains|all:
- 'wmic /node:'
- 'process call create "rundll32 c:\windows'
condition: selection1 or selection2
falsepositives:
- Unknown, unlikely, but possible
level: critical
proc_creation_win_apt_unidentified_nov_18.yml
title: Unidentified Attacker November 2018
id: 7453575c-a747-40b9-839b-125a0aae324b
status: stable
description: A sigma rule detecting an unidetefied attacker who used phishing emails to target high profile orgs on November 2018. The Actor shares some TTPs with
YYTRIUM/APT29 campaign in 2016.
references:
- https://twitter.com/DrunkBinary/status/1063075530180886529
author: '@41thexplorer, Microsoft Defender ATP'
date: 2018/11/20
modified: 2021/09/19
tags:
- attack.execution
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: 'cyzfc.dat,'
CommandLine|endswith: 'PointFunctionCall'
condition: selection
level: high
proc_creation_win_apt_winnti_mal_hk_jan20.yml
title: Winnti Malware HK University Campaign
id: 3121461b-5aa0-4a41-b910-66d25524edbb
status: test
description: Detects specific process characteristics of Winnti malware noticed in Dec/Jan 2020 in a campaign against Honk Kong universities
author: Florian Roth, Markus Neis
references:
- https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/
date: 2020/02/01
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
ParentImage|contains:
- 'C:\Windows\Temp'
- '\hpqhvind.exe'
Image|startswith: 'C:\ProgramData\DRM'
selection2:
ParentImage|startswith: 'C:\ProgramData\DRM'
Image|endswith: '\wmplayer.exe'
selection3:
ParentImage|endswith: '\Test.exe'
Image|endswith: '\wmplayer.exe'
selection4:
Image: 'C:\ProgramData\DRM\CLR\CLR.exe'
selection5:
ParentImage|startswith: 'C:\ProgramData\DRM\Windows'
Image|endswith: '\SearchFilterHost.exe'
condition: 1 of selection*
falsepositives:
- Unlikely
level: critical
tags:
- attack.defense_evasion
- attack.t1574.002
- attack.g0044
proc_creation_win_apt_winnti_pipemon.yml
title: Winnti Pipemon Characteristics
id: 73d70463-75c9-4258-92c6-17500fe972f2
status: test
description: Detects specific process characteristics of Winnti Pipemon malware reported by ESET
author: Florian Roth, oscd.community
references:
- https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/
date: 2020/07/30
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'setup0.exe -p'
selection2:
CommandLine|contains|all:
- 'setup.exe'
CommandLine|endswith:
- '-x:0'
- '-x:1'
- '-x:2'
condition: 1 of selection*
falsepositives:
- Legitimate setups that use similar flags
level: critical
tags:
- attack.defense_evasion
- attack.t1574.002
- attack.g0044
proc_creation_win_apt_wocao.yml
title: Operation Wocao Activity
id: 1cfac73c-be78-4f9a-9b08-5bde0c3953ab
related:
- id: 74ad4314-482e-4c3e-b237-3f7ed3b9ca8d
type: derived
author: Florian Roth, frack113
status: experimental
description: Detects activity mentioned in Operation Wocao report
references:
- https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/
- https://twitter.com/SBousseaden/status/1207671369963646976
tags:
- attack.discovery
- attack.t1012
- attack.defense_evasion
- attack.t1036.004
- attack.t1027
- attack.execution
- attack.t1053.005
- attack.t1059.001
date: 2019/12/20
modified: 2021/09/19
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'checkadmin.exe 127.0.0.1 -all'
- 'netsh advfirewall firewall add rule name=powershell dir=in'
- 'cmd /c powershell.exe -ep bypass -file c:\s.ps1'
- '/tn win32times /f'
- 'create win32times binPath='
- '\c$\windows\system32\devmgr.dll'
- ' -exec bypass -enc JgAg'
- 'type *keepass\KeePass.config.xml'
- 'iie.exe iie.txt'
- 'reg query HKEY_CURRENT_USER\Software\\*\PuTTY\Sessions\'
condition: selection
falsepositives:
- Administrators that use checkadmin.exe tool to enumerate local administrators
level: high
proc_creation_win_apt_zxshell.yml
title: ZxShell Malware
id: f0b70adb-0075-43b0-9745-e82a1c608fcc
status: test
description: Detects a ZxShell start by the called and well-known function name
author: Florian Roth, oscd.community, Jonhnathan Ribeiro
references:
- https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
date: 2017/07/20
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\rundll32.exe'
CommandLine|contains:
- 'zxFunction'
- 'RemoteDiskXXXXX'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: critical
tags:
- attack.execution
- attack.t1059.003
- attack.defense_evasion
- attack.t1218.011
- attack.s0412
- attack.g0001
raw_access_thread
sysmon_raw_disk_access_using_illegitimate_tools.yml
registry_event
registry_event_abusing_windows_telemetry_for_persistence.yml
registry_event_add_local_hidden_user.yml
registry_event_add_port_monitor.yml
registry_event_apt_chafer_mar18.yml
registry_event_apt_leviathan.yml
registry_event_apt_oceanlotus_registry.yml
registry_event_apt_pandemic.yml
registry_event_asep_reg_keys_modification.yml
registry_event_asep_reg_keys_modification_classes.yml
registry_event_asep_reg_keys_modification_common.yml
registry_event_asep_reg_keys_modification_currentcontrolset.yml
registry_event_asep_reg_keys_modification_currentversion.yml
registry_event_asep_reg_keys_modification_currentversion_nt.yml
registry_event_asep_reg_keys_modification_internet_explorer.yml
registry_event_asep_reg_keys_modification_office.yml
