-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdataStore.json
3215 lines (3215 loc) · 665 KB
/
dataStore.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"rules/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse.yml",
"creation_Date": "2024-08-07T17:54:57.119559",
"modification_Date": "2024-08-07T20:37:07.379109",
"lastUpdate_Date": "2024-08-07T20:37:07.379117",
"sigmaRule": "title: AgentExecutor PowerShell Execution\nid: 7efd2c8d-8b18-45b7-947d-adfe9ed04f61\nrelated:\n - id: c0b40568-b1e9-4b03-8d6c-b096da6da9ab\n type: similar\nstatus: test\ndescription: Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy \"Bypass\" or any binary named \"powershell.exe\" located in the path provided by 6th positional argument\nauthor: Nasreddine Bencherchali (Nextron Systems), memory-shards\nreferences:\n - https://twitter.com/lefterispan/status/1286259016436514816\n - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/\n - https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension\n - https://twitter.com/jseerden/status/1247985304667066373/photo/1\ndate: 2022/12/24\nmodified: 2024/08/07\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image: '\\AgentExecutor.exe'\n - OriginalFileName: 'AgentExecutor.exe'\n selection_cli:\n # Example:\n # AgentExecutor.exe -powershell [scriptPath] [outputFilePath] [errorFilePath] [timeoutFilePath] [timeoutSeconds] [powershellPath] [enforceSignatureCheck] [runAs32BitOn64]\n # Note:\n # - If [timeoutSeconds] is NULL then it defaults to 60000\n # - If [enforceSignatureCheck] is:\n # - \"NULL\" or \"1\" then a PowerShell instance is spawned with the args: \"-NoProfile -executionPolicy allsigned -file \"\n # - Else a PowerShell instance is spawned with the args: \"-NoProfile -executionPolicy bypass -file \"\n # - [powershellPath] is always concatendated to \"powershell.exe\"\n CommandLine|contains:\n - ' -powershell' # Also covers the \"-powershellDetection\" flag\n - ' -remediationScript'\n filter_main_intune:\n ParentImage|endswith: '\\Microsoft.Management.Services.IntuneWindowsAgent.exe'\n condition: all of selection_* and not 1 of filter_main_*\nfalsepositives:\n - Legitimate use via Intune management. You exclude script paths and names to reduce FP rate\nlevel: medium\n",
"summary": "This Sigma rule detects the execution of the AgentExecutor.exe binary, which can be abused to execute PowerShell scripts with the ExecutionPolicy \"Bypass\" or any binary named \"powershell.exe\" located in a specified path. It provides detection criteria for the process creation event on Windows systems, including command line arguments and parent process filtering. The rule includes references and information on how to adjust for false positives related to legitimate use via Intune management.",
"modification_count": 5,
"comment_history": [
"Merge PR #4955 from @joshnck - Fix `agentexecutor.exe` related rules"
]
},
"rules/windows/process_creation/proc_creation_win_agentexecutor_susp_usage.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_agentexecutor_susp_usage.yml",
"creation_Date": "2024-08-07T17:54:58.773900",
"modification_Date": "2024-08-07T20:37:07.379197",
"lastUpdate_Date": "2024-08-07T20:37:07.379203",
"sigmaRule": "title: Suspicious AgentExecutor PowerShell Execution\nid: c0b40568-b1e9-4b03-8d6c-b096da6da9ab\nrelated:\n - id: 7efd2c8d-8b18-45b7-947d-adfe9ed04f61\n type: similar\nstatus: test\ndescription: Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy \"Bypass\" or any binary named \"powershell.exe\" located in the path provided by 6th positional argument\nauthor: Nasreddine Bencherchali (Nextron Systems), memory-shards\nreferences:\n - https://twitter.com/lefterispan/status/1286259016436514816\n - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Agentexecutor/\n - https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension\n - https://twitter.com/jseerden/status/1247985304667066373/photo/1\ndate: 2022/12/24\nmodified: 2024/08/07\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith: '\\AgentExecutor.exe'\n - OriginalFileName: 'AgentExecutor.exe'\n selection_cli:\n # Example:\n # AgentExecutor.exe -powershell [scriptPath] [outputFilePath] [errorFilePath] [timeoutFilePath] [timeoutSeconds] [powershellPath] [enforceSignatureCheck] [runAs32BitOn64]\n # Note:\n # - If [timeoutSeconds] is NULL then it defaults to 60000\n # - If [enforceSignatureCheck] is:\n # - \"NULL\" or \"1\" then a PowerShell instance is spawned with the args: \"-NoProfile -executionPolicy allsigned -file \"\n # - Else a PowerShell instance is spawned with the args: \"-NoProfile -executionPolicy bypass -file \"\n # - [powershellPath] is always concatendated to \"powershell.exe\"\n CommandLine|contains:\n - ' -powershell' # Also covers the \"-powershellDetection\" flag\n - ' -remediationScript'\n filter_main_pwsh:\n CommandLine|contains:\n - 'C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\'\n - 'C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\'\n filter_main_intune:\n ParentImage|endswith: '\\Microsoft.Management.Services.IntuneWindowsAgent.exe'\n condition: all of selection_* and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects the execution of the AgentExecutor.exe binary, which can be used as a LOLBIN to execute PowerShell scripts with the \"Bypass\" ExecutionPolicy or any binary named \"powershell.exe\" located in a specific path. The rule includes specific indicators in the process creation logs to identify this suspicious activity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4955 from @joshnck - Fix `agentexecutor.exe` related rules"
]
},
"rules/windows/registry/registry_set/registry_set_persistence_outlook_homepage.yml": {
"filename": "rules/windows/registry/registry_set/registry_set_persistence_outlook_homepage.yml",
"creation_Date": "2024-08-07T17:54:59.815710",
"modification_Date": "2024-08-07T20:37:07.393284",
"lastUpdate_Date": "2024-08-07T20:37:07.393290",
"sigmaRule": "title: Potential Persistence Via Outlook Home Page\nid: ddd171b5-2cc6-4975-9e78-f0eccd08cc76\nrelated:\n - id: 487bb375-12ef-41f6-baae-c6a1572b4dd1\n type: similar\nstatus: test\ndescription: |\n Detects potential persistence activity via outlook home page.\n An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.\nreferences:\n - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=70\n - https://support.microsoft.com/en-us/topic/outlook-home-page-feature-is-missing-in-folder-properties-d207edb7-aa02-46c5-b608-5d9dbed9bd04?ui=en-us&rs=en-us&ad=us\n - https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change\nauthor: Tobias Michalski (Nextron Systems), David Bertho (@dbertho) & Eirik Sveen (@0xSV1), Storebrand\ndate: 2021/06/09\nmodified: 2024/08/07\ntags:\n - attack.persistence\n - attack.t1112\nlogsource:\n product: windows\n category: registry_set\ndetection:\n selection:\n TargetObject|contains|all:\n - '\\Software\\Microsoft\\Office\\'\n - '\\Outlook\\WebView\\'\n TargetObject|endswith: '\\URL'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects potential persistence activity via the Outlook home page, where an attacker can set a custom home page to achieve code execution and persistence by editing the WebView registry keys. The rule looks for registry changes in the path '\\Software\\Microsoft\\Office\\' and '\\Outlook\\WebView\\' that end with '\\URL'. The detection level is high, and there are no known false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4941 from @dbertho - Update Outlook Persistence related rules / Specula"
]
},
"rules/windows/registry/registry_set/registry_set_persistence_outlook_todaypage.yml": {
"filename": "rules/windows/registry/registry_set/registry_set_persistence_outlook_todaypage.yml",
"creation_Date": "2024-08-07T17:55:01.204876",
"modification_Date": "2024-08-07T20:37:07.393370",
"lastUpdate_Date": "2024-08-07T20:37:07.393374",
"sigmaRule": "title: Potential Persistence Via Outlook Today Page\nid: 487bb375-12ef-41f6-baae-c6a1572b4dd1\nrelated:\n - id: ddd171b5-2cc6-4975-9e78-f0eccd08cc76\n type: similar\nstatus: test\ndescription: |\n Detects potential persistence activity via outlook today page.\n An attacker can set a custom page to execute arbitrary code and link to it via the registry values \"URL\" and \"UserDefinedUrl\".\nreferences:\n - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=74\n - https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change\nauthor: Tobias Michalski (Nextron Systems), David Bertho (@dbertho) & Eirik Sveen (@0xSV1), Storebrand\ndate: 2021/06/10\nmodified: 2024/08/07\ntags:\n - attack.persistence\n - attack.t1112\nlogsource:\n product: windows\n category: registry_set\ndetection:\n selection_main:\n TargetObject|contains|all:\n - 'Software\\Microsoft\\Office\\'\n - '\\Outlook\\Today\\'\n selection_value_stamp:\n TargetObject|endswith: '\\Stamp'\n Details: 'DWORD (0x00000001)'\n selection_value_url:\n TargetObject|endswith:\n - '\\URL'\n - '\\UserDefinedUrl'\n filter_main_office:\n Image|startswith:\n - 'C:\\Program Files\\Common Files\\Microsoft Shared\\ClickToRun\\'\n - 'C:\\Program Files\\Common Files\\Microsoft Shared\\ClickToRun\\Updates\\'\n Image|endswith: '\\OfficeClickToRun.exe'\n condition: selection_main and 1 of selection_value_* and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects potential persistence activity via the Outlook Today page by monitoring registry values \"URL\" and \"UserDefinedUrl\" for arbitrary code execution. The rule looks for specific registry paths and values related to Microsoft Office, excluding certain known legitimate processes associated with Office. The rule has a high level of detection and was authored by Tobias Michalski, David Bertho, and Eirik Sveen from Storebrand.",
