-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
… advisory and other updates new: DLL Names Used By SVR For GraphicalProton Backdoor new: Enable LM Hash Storage new: Enable LM Hash Storage - ProcCreation new: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor new: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor - Task Scheduler update: Compress-Archive Cmdlet Execution - Reudced Level to low and moved to Threat Hunting folder. update: Disabled Volume Snapshots - Update logic by removing the reg string to also account for potential renamed executions update: Folder Compress To Potentially Suspicious Output Via Compress-Archive Cmdlet - Update logic to be more specific update: Potential Recon Activity Via Nltest.EXE - Add dnsgetdc coverage and enhance logic by removing / update: Potential System DLL Sideloading From Non System Locations - Enhance logic by removing hardcoded C: value to account for other potential system locations update: RestrictedAdminMode Registry Value Tampering - ProcCreation - Update logic the logic to not care about the data. As this registry value has use cases either be it "0" or "1" update: RestrictedAdminMode Registry Value Tampering - Update logic the logic to not care about the data. As this registry value has use cases either be it "0" or "1" update: Write Protect For Storage Disabled - Update logic by removing the reg string to also account for potential renamed executions update: Zip A Folder With PowerShell For Staging In Temp - PowerShell Module - Update logic to be more specific update: Zip A Folder With PowerShell For Staging In Temp - PowerShell - Update logic to be more specific update: Zip A Folder With PowerShell For Staging In Temp - PowerShell Script - Update logic to be more specific --------- Co-authored-by: phantinuss <[email protected]>
- Loading branch information
1 parent
d652a9e
commit 412edd1
Showing
18 changed files
with
312 additions
and
105 deletions.
There are no files selected for viewing
33 changes: 33 additions & 0 deletions
33
rules-emerging-threats/2023/TA/Cozy-Bear/image_load_apt_cozy_bear_graphical_proton_dlls.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: DLL Names Used By SVR For GraphicalProton Backdoor | ||
id: e64c8ef3-9f98-40c8-b71e-96110991cb4c | ||
status: experimental | ||
description: Hunts known SVR-specific DLL names. | ||
references: | ||
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a | ||
author: CISA | ||
date: 2023/12/18 | ||
logsource: | ||
category: image_load | ||
product: windows | ||
detection: | ||
selection: | ||
ImageLoaded|endswith: | ||
- '\AclNumsInvertHost.dll' | ||
- '\AddressResourcesSpec.dll' | ||
- '\BlendMonitorStringBuild.dll' | ||
- '\ChildPaletteConnected.dll' | ||
- '\DeregisterSeekUsers.dll' | ||
- '\HandleFrequencyAll.dll' | ||
- '\HardSwapColor.dll' | ||
- '\LengthInMemoryActivate.dll' | ||
- '\ModeBitmapNumericAnimate.dll' | ||
- '\ModeFolderSignMove.dll' | ||
- '\ParametersNamesPopup.dll' | ||
- '\PerformanceCaptionApi.dll' | ||
- '\ScrollbarHandleGet.dll' | ||
- '\UnregisterAncestorAppendAuto.dll' | ||
- '\WowIcmpRemoveReg.dll' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: medium |
47 changes: 47 additions & 0 deletions
47
rules-emerging-threats/2023/TA/Cozy-Bear/win_security_apt_cozy_bear_scheduled_tasks_name.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
title: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor | ||
id: 8fa65166-f463-4fd2-ad4f-1436133c52e1 | ||
related: | ||
- id: 2bfc1373-0220-4fbd-8b10-33ddafd2a142 | ||
type: similar | ||
status: experimental | ||
description: Hunts for known SVR-specific scheduled task names | ||
author: CISA | ||
references: | ||
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a | ||
date: 2023/12/18 | ||
tags: | ||
- attack.persistence | ||
logsource: | ||
service: security | ||
product: windows | ||
detection: | ||
selection: | ||
EventID: | ||
- 4698 | ||
- 4699 | ||
- 4702 | ||
TaskName: | ||
- '\defender' | ||
- '\Microsoft\DefenderService' | ||
- '\Microsoft\Windows\Application Experience\StartupAppTaskCheck' | ||
- '\Microsoft\Windows\Application Experience\StartupAppTaskCkeck' | ||
- '\Microsoft\Windows\ATPUpd' | ||
- '\Microsoft\Windows\Data Integrity Scan\Data Integrity Update' | ||
- '\Microsoft\Windows\DefenderUPDService' | ||
- '\Microsoft\Windows\IISUpdateService' | ||
