-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create file_event_win_create_hidden_directory_via_index_allocation.yml #4399
Conversation
Change the T1564 for t1564
…l to file_event_win_create_hidden_directory.yml
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changed false positive & title
rules/windows/file/file_event/file_event_win_create_hidden_directory.yml
Outdated
Show resolved
Hide resolved
Yo @Scoubi after some testing it seems that Sysmon doesn't capture the ADS creation Here is an example event <EventData>
<Data Name="RuleName">-</Data>
<Data Name="UtcTime">2023-09-07 12:57:59.726</Data>
<Data Name="ProcessGuid">{351a8fc0-c031-64f9-2989-000000001800}</Data>
<Data Name="ProcessId">41900</Data>
<Data Name="Image">C:\Windows\System32\cmd.exe</Data>
<Data Name="TargetFilename">C:\Users\xxxx\AppData\Local\Temp\indexalloc\...$.......</Data>
<Data Name="CreationUtcTime">2023-09-07 12:57:59.726</Data>
<Data Name="User">xxxx</Data>
</EventData> I tried with the ETW provider
Did you get anything from your side? |
As discussed with scoubi on this. The CrowdStrike for example is able to catch this using its CommandHistory field which hooks into CMD console. See 1 and 2 for general information. Since some EDRs are able to catch this. We'll add this rule for coverage as the technique is interesting. |
rules/windows/file/file_event/file_event_win_susp_hidden_dir_index_allocation.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_susp_hidden_dir_index_allocation.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: phantinuss <[email protected]>
Detection for https://twitter.com/pfiatde/status/1681977680688738305
Summary of the Pull Request
This PR adds detections related to abuse of "::$index_allocation" stream to hide folders and files from tooling such as
explorer.exe
Changelog
new: Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream
new: Potential Hidden Directory Creation Via NTFS INDEX_ALLOCATION Stream - CLI
Example Log Event
N/A
Fixed Issues
N/A
SigmaHQ Rule Creation Conventions