"modification_count": 5,
"comment_history": [
"Merge PR #4941 from @dbertho - Update Outlook Persistence related rules / Specula"
]
},
"rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly.yml",
"creation_Date": "2024-08-07T17:55:02.703396",
"modification_Date": "2024-08-07T20:37:07.407924",
"lastUpdate_Date": "2024-08-07T20:37:07.407930",
"sigmaRule": "title: System File Execution Location Anomaly\nid: e4a6b256-3e47-40fc-89d2-7a477edd6915\nrelated:\n - id: be58d2e2-06c8-4f58-b666-b99f6dc3b6cd # Dedicated SvcHost rule\n type: derived\nstatus: experimental\ndescription: |\n Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.\nreferences:\n - https://twitter.com/GelosSnake/status/934900723426439170\n - https://asec.ahnlab.com/en/39828/\nauthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)\ndate: 2017/11/27\nmodified: 2024/07/16\ntags:\n - attack.defense_evasion\n - attack.t1036\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith:\n - '\\atbroker.exe'\n - '\\audiodg.exe'\n - '\\bcdedit.exe'\n - '\\bitsadmin.exe'\n - '\\certreq.exe'\n - '\\certutil.exe'\n - '\\cmstp.exe'\n - '\\conhost.exe'\n - '\\consent.exe'\n - '\\cscript.exe'\n - '\\csrss.exe'\n - '\\dashost.exe'\n - '\\defrag.exe'\n - '\\dfrgui.exe' # Was seen used by Lazarus Group - https://asec.ahnlab.com/en/39828/\n - '\\dism.exe'\n - '\\dllhost.exe'\n - '\\dllhst3g.exe'\n - '\\dwm.exe'\n - '\\eventvwr.exe'\n - '\\logonui.exe'\n - '\\LsaIso.exe'\n - '\\lsass.exe'\n - '\\lsm.exe'\n - '\\msiexec.exe'\n - '\\ntoskrnl.exe'\n - '\\powershell_ise.exe'\n - '\\powershell.exe'\n - '\\pwsh.exe'\n - '\\regsvr32.exe'\n - '\\rundll32.exe'\n - '\\runonce.exe'\n - '\\RuntimeBroker.exe'\n - '\\schtasks.exe'\n - '\\services.exe'\n - '\\sihost.exe'\n - '\\smartscreen.exe'\n - '\\smss.exe'\n - '\\spoolsv.exe'\n - '\\svchost.exe'\n - '\\taskhost.exe'\n - '\\Taskmgr.exe'\n - '\\userinit.exe'\n - '\\wininit.exe'\n - '\\winlogon.exe'\n - '\\winver.exe'\n - '\\wlanext.exe'\n - '\\wscript.exe'\n - '\\wsl.exe'\n - '\\wsmprovhost.exe' # Was seen used by Lazarus Group - https://asec.ahnlab.com/en/39828/\n filter_main_generic:\n Image|startswith:\n - 'C:\\$WINDOWS.~BT\\'\n - 'C:\\$WinREAgent\\'\n - 'C:\\Windows\\SoftwareDistribution\\'\n - 'C:\\Windows\\System32\\'\n - 'C:\\Windows\\SystemTemp\\'\n - 'C:\\Windows\\SysWOW64\\'\n - 'C:\\Windows\\uus\\'\n - 'C:\\Windows\\WinSxS\\'\n filter_optional_system32:\n Image|contains: '\\SystemRoot\\System32\\'\n filter_main_powershell:\n Image:\n - 'C:\\Program Files\\PowerShell\\7\\pwsh.exe'\n - 'C:\\Program Files\\PowerShell\\7-preview\\pwsh.exe'\n filter_main_wsl_windowsapps:\n Image|startswith: 'C:\\Program Files\\WindowsApps\\MicrosoftCorporationII.WindowsSubsystemForLinux'\n Image|endswith: '\\wsl.exe'\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects the execution of a Windows system binary from an uncommon location, which could indicate a potential security threat. The rule specifies a list of system binaries to monitor and includes filters for common system directories, PowerShell, and Windows Subsystem for Linux. If the binary is executed from an unexpected location, the rule triggers an alert.",
"modification_count": 7,
"comment_history": [
"Merge PR #4946 from @swachchhanda000 - Add `Suspicious Process Masquerading As SvcHost.EXE`",
"Merge branch 'SigmaHQ:master' into master",
"Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes"
]
},
"rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml",
"creation_Date": "2024-08-07T17:55:03.929090",
"modification_Date": "2024-08-07T20:37:07.408005",
"lastUpdate_Date": "2024-08-07T20:37:07.408009",
"sigmaRule": "title: Suspicious Process Masquerading As SvcHost.EXE\nid: be58d2e2-06c8-4f58-b666-b99f6dc3b6cd\nrelated:\n - id: 01d2e2a1-5f09-44f7-9fc1-24faa7479b6d\n type: similar\n - id: e4a6b256-3e47-40fc-89d2-7a477edd6915\n type: similar\nstatus: experimental\ndescription: |\n Detects a suspicious process that is masquerading as the legitimate \"svchost.exe\" by naming its binary \"svchost.exe\" and executing from an uncommon location.\n Adversaries often disguise their malicious binaries by naming them after legitimate system processes like \"svchost.exe\" to evade detection.\nreferences:\n - https://tria.ge/240731-jh4crsycnb/behavioral2\n - https://redcanary.com/blog/threat-detection/process-masquerading/\nauthor: Swachchhanda Shrawan Poudel\ndate: 2024/08/07\ntags:\n - attack.defense_evasion\n - attack.t1036.005\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n Image|endswith: '\\svchost.exe'\n filter_main_img_location:\n Image:\n - 'C:\\Windows\\System32\\svchost.exe'\n - 'C:\\Windows\\SysWOW64\\svchost.exe'\n filter_main_ofn:\n OriginalFileName: 'svchost.exe'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Unlikely\nlevel: high\n",
"summary": "This Sigma Rule detects a suspicious process masquerading as the legitimate \"svchost.exe\" by using that name for its binary and executing from an uncommon location. Adversaries often use this tactic to avoid detection. The rule provides filters based on image location and original file name to reduce false positives. The detection level is high, and false positives are considered unlikely.",
"modification_count": 5,
"comment_history": [
"Merge PR #4946 from @swachchhanda000 - Add `Suspicious Process Masquerading As SvcHost.EXE`"
]
},
"rules/windows/image_load/image_load_side_load_dbgmodel.yml": {
"filename": "rules/windows/image_load/image_load_side_load_dbgmodel.yml",
"creation_Date": "2024-08-07T17:55:05.908394",
"modification_Date": "2024-08-07T20:37:07.421380",
"lastUpdate_Date": "2024-08-07T20:37:07.421385",
"sigmaRule": "title: Potential DLL Sideloading Of DbgModel.DLL\nid: fef394cd-f44d-4040-9b18-95d92fe278c0\nstatus: experimental\ndescription: Detects potential DLL sideloading of \"DbgModel.dll\"\nreferences:\n - https://hijacklibs.net/entries/microsoft/built-in/dbgmodel.html\nauthor: Gary Lobermier\ndate: 2024/07/11\nmodified: 2024/08/06\ntags:\n - attack.defense_evasion\n - attack.t1574.002\nlogsource:\n product: windows\n category: image_load\ndetection:\n selection:\n ImageLoaded|endswith: '\\dbgmodel.dll'\n filter_main_generic:\n ImageLoaded|startswith:\n - 'C:\\Windows\\System32\\'\n - 'C:\\Windows\\SysWOW64\\'\n - 'C:\\Windows\\WinSxS\\'\n filter_optional_windbg:\n ImageLoaded|startswith: 'C:\\Program Files\\WindowsApps\\Microsoft.WinDbg_'\n filter_optional_windows_kits:\n ImageLoaded|startswith:\n - 'C:\\Program Files (x86)\\Windows Kits\\'\n - 'C:\\Program Files\\Windows Kits\\'\n filter_optional_dell_instrumentation:\n ImageLoaded|startswith: 'C:\\Program Files\\Dell\\DTP\\InstrumentationSubAgent\\'\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Legitimate applications loading their own versions of the DLL mentioned in this rule\nlevel: medium\n",
"summary": "This Sigma Rule detects potential DLL sideloading of \"DbgModel.dll\" by monitoring image loads in Windows systems. It provides filters for specific file paths where the DLL should be loaded from to reduce false positives. The rule was authored by Gary Lobermier and last modified on August 6, 2024. The level of severity is marked as medium.",
"modification_count": 7,
"comment_history": [
"Merge PR #4952 from @joshnck - Fix `Potential DLL Sideloading Of DbgModel.DLL`",
"Merge PR #4928 from @nasbench - Fix FPs and issues found in testing",
"Merge PR #4906 from @fornotes - Update and add new dll sideloading rules"
]
},
"rules/windows/builtin/security/win_security_atsvc_task.yml": {
"filename": "rules/windows/builtin/security/win_security_atsvc_task.yml",
"creation_Date": "2024-08-07T17:55:07.074734",
"modification_Date": "2024-08-07T20:37:07.433727",
"lastUpdate_Date": "2024-08-07T20:37:07.433733",