- '\Microsoft\Windows\Speech\SpeechModelInstallTask' | ||
- '\Microsoft\Windows\WiMSDFS' | ||
- '\Microsoft\Windows\Windows Defender\Defender Update Service' | ||
- '\Microsoft\Windows\Windows Defender\Service Update' | ||
- '\Microsoft\Windows\Windows Error Reporting\CheckReporting' | ||
- '\Microsoft\Windows\Windows Error Reporting\SubmitReporting' | ||
- '\Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStart' | ||
- '\Microsoft\Windows\WindowsDefenderService' | ||
- '\Microsoft\Windows\WindowsDefenderService2' | ||
- '\Microsoft\Windows\WindowsUpdate\Scheduled AutoCheck' | ||
- '\Microsoft\Windows\WindowsUpdate\Scheduled Check' | ||
- '\WindowUpdate' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: high |
48 changes: 48 additions & 0 deletions
48
...threats/2023/TA/Cozy-Bear/win_taskscheduler_apt_cozy_bear_graphical_proton_task_names.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
title: Scheduled Tasks Names Used By SVR For GraphicalProton Backdoor - Task Scheduler | ||
id: 2bfc1373-0220-4fbd-8b10-33ddafd2a142 | ||
related: | ||
- id: 8fa65166-f463-4fd2-ad4f-1436133c52e1 # Security-Audting Eventlog | ||
type: similar | ||
status: experimental | ||
description: Hunts for known SVR-specific scheduled task names | ||
author: CISA | ||
references: | ||
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a | ||
date: 2023/12/18 | ||
tags: | ||
- attack.persistence | ||
logsource: | ||
product: windows | ||
service: taskscheduler | ||
definition: 'Requirements: The "Microsoft-Windows-TaskScheduler/Operational" is disabled by default and needs to be enabled in order for this detection to trigger' | ||
detection: | ||
selection: | ||
EventID: | ||
- 129 # Task Created | ||
- 140 # Task Updated | ||
- 141 # Task Deleted | ||
TaskName: | ||
- '\defender' | ||
- '\Microsoft\DefenderService' | ||
- '\Microsoft\Windows\Application Experience\StartupAppTaskCheck' | ||
- '\Microsoft\Windows\Application Experience\StartupAppTaskCkeck' | ||
- '\Microsoft\Windows\ATPUpd' | ||
- '\Microsoft\Windows\Data Integrity Scan\Data Integrity Update' | ||
- '\Microsoft\Windows\DefenderUPDService' | ||
- '\Microsoft\Windows\IISUpdateService' | ||
- '\Microsoft\Windows\Speech\SpeechModelInstallTask' | ||
- '\Microsoft\Windows\WiMSDFS' | ||
- '\Microsoft\Windows\Windows Defender\Defender Update Service' | ||
- '\Microsoft\Windows\Windows Defender\Service Update' | ||
- '\Microsoft\Windows\Windows Error Reporting\CheckReporting' | ||
- '\Microsoft\Windows\Windows Error Reporting\SubmitReporting' | ||
- '\Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStart' | ||
- '\Microsoft\Windows\WindowsDefenderService' | ||
- '\Microsoft\Windows\WindowsDefenderService2' | ||
- '\Microsoft\Windows\WindowsUpdate\Scheduled AutoCheck' | ||
- '\Microsoft\Windows\WindowsUpdate\Scheduled Check' | ||
- '\WindowUpdate' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: high |
16 changes: 8 additions & 8 deletions
16
...rshell_script/posh_ps_data_compressed.yml → ...script/posh_ps_compress_archive_usage.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,26 +1,26 @@ | ||
title: Data Compressed - PowerShell | ||
title: Compress-Archive Cmdlet Execution | ||
id: 6dc5d284-69ea-42cf-9311-fb1c3932a69a | ||
status: test | ||
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. | ||
description: | | ||
Detects PowerShell scripts that make use of the "Compress-Archive" cmdlet in order to compress folders and files. | ||
An adversary might compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. | ||
references: | ||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1560/T1560.md | ||
author: Timur Zinniatullin, oscd.community | ||
date: 2019/10/21 | ||
modified: 2022/12/25 | ||
modified: 2023/12/15 | ||
tags: | ||
- attack.exfiltration | ||
- attack.t1560 | ||
- detection.threat_hunting | ||
logsource: | ||
product: windows | ||
category: ps_script | ||
definition: 'Requirements: Script Block Logging must be enabled' | ||
detection: | ||
selection: | ||
ScriptBlockText|contains|all: | ||
- '-Recurse' | ||
- '|' | ||
- 'Compress-Archive' | ||
ScriptBlockText|contains: 'Compress-Archive' | ||
condition: selection | ||
falsepositives: | ||
- Highly likely if archive operations are done via PowerShell. | ||
- Likely | ||
level: low |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.