-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
remove: Abusing Findstr for Defense Evasion - Deprecate in favour of 2 splitted rules. 587254ee-a24b-4335-b3cd-065c0f1f4baa and 04936b66-3915-43ad-a8e5-809eadfd1141 remove: Windows Update Client LOLBIN - Deprecate in favour of 52d097e2-063e-4c9c-8fbb-855c8948d135 fix: Remote Thread Creation By Uncommon Source Image - Enhance filters to avoid false positives fix: Suspicious Shim Database Installation via Sdbinst.EXE - Add "null" and "empty" filters to account for cases where the CLI is null or empty new: Insenstive Subfolder Search Via Findstr.EXE new: Remote File Download Via Findstr.EXE new: Windows Defender Exclusion Deleted new: Windows Defender Exclusion List Modified new: Windows Defender Exclusion Reigstry Key - Write Access Requested update: Renamed Office Binary Execution - Add new binaries and filters to increase coverage and tune FPs update: EVTX Created In Uncommon Location - Enhance filters to cover other drives other than "C:" update: Findstr GPP Passwords - Add "find.exe" binary to increase coverage update: Findstr Launching .lnk File - Add "find.exe" binary to increase coverage update: LSASS Process Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage update: Non-DLL Extension File Renamed With DLL Extension - Update title and logic update: Permission Misconfiguration Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage update: Potentially Suspicious Wuauclt Network Connection - Change the logic to use the "CommandLine" field in order to avoid false positives update: Proxy Execution Via Wuauclt.EXE - Update title and enhance filters update: Recon Command Output Piped To Findstr.EXE - Add "find.exe" binary to increase coverage update: Security Tools Keyword Lookup Via Findstr.EXE - Add "find.exe" binary to increase coverage update: Suspicious Appended Extension - Enhance list of extension update: Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE - Add "find.exe" binary to increase coverage fix: Uncommon Userinit Child Process - Add the citrix process cmstart to the filtered processes and make it more strict to avoid abuse. Also enhances the other filters by removing the C: notation. fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Add FP filter for chrome installer spawning rundll32 without arguments --------- Co-authored-by: phantinuss <[email protected]> thanks: @vj-codes for #4554 thanks: @mezzofix for #4520 thanks: @rkmbaxed for #4566 and #4569 thanks: @celalettin-turgut for #4570
- Loading branch information
1 parent
8dbf7b9
commit c125ae7
Showing
27 changed files
with
435 additions
and
138 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
...tion/proc_creation_win_lolbin_findstr.yml → ...dows/proc_creation_win_lolbin_findstr.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
...n/proc_creation_win_wuauclt_execution.yml → ...s/proc_creation_win_wuauclt_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
47 changes: 47 additions & 0 deletions
47
rules-threat-hunting/windows/file/file_rename/file_rename_win_non_dll_to_dll_ext.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
title: Non-DLL Extension File Renamed With DLL Extension | ||
id: bbfd974c-248e-4435-8de6-1e938c79c5c1 | ||
status: experimental | ||
description: | | ||
Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions. | ||
references: | ||
- https://twitter.com/ffforward/status/1481672378639912960 | ||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1036/T1036.md#atomic-test-1---system-file-copied-to-unusual-location | ||
author: frack113 | ||
date: 2022/02/19 | ||
modified: 2023/11/11 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1036.008 | ||
- detection.threat_hunting | ||
logsource: | ||
product: windows | ||
category: file_rename | ||
definition: 'Requirements: Microsoft-Windows-Kernel-File Provider with at least the KERNEL_FILE_KEYWORD_RENAME_SETLINK_PATH keyword' | ||
detection: | ||
selection: | ||
TargetFilename|endswith: '.dll' | ||
filter_main_dll: | ||
# Note: To avoid file renames | ||
SourceFilename|endswith: '.dll' | ||
filter_main_installers: | ||
SourceFilename|endswith: '.tmp' | ||
filter_main_empty_source: | ||
SourceFilename: '' | ||
filter_main_null_source: | ||
SourceFilename: null | ||
filter_main_tiworker: | ||
Image|contains: ':\Windows\WinSxS\' | ||
Image|endswith: '\TiWorker.exe' | ||
filter_main_upgrade: | ||
- Image|endswith: ':\Windows\System32\wuauclt.exe' | ||
- TargetFilename|contains: ':\$WINDOWS.~BT\Sources\' | ||
filter_main_generic: | ||
Image|contains: | ||
- ':\Program Files (x86)\' | ||
- ':\Program Files\' | ||
filter_optional_squirrel: | ||
SourceFilename|contains: '\SquirrelTemp\temp' | ||
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_* | ||
falsepositives: | ||
- Likely from installers and temporary locations | ||
level: medium |
30 changes: 30 additions & 0 deletions
30
...s/windows/builtin/security/win_security_windows_defender_exclusions_registry_modified.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
title: Windows Defender Exclusion List Modified | ||
id: 46a68649-f218-4f86-aea1-16a759d81820 | ||
related: | ||
- id: e9c8808f-4cfb-4ba9-97d4-e5f3beaa244d | ||
type: derived | ||
- id: a33f8808-2812-4373-ae95-8cfb82134978 | ||
type: derived | ||
status: test | ||
description: | | ||
Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to bypass security. | ||
references: | ||
- https://www.bleepingcomputer.com/news/security/gootkit-malware-bypasses-windows-defender-by-setting-path-exclusions/ | ||
author: '@BarryShooshooga' | ||
date: 2019/10/26 | ||
modified: 2023/11/11 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562.001 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: 'Requirements: Audit Policy : Security Settings/Local Policies/Audit Policy, Registry System Access Control (SACL): Auditing/User' | ||
detection: | ||
selection: | ||
EventID: 4657 # A registry value was modified. | ||
ObjectName|contains: '\Microsoft\Windows Defender\Exclusions\' | ||
condition: selection | ||
falsepositives: | ||
- Intended exclusions by administrators | ||
level: medium |
35 changes: 35 additions & 0 deletions
35
rules/windows/builtin/security/win_security_windows_defender_exclusions_write_access.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: Windows Defender Exclusion Reigstry Key - Write Access Requested | ||
id: e9c8808f-4cfb-4ba9-97d4-e5f3beaa244d | ||
related: | ||
- id: 46a68649-f218-4f86-aea1-16a759d81820 | ||
type: derived | ||
- id: a33f8808-2812-4373-ae95-8cfb82134978 | ||
type: derived | ||
status: test | ||
description: | | ||
Detects write access requests to the Windows Defender exclusions registry keys. This could be an indication of an attacker trying to request a handle or access the object to write new exclusions in order to bypass security. | ||
references: | ||
- https://www.bleepingcomputer.com/news/security/gootkit-malware-bypasses-windows-defender-by-setting-path-exclusions/ | ||
author: '@BarryShooshooga, Nasreddine Bencherchali (Nextron Systems)' | ||
date: 2019/10/26 | ||
modified: 2023/11/11 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562.001 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: 'Requirements: Audit Policy : Security Settings/Local Policies/Audit Policy, Registry System Access Control (SACL): Auditing/User' | ||
detection: | ||
selection: | ||
AccessList|contains: | ||
- '%%4417' # WriteData | ||
- '%%4418' # AppendData | ||
EventID: | ||
- 4656 # A handle to an object was requested. | ||
- 4663 # An attempt was made to access an object. | ||
ObjectName|contains: '\Microsoft\Windows Defender\Exclusions\' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: medium |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
45 changes: 0 additions & 45 deletions
45
rules/windows/file/file_rename/file_rename_win_not_dll_to_dll.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.