"sigmaRule": "title: Remote Task Creation via ATSVC Named Pipe\nid: f6de6525-4509-495a-8a82-1f8b0ed73a00\nstatus: test\ndescription: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe\nreferences:\n - https://web.archive.org/web/20230409194125/https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html\nauthor: Samir Bousseaden\ndate: 2019/04/03\nmodified: 2024/08/01\ntags:\n - attack.lateral_movement\n - attack.persistence\n - car.2013-05-004\n - car.2015-04-001\n - attack.t1053.002\nlogsource:\n product: windows\n service: security\n definition: 'The advanced audit policy setting \"Object Access > Audit Detailed File Share\" must be configured for Success/Failure'\ndetection:\n selection:\n EventID: 5145\n ShareName: '\\\\\\\\\\*\\\\IPC$' # looking for the string \\\\*\\IPC$\n RelativeTargetName: atsvc\n AccessList|contains: 'WriteData'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma Rule detects remote task creation via at.exe or API interacting with ATSVC named pipe on a Windows security service. The rule looks for certain Event IDs, Share Names, and access permissions to identify this activity. The rule level is medium and there are currently no known false positives. It was authored by Samir Bousseaden and last modified on 2024/08/01.",
"modification_count": 6,
"comment_history": [
"Merge PR #4940 from @fukusuket - Update unreachable references `blog.menasec[.]net`",
"Merge PR #4945 from @GtUGtHGtNDtEUaE - Fix typo in field name for rules leveraging EID 5145"
]
},
"rules/windows/builtin/security/win_security_gpo_scheduledtasks.yml": {
"filename": "rules/windows/builtin/security/win_security_gpo_scheduledtasks.yml",
"creation_Date": "2024-08-07T17:55:08.792096",
"modification_Date": "2024-08-07T20:37:07.433814",
"lastUpdate_Date": "2024-08-07T20:37:07.433818",
"sigmaRule": "title: Persistence and Execution at Scale via GPO Scheduled Task\nid: a8f29a7b-b137-4446-80a0-b804272f3da2\nstatus: test\ndescription: Detect lateral movement using GPO scheduled task, usually used to deploy ransomware at scale\nreferences:\n - https://twitter.com/menasec1/status/1106899890377052160\n - https://www.secureworks.com/blog/ransomware-as-a-distraction\nauthor: Samir Bousseaden\ndate: 2019/04/03\nmodified: 2024/08/01\ntags:\n - attack.persistence\n - attack.lateral_movement\n - attack.t1053.005\nlogsource:\n product: windows\n service: security\n definition: 'The advanced audit policy setting \"Object Access > Audit Detailed File Share\" must be configured for Success/Failure'\ndetection:\n selection:\n EventID: 5145\n ShareName: '\\\\\\\\\\*\\\\SYSVOL' # looking for the string \\\\*\\SYSVOL\n RelativeTargetName|endswith: 'ScheduledTasks.xml'\n AccessList|contains:\n - 'WriteData'\n - '%%4417'\n condition: selection\nfalsepositives:\n - If the source IP is not localhost then it's super suspicious, better to monitor both local and remote changes to GPO scheduledtasks\nlevel: high\n",
"summary": "This Sigma Rule detects lateral movement using GPO scheduled tasks, commonly used to deploy ransomware at scale. It looks for EventID 5145 with a ShareName containing \\\\*\\SYSVOL, ending with ScheduledTasks.xml, and containing specific access permissions. False positives may occur if the source IP is not localhost, so monitoring both local and remote changes to GPO scheduled tasks is recommended.",
"modification_count": 5,
"comment_history": [
"Merge PR #4945 from @GtUGtHGtNDtEUaE - Fix typo in field name for rules leveraging EID 5145"
]
},
"rules/windows/builtin/security/win_security_svcctl_remote_service.yml": {
"filename": "rules/windows/builtin/security/win_security_svcctl_remote_service.yml",
"creation_Date": "2024-08-07T17:55:09.918386",
"modification_Date": "2024-08-07T20:37:07.433877",
"lastUpdate_Date": "2024-08-07T20:37:07.433880",
"sigmaRule": "title: Remote Service Activity via SVCCTL Named Pipe\nid: 586a8d6b-6bfe-4ad9-9d78-888cd2fe50c3\nstatus: test\ndescription: Detects remote service activity via remote access to the svcctl named pipe\nreferences:\n - https://web.archive.org/web/20230329155141/https://blog.menasec.net/2019/03/threat-hunting-26-remote-windows.html\nauthor: Samir Bousseaden\ndate: 2019/04/03\nmodified: 2024/08/01\ntags:\n - attack.lateral_movement\n - attack.persistence\n - attack.t1021.002\nlogsource:\n product: windows\n service: security\n definition: 'The advanced audit policy setting \"Object Access > Audit Detailed File Share\" must be configured for Success/Failure'\ndetection:\n selection:\n EventID: 5145\n ShareName: '\\\\\\\\\\*\\\\IPC$' # looking for the string \\\\*\\IPC$\n RelativeTargetName: svcctl\n AccessList|contains: 'WriteData'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma Rule detects remote service activity via remote access to the svcctl named pipe on a Windows system. It looks for specific event logs with EventID 5145, checking for the presence of '\\\\*\\IPC$' in ShareName, 'svcctl' in RelativeTargetName, and 'WriteData' in AccessList. The rule requires the advanced audit policy setting \"Object Access > Audit Detailed File Share\" to be configured for Success/Failure. The rule's author is Samir Bousseaden and it was last modified on August 1, 2024.",
"modification_count": 6,
"comment_history": [
"Merge PR #4940 from @fukusuket - Update unreachable references `blog.menasec[.]net`",
"Merge PR #4945 from @GtUGtHGtNDtEUaE - Fix typo in field name for rules leveraging EID 5145"
]
},
"rules-placeholder/windows/process_creation/proc_creation_win_userdomain_variable_enumeration.yml": {
"filename": "rules-placeholder/windows/process_creation/proc_creation_win_userdomain_variable_enumeration.yml",
"creation_Date": "2024-08-07T17:55:12.036927",
"modification_Date": "2024-08-07T20:37:07.446400",
"lastUpdate_Date": "2024-08-07T20:37:07.446405",
"sigmaRule": "title: Userdomain Variable Enumeration\nid: 43311e65-84d8-42a5-b3d4-c94d9b67038f\nstatus: test\ndescription: Detects suspicious enumeration of the domain the user is associated with.\nreferences:\n - https://www.arxiv-vanity.com/papers/2008.04676/\n - https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter/\nauthor: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'\ndate: 2023/02/09\nmodified: 2024/08/01\ntags:\n - attack.discovery\n - attack.t1016\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n CommandLine|contains: 'echo '\n CommandLine|contains|expand: '%userdomain%'\n condition: selection\nfalsepositives:\n - Certain scripts or applications may leverage this.\nlevel: low\n",
"summary": "This Sigma Rule detects suspicious enumeration of the domain the user is associated with by looking for processes that contain the 'echo' command and the user domain variable. This can indicate potential malicious activity. False positives may occur with legitimate scripts or applications that use this functionality.",
"modification_count": 5,
"comment_history": [
"Merge PR #4944 from @YamatoSecurity - Add missing `expand` modifier"
]
},
"rules-emerging-threats/2024/Malware/Raspberry-Robin/image_load_malware_raspberry_robin_side_load_aclui_oleview.yml": {
"filename": "rules-emerging-threats/2024/Malware/Raspberry-Robin/image_load_malware_raspberry_robin_side_load_aclui_oleview.yml",
"creation_Date": "2024-08-07T17:55:13.005405",
"modification_Date": "2024-08-07T20:37:07.459034",
"lastUpdate_Date": "2024-08-07T20:37:07.459042",
"sigmaRule": "title: Potential Raspberry Robin Aclui Dll SideLoading\nid: 0f3a9db2-c17a-480e-a723-d1f1c547ab6a\nstatus: experimental\ndescription: |\n Detects potential sideloading of malicious \"aclui.dll\" by OleView.This behavior was observed in Raspberry-Robin variants reported by chekpoint research on Feburary 2024.\nreferences:\n - https://research.checkpoint.com/2024/raspberry-robin-keeps-riding-the-wave-of-endless-1-days/\n - https://globetech.biz/index.php/2023/05/19/evading-edr-by-dll-sideloading-in-csharp/\n - https://decoded.avast.io/threatintel/apt-treasure-trove-avast-suspects-chinese-apt-group-mustang-panda-is-collecting-data-from-burmese-government-agencies-and-opposition-groups/\n - https://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/\n - https://strontic.github.io/xcyclopedia/library/aclui.dll-F883E9CA757B622B032FDCA5BF33D0DF.html\nauthor: Swachchhanda Shrawan Poudel\ndate: 2024/07/31\ntags:\n - detection.emerging_threats\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1574.001\n - attack.t1574.002\nlogsource:\n category: image_load\n product: windows\ndetection:\n selection:\n Image|endswith: '\\OleView.exe'\n ImageLoaded|endswith: '\\aclui.dll'\n filter_main_legit_oleview_paths:\n Image|startswith:\n - 'C:\\Program Files (x86)\\Windows Kits\\'\n - 'C:\\Program Files\\Microsoft SDKs\\'\n filter_optional_known_oleview_paths:\n Image|contains: '\\Windows Resource Kit\\'\n filter_main_is_signed:\n Signed: 'true'\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects potential sideloading of malicious \"aclui.dll\" by OleView, as observed in Raspberry-Robin variants reported by chekpoint research in February 2024. The rule specifies selection criteria for image loading and filters out legitimate OleView paths, requiring the image to not meet any of the filter conditions to trigger the detection. The rule is tagged for emerging threats, defense evasion, privilege escalation, and specific attack techniques.",
"modification_count": 5,
"comment_history": [
"Merge PR #4763 from @swachchhanda000 - New rules related to Raspberry Robin TTPs"
]
},
"rules-emerging-threats/2024/Malware/Raspberry-Robin/registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper.yml": {