registry_event_asep_reg_keys_modification_session_manager.yml
registry_event_asep_reg_keys_modification_system_scripts.yml
registry_event_asep_reg_keys_modification_winsock2.yml
registry_event_asep_reg_keys_modification_wow6432node.yml
registry_event_asep_reg_keys_modification_wow6432node_classes.yml
registry_event_asep_reg_keys_modification_wow6432node_currentversion.yml
registry_event_blackbyte_ransomware.yml
registry_event_bypass_uac_using_delegateexecute.yml
registry_event_bypass_uac_using_eventviewer.yml
registry_event_bypass_uac_using_silentcleanup_task.yml
registry_event_bypass_via_wsreset.yml
registry_event_change_rdp_port.yml
registry_event_change_security_zones.yml
registry_event_chrome_extension.yml
registry_event_cmstp_execution_by_registry.yml
registry_event_cobaltstrike_service_installs.yml
registry_event_comhijack_sdclt.yml
registry_event_crashdump_disabled.yml
registry_event_cve_2020_1048.yml
registry_event_cve_2021_31979_cve_2021_33771_exploits.yml
registry_event_defender_disabled.yml
registry_event_defender_exclusions.yml
registry_event_defender_realtime_protection_disabled.yml
registry_event_dhcp_calloutdll.yml
registry_event_disable_administrative_share.yml
registry_event_disable_defender_firewall.yml
registry_event_disable_microsoft_office_security_features.yml
registry_event_disable_security_events_logging_adding_reg_key_minint.yml
registry_event_disable_uac_registry.yml
registry_event_disable_wdigest_credential_guard.yml
registry_event_disabled_exploit_guard_net_protection_on_ms_defender.yml
registry_event_disabled_pua_protection_on_microsoft_defender.yml
registry_event_disabled_tamper_protection_on_microsoft_defender.yml
registry_event_dns_over_https_enabled.yml
registry_event_dns_serverlevelplugindll.yml
registry_event_enabling_cor_profiler_env_variables.yml
registry_event_esentutl_volume_shadow_copy_service_keys.yml
registry_event_etw_disabled.yml
registry_event_file_association_exefile.yml
registry_event_hack_wce_reg.yml
registry_event_hidden_extention.yml
registry_event_hybridconnectionmgr_svc_installation.yml
registry_event_ie_persistence.yml
registry_event_logon_scripts_userinitmprlogonscript_reg.yml
registry_event_mal_adwind.yml
registry_event_mal_azorult.yml
registry_event_mal_blue_mockingbird.yml
registry_event_mal_flowcloud.yml
registry_event_mal_netwire.yml
registry_event_mal_ursnif.yml
registry_event_mimikatz_printernightmare.yml
registry_event_modify_screensaver_binary_path.yml
registry_event_mstsc_history_cleared.yml
registry_event_narrator_feedback_persistance.yml
registry_event_net_ntlm_downgrade.yml
registry_event_new_application_appcompat.yml
registry_event_new_dll_added_to_appcertdlls_registry_key.yml
registry_event_new_dll_added_to_appinit_dlls_registry_key.yml
registry_event_office_enable_dde.yml
registry_event_office_security.yml
registry_event_office_test_regadd.yml
registry_event_office_vsto_persistence.yml
registry_event_outlook_c2_registry_key.yml
registry_event_outlook_registry_todaypage.yml
registry_event_outlook_registry_webview.yml
registry_event_outlook_security.yml
registry_event_persistence.yml
registry_event_persistence_key_linking.yml
registry_event_persistence_recycle_bin.yml
registry_event_persistence_search_order.yml
registry_event_portproxy_registry_key.yml
registry_event_powershell_as_service.yml
registry_event_rdp_registry_modification.yml
registry_event_rdp_settings_hijack.yml
registry_event_redmimicry_winnti_reg.yml
registry_event_removal_amsi_registry_key.yml
registry_event_removal_com_hijacking_registry_key.yml
registry_event_runkey_winekey.yml
registry_event_runonce_persistence.yml
registry_event_set_servicedll.yml
registry_event_shell_open_keys_manipulation.yml
registry_event_shim_databases_persistence.yml
registry_event_silentprocessexit.yml
registry_event_silentprocessexit_lsass.yml
registry_event_ssp_added_lsa_config.yml
registry_event_stickykey_like_backdoor.yml
registry_event_susp_atbroker_change.yml
registry_event_susp_download_run_key.yml
registry_event_susp_lsass_dll_load.yml
registry_event_susp_mic_cam_access.yml
registry_event_susp_printer_driver.yml
registry_event_susp_reg_persist_explorer_run.yml
registry_event_susp_run_key_img_folder.yml
registry_event_susp_service_installed.yml
registry_event_suspicious_keyboard_layout_load.yml
registry_event_sysinternals_eula_accepted.yml
registry_event_sysinternals_sdelete_registry_keys.yml
registry_event_taskcache_entry.yml
registry_event_telemetry_persistence.yml
registry_event_trust_record_modification.yml
registry_event_uac_bypass_eventvwr.yml
registry_event_uac_bypass_sdclt.yml
registry_event_uac_bypass_winsat.yml
registry_event_uac_bypass_wmp.yml
registry_event_vbs_payload_stored.yml
registry_event_wab_dllpath_reg_change.yml
registry_event_wdigest_enable_uselogoncredential.yml
registry_event_winlogon_notify_key.yml
sysmon
sysmon_accessing_winapi_in_powershell_credentials_dumping.yml
sysmon_config_modification.yml
sysmon_config_modification_error.yml
sysmon_config_modification_status.yml
sysmon_dcom_iertutil_dll_hijack.yml
sysmon_process_hollowing.yml
wmi_event
sysmon_wmi_event_subscription.yml
sysmon_wmi_susp_encoded_scripts.yml
sysmon_wmi_susp_scripting.yml