"filename": "rules-emerging-threats/2024/Malware/Raspberry-Robin/registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper.yml",
"creation_Date": "2024-08-07T17:55:14.313744",
"modification_Date": "2024-08-07T20:37:07.459125",
"lastUpdate_Date": "2024-08-07T20:37:07.459131",
"sigmaRule": "title: Potential Raspberry Robin Registry Set Internet Settings ZoneMap\nid: 16a4c7b3-4681-49d0-8d58-3e9b796dcb43\nstatus: experimental\ndescription: |\n Detects registry modifications related to the proxy configuration of the system, potentially associated with the Raspberry Robin malware, as seen in campaigns running in Q1 2024.\n Raspberry Robin may alter proxy settings to circumvent security measures, ensuring unhindered connection with Command and Control servers for maintaining control over compromised systems if there are any proxy settings that are blocking connections.\nreferences:\n - https://tria.ge/240225-jlylpafb24/behavioral1/analog?main_event=Registry&op=SetValueKeyInt\n - https://tria.ge/240307-1hlldsfe7t/behavioral2/analog?main_event=Registry&op=SetValueKeyInt\n - https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_ProxyByPass\n - https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_UNCAsIntranet\n - https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_IncludeUnspecifiedLocalSites\n - https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::SecurityPage_AutoDetect\n - https://bazaar.abuse.ch/browse/signature/RaspberryRobin/\nauthor: Swachchhanda Shrawan Poudel\ndate: 2024/07/31\ntags:\n - detection.emerging_threats\n - attack.t1112\n - attack.defense_evasion\nlogsource:\n category: registry_set\n product: windows\n definition: 'Requirements: The registry key \"\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" and its sub keys must be monitored'\ndetection:\n selection_registry_image:\n - Image|contains:\n - '\\AppData\\Local\\Temp\\'\n - '\\Downloads\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n - Image|endswith: '\\control.exe'\n selection_registry_object:\n TargetObject|contains: '\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\'\n selection_value_enable:\n TargetObject|endswith:\n - '\\IntranetName'\n - '\\ProxyByPass'\n - '\\UNCAsIntranet'\n Details|contains: 'DWORD (0x00000001)'\n selection_value_disable:\n TargetObject|endswith: '\\AutoDetect'\n Details|contains: 'DWORD (0x00000000)'\n condition: all of selection_registry_* and 1 of selection_value_*\nfalsepositives:\n - Unknown\n# Note: can be upgraded to medium after an initial baseline\nlevel: low\n",
"summary": "This Sigma Rule detects registry modifications related to proxy configuration on a system, potentially linked to the Raspberry Robin malware. The malware may change proxy settings to bypass security measures and maintain control over compromised systems. The rule specifies criteria for monitoring registry keys and values to identify unauthorized changes. It provides references to behavioral patterns associated with Raspberry Robin and recommends monitoring specific registry keys related to Internet Settings ZoneMap. The rule is classified as experimental and has a low level of severity but can be upgraded to medium after establishing a baseline.",
"modification_count": 5,
"comment_history": [
"Merge PR #4763 from @swachchhanda000 - New rules related to Raspberry Robin TTPs"
]
},
"rules-threat-hunting/windows/file/file_event/file_event_win_dump_file_creation.yml": {
"filename": "rules-threat-hunting/windows/file/file_event/file_event_win_dump_file_creation.yml",
"creation_Date": "2024-08-07T17:55:16.205407",
"modification_Date": "2024-08-07T20:37:07.489222",
"lastUpdate_Date": "2024-08-07T20:37:07.489227",
"sigmaRule": "title: DMP/HDMP File Creation\nid: 3a525307-d100-48ae-b3b9-0964699d7f97\nstatus: test\ndescription: Detects the creation of a file with the \".dmp\"/\".hdmp\" extension. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.\nreferences:\n - https://learn.microsoft.com/en-us/windows/win32/wer/collecting-user-mode-dumps\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/07\ntags:\n - attack.defense_evasion\n - detection.threat_hunting\nlogsource:\n category: file_event\n product: windows\ndetection:\n selection:\n TargetFilename|endswith:\n - '.dmp'\n - '.dump'\n - '.hdmp'\n condition: selection\nfalsepositives:\n - Likely during crashes of software\nlevel: low\n",
"summary": "This Sigma Rule detects the creation of files with the \".dmp\"/\".hdmp\" extension, which are often created by software during a crash. Memory dumps can contain sensitive information such as credentials. It is recommended to determine the source of the crash. The rule applies to Windows file events and has a low severity level.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules-threat-hunting/windows/file/file_event/file_event_win_scheduled_task_creation.yml": {
"filename": "rules-threat-hunting/windows/file/file_event/file_event_win_scheduled_task_creation.yml",
"creation_Date": "2024-08-07T17:55:17.192458",
"modification_Date": "2024-08-07T20:37:07.489306",
"lastUpdate_Date": "2024-08-07T20:37:07.489310",
"sigmaRule": "title: Scheduled Task Created - FileCreation\nid: a762e74f-4dce-477c-b023-4ed81df600f9\nstatus: test\ndescription: Detects the creation of a scheduled task via file creation.\nreferences:\n - https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/task_scheduling/\n - https://posts.specterops.io/abstracting-scheduled-tasks-3b6451f6a1c5\nauthor: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team\ndate: 2023/09/27\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1053.005\n - attack.s0111\n - car.2013-08-001\n - detection.threat_hunting\nlogsource:\n product: windows\n category: file_event\ndetection:\n selection:\n TargetFilename|contains:\n - ':\\Windows\\System32\\Tasks\\'\n - ':\\Windows\\SysWOW64\\Tasks\\'\n - ':\\Windows\\Tasks\\'\n condition: selection\nfalsepositives:\n - Normal behaviour on Windows\nlevel: low\n",
"summary": "The Sigma rule detects the creation of a scheduled task through file creation on a Windows system. It provides references to resources for further information on task scheduling and abstracting scheduled tasks. The rule is authored by the Center for Threat Informed Defense (CTID) Summiting the Pyramid Team and is tagged for various types of attacks and detections. The rule specifies that normal behavior on Windows may trigger false positives and is rated as a low-level detection.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules-threat-hunting/windows/process_creation/proc_creation_win_diskshadow_child_process.yml": {
"filename": "rules-threat-hunting/windows/process_creation/proc_creation_win_diskshadow_child_process.yml",
"creation_Date": "2024-08-07T17:55:18.649440",
"modification_Date": "2024-08-07T20:37:07.489376",
"lastUpdate_Date": "2024-08-07T20:37:07.489380",
"sigmaRule": "title: Diskshadow Child Process Spawned\nid: 56b1dde8-b274-435f-a73a-fb75eb81262a\nrelated:\n - id: fa1a7e52-3d02-435b-81b8-00da14dd66c1 # Diskshadow Script Mode - Execution From Potential Suspicious Location\n type: similar\n - id: 1dde5376-a648-492e-9e54-4241dd9b0c7f # Diskshadow Script Mode - Uncommon Script Extension Execution\n type: similar\n - id: 9f546b25-5f12-4c8d-8532-5893dcb1e4b8 # Potentially Suspicious Child Process Of DiskShadow.EXE\n type: similar\n - id: 0c2f8629-7129-4a8a-9897-7e0768f13ff2 # Diskshadow Script Mode Execution\n type: similar\nstatus: test\ndescription: Detects any child process spawning from \"Diskshadow.exe\". This could be due to executing Diskshadow in interpreter mode or script mode and using the \"exec\" flag to launch other applications.\nreferences:\n - https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration\n - https://medium.com/@cyberjyot/lolbin-execution-via-diskshadow-f6ff681a27a4\n - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/diskshadow\nauthor: Harjot Singh @cyb3rjy0t\ndate: 2023/09/15\ntags:\n - attack.defense_evasion\n - attack.t1218\n - attack.execution\n - detection.threat_hunting\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\diskshadow.exe'\n filter_main_werfault:\n Image|endswith: ':\\Windows\\System32\\WerFault.exe'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Likely from legitimate usage of Diskshadow in Interpreter mode.\nlevel: medium\n",
"summary": "This Sigma Rule detects any child process spawning from \"Diskshadow.exe\", which could indicate the use of Diskshadow in interpreter mode or script mode with the \"exec\" flag to launch other applications. The rule includes references to articles detailing VSS evasion, persistence, and Active Directory database extraction using Diskshadow. The rule is authored by Harjot Singh and has a medium level of severity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules-threat-hunting/windows/registry/registry_event/registry_event_scheduled_task_creation.yml": {
"filename": "rules-threat-hunting/windows/registry/registry_event/registry_event_scheduled_task_creation.yml",
"creation_Date": "2024-08-07T17:55:19.812227",
"modification_Date": "2024-08-07T20:37:07.489439",
"lastUpdate_Date": "2024-08-07T20:37:07.489442",
"sigmaRule": "title: Scheduled Task Created - Registry\nid: 93ff0ceb-e0ef-4586-8cd8-a6c277d738e3\nstatus: test\ndescription: Detects the creation of a scheduled task via Registry keys.\nreferences:\n - https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/task_scheduling/\n - https://posts.specterops.io/abstracting-scheduled-tasks-3b6451f6a1c5\nauthor: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team\ndate: 2023/09/27\ntags:\n - attack.execution\n - attack.persistence\n - attack.privilege_escalation\n - attack.s0111\n - attack.t1053.005\n - car.2013-08-001\n - detection.threat_hunting\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n TargetObject|contains:\n - '\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\'\n - '\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\'\n condition: selection\nfalsepositives:\n - Likely as this is a normal behaviour on Windows\nlevel: low\n",
"summary": "This Sigma rule detects the creation of a scheduled task via Registry keys on a Windows system. The rule looks for specific strings in the TargetObject field of registry events related to scheduled tasks. This activity is considered to be a normal behavior on Windows, so there may be false positives. The rule is classified as low severity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/aws/cloudtrail/aws_sso_idp_change.yml": {
"filename": "rules/cloud/aws/cloudtrail/aws_sso_idp_change.yml",
"creation_Date": "2024-08-07T17:55:20.882769",
"modification_Date": "2024-08-07T20:37:07.489500",
"lastUpdate_Date": "2024-08-07T20:37:07.489503",
"sigmaRule": "title: AWS Identity Center Identity Provider Change\nid: d3adb3ef-b7e7-4003-9092-1924c797db35\nstatus: test\ndescription: |\n Detects a change in the AWS Identity Center (FKA AWS SSO) identity provider.\n A change in identity provider allows an attacker to establish persistent access or escalate privileges via user impersonation.\nreferences:\n - https://docs.aws.amazon.com/singlesignon/latest/userguide/app-enablement.html\n - https://docs.aws.amazon.com/singlesignon/latest/userguide/sso-info-in-cloudtrail.html\n - https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsiamidentitycentersuccessortoawssinglesign-on.html\nauthor: Michael McIntyre @wtfender\ndate: 2023/09/27\ntags:\n - attack.persistence\n - attack.t1556\nlogsource:\n product: aws\n service: cloudtrail\ndetection:\n selection:\n eventSource:\n - 'sso-directory.amazonaws.com'\n - 'sso.amazonaws.com'\n eventName:\n - 'AssociateDirectory'\n - 'DisableExternalIdPConfigurationForDirectory'\n - 'DisassociateDirectory'\n - 'EnableExternalIdPConfigurationForDirectory'\n condition: selection\nfalsepositives:\n - Authorized changes to the AWS account's identity provider\nlevel: high\n",
"summary": "This Sigma Rule detects changes in the AWS Identity Center (formerly AWS SSO) identity provider, which could allow attackers to gain persistent access or escalate privileges through user impersonation. The rule looks for specific events in the CloudTrail logs related to changes in the identity provider configuration. False positives may occur if authorized changes are made to the identity provider.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address.yml": {
"filename": "rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address.yml",
"creation_Date": "2024-08-07T17:55:22.116474",
"modification_Date": "2024-08-07T20:37:07.489558",
"lastUpdate_Date": "2024-08-07T20:37:07.489561",
"sigmaRule": "title: Malicious IP Address Sign-In Failure Rate\nid: a3f55ebd-0c01-4ed6-adc0-8fb76d8cd3cd\nstatus: test\ndescription: Indicates sign-in from a malicious IP address based on high failure rates.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#malicious-ip-address\n - https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/07\ntags:\n - attack.t1090\n - attack.command_and_control\nlogsource:\n product: azure\n service: riskdetection\ndetection:\n selection:\n riskEventType: 'maliciousIPAddress'\n condition: selection\nfalsepositives:\n - We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.\nlevel: high\n",
"summary": "This Sigma Rule detects sign-in attempts from a malicious IP address based on high failure rates. It is focused on identifying potential security threats and recommends further investigation of flagged sessions in the context of other user sign-ins. The rule is set at a high level of severity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address_suspicious.yml": {
"filename": "rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address_suspicious.yml",
"creation_Date": "2024-08-07T17:55:23.066922",
"modification_Date": "2024-08-07T20:37:07.489619",
"lastUpdate_Date": "2024-08-07T20:37:07.489623",
"sigmaRule": "title: Malicious IP Address Sign-In Suspicious\nid: 36440e1c-5c22-467a-889b-593e66498472\nstatus: test\ndescription: Indicates sign-in from a malicious IP address known to be malicious at time of sign-in.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#malicious-ip-address\n - https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/07\ntags:\n - attack.t1090\n - attack.command_and_control\nlogsource:\n product: azure\n service: riskdetection\ndetection:\n selection:\n riskEventType: 'suspiciousIPAddress'\n condition: selection\nfalsepositives:\n - We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.\nlevel: high\n",
"summary": "The Sigma Rule with ID 36440e1c-5c22-467a-889b-593e66498472 identifies suspicious sign-ins from a known malicious IP address. It indicates that the sign-in comes from an IP address that is recognized as malicious at the time of the sign-in. The rule is associated with Azure risk detection service and is categorized as a high-level alert. It is recommended to investigate the flagged sessions in the context of other user sign-ins to determine the severity of the threat.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/identity_protection/azure_identity_protection_prt_access.yml": {
"filename": "rules/cloud/azure/identity_protection/azure_identity_protection_prt_access.yml",
"creation_Date": "2024-08-07T17:55:24.636981",
"modification_Date": "2024-08-07T20:37:07.489675",
"lastUpdate_Date": "2024-08-07T20:37:07.489678",
"sigmaRule": "title: Primary Refresh Token Access Attempt\nid: a84fc3b1-c9ce-4125-8e74-bdcdb24021f1\nstatus: test\ndescription: Indicates access attempt to the PRT resource which can be used to move laterally into an organization or perform credential theft\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#possible-attempt-to-access-primary-refresh-token-prt\n - https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/07\ntags:\n - attack.t1528\n - attack.credential_access\nlogsource:\n product: azure\n service: riskdetection\ndetection:\n selection:\n riskEventType: 'attemptedPrtAccess'\n condition: selection\nfalsepositives:\n - This detection is low-volume and is seen infrequently in most organizations. When this detection appears it's high risk, and users should be remediated.\nlevel: high\n",
"summary": "The Sigma Rule indicates an access attempt to the Primary Refresh Token (PRT) resource, which can be used for lateral movement within an organization or for credential theft. The rule includes references to Microsoft documentation on identity protection risks and unusual sign-ins. It applies to Azure's risk detection service and has a high-level detection alert for attempted PRT access. False positives are rare but should be remediated when detected.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/identity_protection/azure_identity_protection_threat_intel.yml": {
"filename": "rules/cloud/azure/identity_protection/azure_identity_protection_threat_intel.yml",
"creation_Date": "2024-08-07T17:55:25.804103",
"modification_Date": "2024-08-07T20:37:07.489730",
"lastUpdate_Date": "2024-08-07T20:37:07.489734",
"sigmaRule": "title: Azure AD Threat Intelligence\nid: a2cb56ff-4f46-437a-a0fa-ffa4d1303cba\nstatus: test\ndescription: Indicates user activity that is unusual for the user or consistent with known attack patterns.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#azure-ad-threat-intelligence-sign-in\n - https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#azure-ad-threat-intelligence-user\n - https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/07\ntags:\n - attack.t1078\n - attack.persistence\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.initial_access\nlogsource:\n product: azure\n service: riskdetection\ndetection:\n selection:\n riskEventType: 'investigationsThreatIntelligence'\n condition: selection\nfalsepositives:\n - We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.\nlevel: high\n",
"summary": "This Sigma Rule for Azure AD Threat Intelligence indicates user activity that is unusual for the user or consistent with known attack patterns. It includes references to Microsoft documentation for more information on the threat intelligence features. The rule focuses on riskEventType 'investigationsThreatIntelligence' in the riskdetection service of Azure. False positives should be investigated in the context of other sign-ins from the user to verify any suspicious activity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_account_stale.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_account_stale.yml",
"creation_Date": "2024-08-07T17:55:27.071721",
"modification_Date": "2024-08-07T20:37:07.489780",
"lastUpdate_Date": "2024-08-07T20:37:07.489783",
"sigmaRule": "title: Stale Accounts In A Privileged Role\nid: e402c26a-267a-45bd-9615-bd9ceda6da85\nstatus: test\ndescription: Identifies when an account hasn't signed in during the past n number of days.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#potential-stale-accounts-in-a-privileged-role\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'staleSignInAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate if potential generic account that cannot be removed.\nlevel: high\n",
"summary": "This Sigma Rule detects stale accounts in a privileged role by identifying when an account has not signed in during a specified number of days. It is a high-level detection rule for Azure Privileged Identity Management (PIM) service. The rule utilizes the riskEventType field to identify staleSignInAlertIncident incidents. False positives may occur for generic accounts that cannot be removed.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_invalid_license.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_invalid_license.yml",
"creation_Date": "2024-08-07T17:55:28.128372",
"modification_Date": "2024-08-07T20:37:07.489904",
"lastUpdate_Date": "2024-08-07T20:37:07.489909",
"sigmaRule": "title: Invalid PIM License\nid: 58af08eb-f9e1-43c8-9805-3ad9b0482bd8\nstatus: test\ndescription: Identifies when an organization doesn't have the proper license for PIM and is out of compliance.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#the-organization-doesnt-have-microsoft-entra-premium-p2-or-microsoft-entra-id-governance\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'invalidLicenseAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate if licenses have expired.\nlevel: high\n",
"summary": "This Sigma Rule detects when an organization does not have the proper license for Microsoft's Privileged Identity Management (PIM) and is out of compliance. It is identified by an 'invalidLicenseAlertIncident' risk event type in the Azure PIM service. False positives may occur if licenses have expired.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_role_assigned_outside_of_pim.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_role_assigned_outside_of_pim.yml",
"creation_Date": "2024-08-07T17:55:29.630513",
"modification_Date": "2024-08-07T20:37:07.489976",
"lastUpdate_Date": "2024-08-07T20:37:07.489982",
"sigmaRule": "title: Roles Assigned Outside PIM\nid: b1bc08d1-8224-4758-a0e6-fbcfc98c73bb\nstatus: test\ndescription: Identifies when a privilege role assignment has taken place outside of PIM and may indicate an attack.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-assigned-outside-of-privileged-identity-management\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'rolesAssignedOutsidePrivilegedIdentityManagementAlertConfiguration'\n condition: selection\nfalsepositives:\n - Investigate where users are being assigned privileged roles outside of Privileged Identity Management and prohibit future assignments from there.\nlevel: high\n",
"summary": "This Sigma Rule detects when a privilege role has been assigned outside of Privileged Identity Management (PIM), which could indicate a potential attack. It recommends investigating these instances and preventing future assignments from occurring in unauthorized locations.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_role_frequent_activation.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_role_frequent_activation.yml",
"creation_Date": "2024-08-07T17:55:30.760550",
"modification_Date": "2024-08-07T20:37:07.490040",
"lastUpdate_Date": "2024-08-07T20:37:07.490043",
"sigmaRule": "title: Roles Activated Too Frequently\nid: 645fd80d-6c07-435b-9e06-7bc1b5656cba\nstatus: test\ndescription: Identifies when the same privilege role has multiple activations by the same user.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-activated-too-frequently\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'sequentialActivationRenewalsAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate where if active time period for a role is set too short.\nlevel: high\n",
"summary": "The Sigma Rule identifies when the same privilege role is activated multiple times by the same user, indicating potential security risks such as privilege escalation or persistence attacks. The rule is specific to Microsoft Azure's Privileged Identity Management (PIM) service and can help organizations detect and prevent unauthorized role activations. The rule provides detection criteria and recommendations for investigating false positives related to short active time periods for roles.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_role_no_mfa_required.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_role_no_mfa_required.yml",
"creation_Date": "2024-08-07T17:55:31.868468",
"modification_Date": "2024-08-07T20:37:07.490095",
"lastUpdate_Date": "2024-08-07T20:37:07.490099",
"sigmaRule": "title: Roles Activation Doesn't Require MFA\nid: 94a66f46-5b64-46ce-80b2-75dcbe627cc0\nstatus: test\ndescription: Identifies when a privilege role can be activated without performing mfa.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'noMfaOnRoleActivationAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate if user is performing MFA at sign-in.\nlevel: high\n",
"summary": "This Sigma Rule is used for identifying when a privilege role can be activated without performing MFA (Multi-Factor Authentication). The rule focuses on detecting instances where MFA is not required for role activation within Azure Privileged Identity Management (PIM). The rule includes detection criteria, potential false positives, and references for further information.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_role_not_used.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_role_not_used.yml",
"creation_Date": "2024-08-07T17:55:32.988027",
"modification_Date": "2024-08-07T20:37:07.490147",
"lastUpdate_Date": "2024-08-07T20:37:07.490150",
"sigmaRule": "title: Roles Are Not Being Used\nid: 8c6ec464-4ae4-43ac-936a-291da66ed13d\nstatus: test\ndescription: Identifies when a user has been assigned a privilege role and are not using that role.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#administrators-arent-using-their-privileged-roles\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'redundantAssignmentAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate if potential generic account that cannot be removed.\nlevel: high\n",
"summary": "This Sigma rule detects when a user has been assigned a privilege role in Azure PIM but is not using that role, which could indicate a security issue. The rule specifies the detection criteria and provides references for further information. It has a high level of severity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/azure/privileged_identity_management/azure_pim_too_many_global_admins.yml": {
"filename": "rules/cloud/azure/privileged_identity_management/azure_pim_too_many_global_admins.yml",
"creation_Date": "2024-08-07T17:55:33.943096",
"modification_Date": "2024-08-07T20:37:07.490197",
"lastUpdate_Date": "2024-08-07T20:37:07.490203",
"sigmaRule": "title: Too Many Global Admins\nid: 7bbc309f-e2b1-4eb1-8369-131a367d67d3\nstatus: test\ndescription: Identifies an event where there are there are too many accounts assigned the Global Administrator role.\nreferences:\n - https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#there-are-too-many-global-administrators\nauthor: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'\ndate: 2023/09/14\ntags:\n - attack.t1078\n - attack.persistence\n - attack.privilege_escalation\nlogsource:\n product: azure\n service: pim\ndetection:\n selection:\n riskEventType: 'tooManyGlobalAdminsAssignedToTenantAlertIncident'\n condition: selection\nfalsepositives:\n - Investigate if threshold setting in PIM is too low.\nlevel: high\n",
"summary": "This Sigma Rule detects an event where there are too many accounts assigned the Global Administrator role in Azure Privileged Identity Management (PIM). It provides a detection condition and suggests investigating the threshold setting in PIM if false positives occur. The rule is categorized as high risk and can help prevent attacks related to privilege escalation and persistence.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/m365/audit/microsoft365_disabling_mfa.yml": {
"filename": "rules/cloud/m365/audit/microsoft365_disabling_mfa.yml",
"creation_Date": "2024-08-07T17:55:35.405155",
"modification_Date": "2024-08-07T20:37:07.490252",
"lastUpdate_Date": "2024-08-07T20:37:07.490257",
"sigmaRule": "title: Disabling Multi Factor Authentication\nid: 60de9b57-dc4d-48b9-a6a0-b39e0469f876\nstatus: test\ndescription: Detects disabling of Multi Factor Authentication.\nreferences:\n - https://research.splunk.com/cloud/c783dd98-c703-4252-9e8a-f19d9f5c949e/\nauthor: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule)\ndate: 2023/09/18\ntags:\n - attack.persistence\n - attack.t1556\nlogsource:\n service: audit\n product: m365\ndetection:\n selection:\n Operation|contains: 'Disable Strong Authentication.'\n condition: selection\nfalsepositives:\n - Unlikely\nlevel: high\n",
"summary": "This Sigma Rule detects the disabling of Multi Factor Authentication in Microsoft 365. It looks for the operation containing \"Disable Strong Authentication\" in the audit log. The rule was authored by the Splunk Threat Research Team and adapted by Harjot Singh. The detection level is set to high with false positives considered unlikely.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/m365/audit/microsoft365_new_federated_domain_added_audit.yml": {
"filename": "rules/cloud/m365/audit/microsoft365_new_federated_domain_added_audit.yml",
"creation_Date": "2024-08-07T17:55:36.655738",
"modification_Date": "2024-08-07T20:37:07.490312",
"lastUpdate_Date": "2024-08-07T20:37:07.490317",
"sigmaRule": "title: New Federated Domain Added\nid: 58f88172-a73d-442b-94c9-95eaed3cbb36\nrelated:\n - id: 42127bdd-9133-474f-a6f1-97b6c08a4339\n type: similar\nstatus: test\ndescription: Detects the addition of a new Federated Domain.\nreferences:\n - https://research.splunk.com/cloud/e155876a-6048-11eb-ae93-0242ac130002/\n - https://o365blog.com/post/aadbackdoor/\nauthor: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule)\ndate: 2023/09/18\ntags:\n - attack.persistence\n - attack.t1136.003\nlogsource:\n service: audit\n product: m365\ndetection:\n selection_domain:\n Operation|contains: 'domain'\n selection_operation:\n Operation|contains:\n - 'add'\n - 'new'\n condition: all of selection_*\nfalsepositives:\n - The creation of a new Federated domain is not necessarily malicious, however these events need to be followed closely, as it may indicate federated credential abuse or backdoor via federated identities at a similar or different cloud provider.\nlevel: medium\n",
"summary": "This Sigma Rule detects the addition of a new Federated Domain within the Microsoft 365 environment. The rule looks for specific keywords related to the operation such as 'domain', 'add', and 'new'. Although the creation of a new Federated domain is not always malicious, it is recommended to closely monitor these events as they could potentially indicate federated credential abuse or a backdoor via federated identities at a similar or different cloud provider. The rule was authored by the Splunk Threat Research Team and Harjot Singh.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/okta/okta_identity_provider_created.yml": {
"filename": "rules/cloud/okta/okta_identity_provider_created.yml",
"creation_Date": "2024-08-07T17:55:37.976906",
"modification_Date": "2024-08-07T20:37:07.490372",
"lastUpdate_Date": "2024-08-07T20:37:07.490375",
"sigmaRule": "title: Okta Identity Provider Created\nid: 969c7590-8c19-4797-8c1b-23155de6e7ac\nstatus: test\ndescription: Detects when a new identity provider is created for Okta.\nreferences:\n - https://developer.okta.com/docs/reference/api/system-log/\n - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection\nauthor: kelnage\ndate: 2023/09/07\ntags:\n - attack.persistence\n - attack.t1098.001\nlogsource:\n product: okta\n service: okta\ndetection:\n selection:\n eventtype: 'system.idp.lifecycle.create'\n condition: selection\nfalsepositives:\n - When an admin creates a new, authorised identity provider.\nlevel: medium\n",
"summary": "Sigma Rule ID 969c7590-8c19-4797-8c1b-23155de6e7ac detects when a new identity provider is created for Okta. It uses eventtype 'system.idp.lifecycle.create' to identify the event, and may have false positives when an admin creates a new, authorized identity provider. The rule is categorized under attack persistence and technique t1098.001. Detection of this event could indicate a potential security issue and the rule is tagged with a medium level of severity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/okta/okta_suspicious_activity_enduser_report.yml": {
"filename": "rules/cloud/okta/okta_suspicious_activity_enduser_report.yml",
"creation_Date": "2024-08-07T17:55:39.547343",
"modification_Date": "2024-08-07T20:37:07.490422",
"lastUpdate_Date": "2024-08-07T20:37:07.490425",
"sigmaRule": "title: Okta Suspicious Activity Reported by End-user\nid: 07e97cc6-aed1-43ae-9081-b3470d2367f1\nstatus: test\ndescription: Detects when an Okta end-user reports activity by their account as being potentially suspicious.\nreferences:\n - https://developer.okta.com/docs/reference/api/system-log/\n - https://github.com/okta/workflows-templates/blob/master/workflows/suspicious_activity_reported/readme.md\nauthor: kelnage\ndate: 2023/09/07\ntags:\n - attack.resource_development\n - attack.t1586.003\nlogsource:\n product: okta\n service: okta\ndetection:\n selection:\n eventtype: 'user.account.report_suspicious_activity_by_enduser'\n condition: selection\nfalsepositives:\n - If an end-user incorrectly identifies normal activity as suspicious.\nlevel: high\n",
"summary": "This Sigma Rule detects when an Okta end-user reports activity by their account as potentially suspicious. The rule specifies the event type that triggers the detection and provides references to Okta API documentation for more information. False positives may occur if an end-user mistakenly identifies normal activity as suspicious. The level of severity for this rule is high.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/cloud/okta/okta_user_session_start_via_anonymised_proxy.yml": {
"filename": "rules/cloud/okta/okta_user_session_start_via_anonymised_proxy.yml",
"creation_Date": "2024-08-07T17:55:40.921854",
"modification_Date": "2024-08-07T20:37:07.490472",
"lastUpdate_Date": "2024-08-07T20:37:07.490475",
"sigmaRule": "title: Okta User Session Start Via An Anonymising Proxy Service\nid: bde30855-5c53-4c18-ae90-1ff79ebc9578\nstatus: test\ndescription: Detects when an Okta user session starts where the user is behind an anonymising proxy service.\nreferences:\n - https://developer.okta.com/docs/reference/api/system-log/\n - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection\nauthor: kelnage\ndate: 2023/09/07\ntags:\n - attack.defense_evasion\n - attack.t1562.006\nlogsource:\n product: okta\n service: okta\ndetection:\n selection:\n eventtype: 'user.session.start'\n securitycontext.isproxy: 'true'\n condition: selection\nfalsepositives:\n - If a user requires an anonymising proxy due to valid justifications.\nlevel: high\n",
"summary": "This Sigma Rule detects when an Okta user session starts with the user behind an anonymising proxy service. The rule looks for events of type 'user.session.start' with security context indicating the use of a proxy. False positives may occur if a user has valid reasons for using an anonymising proxy.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/builtin/appmodel_runtime/win_appmodel_runtime_sysinternals_tools_appx_execution.yml": {
"filename": "rules/windows/builtin/appmodel_runtime/win_appmodel_runtime_sysinternals_tools_appx_execution.yml",
"creation_Date": "2024-08-07T17:55:42.405150",
"modification_Date": "2024-08-07T20:37:07.490524",
"lastUpdate_Date": "2024-08-07T20:37:07.490529",
"sigmaRule": "title: Sysinternals Tools AppX Versions Execution\nid: d29a20b2-be4b-4827-81f2-3d8a59eab5fc\nstatus: test\ndescription: Detects execution of Sysinternals tools via an AppX package. Attackers could install the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths\nreferences:\n - Internal Research\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/01/16\nmodified: 2023/09/12\ntags:\n - attack.defense_evasion\n - attack.execution\nlogsource:\n product: windows\n service: appmodel-runtime\ndetection:\n selection:\n EventID: 201\n ImageName:\n - 'procdump.exe'\n - 'psloglist.exe'\n - 'psexec.exe'\n - 'livekd.exe'\n - 'ADExplorer.exe'\n condition: selection\nfalsepositives:\n - Legitimate usage of the applications from the Windows Store\nlevel: low\n",
"summary": "This Sigma Rule detects the execution of Sysinternals tools through an AppX package. Attackers may use these tools, such as psexec and procdump, to evade detection by using non-standard system paths. The rule looks for specific Event IDs and image names related to these tools in the Windows appmodel-runtime service. Legitimate usage from the Windows Store could trigger false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/builtin/dns_client/win_dns_client_ufile_io.yml": {
"filename": "rules/windows/builtin/dns_client/win_dns_client_ufile_io.yml",
"creation_Date": "2024-08-07T17:55:43.681923",
"modification_Date": "2024-08-07T20:37:07.490580",
"lastUpdate_Date": "2024-08-07T20:37:07.490583",
"sigmaRule": "title: DNS Query To Ufile.io - DNS Client\nid: 090ffaad-c01a-4879-850c-6d57da98452d\nrelated:\n - id: 1cbbeaaf-3c8c-4e4c-9d72-49485b6a176b\n type: similar\nstatus: test\ndescription: Detects DNS queries to \"ufile.io\", which was seen abused by malware and threat actors as a method for data exfiltration\nreferences:\n - https://thedfirreport.com/2021/12/13/diavol-ransomware/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/01/16\nmodified: 2023/09/18\ntags:\n - attack.exfiltration\n - attack.t1567.002\nlogsource:\n product: windows\n service: dns-client\n definition: 'Requirements: Microsoft-Windows-DNS Client Events/Operational Event Log must be enabled/collected in order to receive the events.'\ndetection:\n selection:\n EventID: 3008\n QueryName|contains: 'ufile.io'\n condition: selection\nfalsepositives:\n - DNS queries for \"ufile\" are not malicious by nature necessarily. Investigate the source to determine the necessary actions to take\nlevel: low\n",
"summary": "This Sigma Rule detects DNS queries to \"ufile.io\", a domain known to be abused by malware and threat actors for data exfiltration. It specifies the event ID and query name to look for in the Windows DNS Client Events/Operational Event Log. The rule's level is classified as low, and it emphasizes the need to investigate further before taking any action on DNS queries for \"ufile\" that may not be malicious.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/builtin/security/win_security_registry_permissions_weakness_check.yml": {
"filename": "rules/windows/builtin/security/win_security_registry_permissions_weakness_check.yml",
"creation_Date": "2024-08-07T17:55:45.364412",
"modification_Date": "2024-08-07T20:37:07.490638",
"lastUpdate_Date": "2024-08-07T20:37:07.490641",
"sigmaRule": "title: Service Registry Key Read Access Request\nid: 11d00fff-5dc3-428c-8184-801f292faec0\nstatus: test\ndescription: |\n Detects \"read access\" requests on the services registry key.\n Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.\n Adversaries may use flaws in the permissions for Registry keys related to services to redirect from the originally specified executable to one that they control, in order to launch their own code when a service starts.\nreferences:\n - https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/service_registry_permissions_weakness_check/\n - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.011/T1574.011.md#atomic-test-1---service-registry-permissions-weakness\nauthor: Center for Threat Informed Defense (CTID) Summiting the Pyramid Team\ndate: 2023/09/28\ntags:\n - attack.defense_evasion\n - attack.persistence\n - attack.privilege_escalation\n - attack.t1574.011\nlogsource:\n product: windows\n service: security\n definition: 'Requirements: SACLs must be enabled for \"READ_CONTROL\" on the registry keys used in this rule'\ndetection:\n selection:\n EventID: 4663\n ObjectName|contains|all:\n - '\\SYSTEM\\'\n - 'ControlSet\\Services\\'\n AccessList|contains: '%%1538' # READ_CONTROL\n condition: selection\nfalsepositives:\n - Likely from legitimate applications reading their key. Requires heavy tuning\nlevel: low\n",
"summary": "This Sigma Rule detects \"read access\" requests on the services registry key to prevent adversaries from executing malicious payloads by hijacking registry entries used by services. Adversaries may exploit weaknesses in permissions for registry keys related to services to launch their own code when a service starts. The rule requires SACLs to be enabled for \"READ_CONTROL\" on the registry keys. It may result in false positives from legitimate applications reading their key and requires heavy tuning.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/dns_query/dns_query_win_dns_server_discovery_via_ldap_query.yml": {
"filename": "rules/windows/dns_query/dns_query_win_dns_server_discovery_via_ldap_query.yml",
"creation_Date": "2024-08-07T17:55:46.672446",
"modification_Date": "2024-08-07T20:37:07.490695",
"lastUpdate_Date": "2024-08-07T20:37:07.490698",
"sigmaRule": "title: DNS Server Discovery Via LDAP Query\nid: a21bcd7e-38ec-49ad-b69a-9ea17e69509e\nstatus: test\ndescription: Detects DNS server discovery via LDAP query requests from uncommon applications\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/980f3f83fd81f37c1ca9c02dccfd1c3d9f9d0841/atomics/T1016/T1016.md#atomic-test-9---dns-server-discovery-using-nslookup\n - https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/7fcdce70-5205-44d6-9c3a-260e616a2f04\nauthor: frack113\ndate: 2022/08/20\nmodified: 2023/09/18\ntags:\n - attack.discovery\n - attack.t1482\nlogsource:\n product: windows\n category: dns_query\ndetection:\n selection:\n QueryName|startswith: '_ldap.'\n filter_main_generic:\n Image|contains:\n - ':\\Program Files\\'\n - ':\\Program Files (x86)\\'\n - ':\\Windows\\'\n filter_main_defender:\n Image|contains: ':\\ProgramData\\Microsoft\\Windows Defender\\Platform\\'\n Image|endswith: '\\MsMpEng.exe'\n filter_main_unknown:\n Image: '<unknown process>'\n filter_optional_azure:\n Image|startswith: 'C:\\WindowsAzure\\GuestAgent'\n filter_main_null:\n Image: null\n filter_optional_browsers:\n # Note: This list is for browsers installed in the user context. To avoid basic evasions based on image name. Best to baseline this list with the browsers you use internally and add their full paths.\n Image|endswith:\n - '\\chrome.exe'\n - '\\firefox.exe'\n - '\\opera.exe'\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Likely\n# Note: Incrase the level once a baseline is established\nlevel: low\n",
"summary": "This Sigma rule detects DNS server discovery via LDAP query requests from uncommon applications on Windows systems. The rule looks for DNS queries starting with '_ldap.' and filters out common applications such as those in Program Files, Windows Defender, and browsers. The rule has a low level of certainty and may have false positives. It's based on Atomic Red Team's T1016 and Microsoft's ADTS documentation.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/dns_query/dns_query_win_remote_access_software_domains_non_browsers.yml": {
"filename": "rules/windows/dns_query/dns_query_win_remote_access_software_domains_non_browsers.yml",
"creation_Date": "2024-08-07T17:55:47.938827",
"modification_Date": "2024-08-07T20:37:07.490745",
"lastUpdate_Date": "2024-08-07T20:37:07.490748",
"sigmaRule": "title: DNS Query To Remote Access Software Domain From Non-Browser App\nid: 4d07b1f4-cb00-4470-b9f8-b0191d48ff52\nrelated:\n - id: 71ba22cb-8a01-42e2-a6dd-5bf9b547498f\n type: obsoletes\n - id: 7c4cf8e0-1362-48b2-a512-b606d2065d7d\n type: obsoletes\n - id: ed785237-70fa-46f3-83b6-d264d1dc6eb4\n type: obsoletes\nstatus: test\ndescription: |\n An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.\n These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.\n Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-4---gotoassist-files-detected-test-on-windows\n - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-3---logmein-files-detected-test-on-windows\n - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-6---ammyy-admin-software-execution\n - https://redcanary.com/blog/misbehaving-rats/\n - https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/hunting-for-omi-vulnerability-exploitation-with-azure-sentinel/ba-p/2764093\nauthor: frack113, Connor Martin\ndate: 2022/07/11\nmodified: 2023/09/12\ntags:\n - attack.command_and_control\n - attack.t1219\nlogsource:\n product: windows\n category: dns_query\ndetection:\n selection_generic:\n QueryName|endswith:\n - 'agent.jumpcloud.com'\n - 'agentreporting.atera.com'\n - 'ammyy.com'\n - 'api.parsec.app'\n - 'api.playanext.com'\n - 'api.splashtop.com'\n - 'app.atera.com'\n - 'assist.zoho.com'\n - 'authentication.logmeininc.com'\n - 'beyondtrustcloud.com'\n - 'cdn.kaseya.net'\n - 'client.teamviewer.com'\n - 'comserver.corporate.beanywhere.com'\n - 'control.connectwise.com'\n - 'downloads.zohocdn.com'\n - 'dwservice.net'\n - 'express.gotoassist.com'\n - 'getgo.com'\n - 'integratedchat.teamviewer.com'\n - 'join.zoho.com'\n - 'kickstart.jumpcloud.com'\n - 'license.bomgar.com'\n - 'logmein-gateway.com'\n - 'logmein.com'\n - 'logmeincdn.http.internapcdn.net'\n - 'n-able.com'\n - 'net.anydesk.com'\n - 'netsupportsoftware.com' # For NetSupport Manager RAT\n - 'parsecusercontent.com'\n - 'pubsub.atera.com'\n - 'relay.kaseya.net'\n - 'relay.screenconnect.com'\n - 'relay.splashtop.com'\n - 'remotedesktop-pa.googleapis.com'\n - 'remoteutilities.com' # Usage of Remote Utilities RAT\n - 'secure.logmeinrescue.com'\n - 'services.vnc.com'\n - 'static.remotepc.com'\n - 'swi-rc.com'\n - 'swi-tc.com'\n - 'telemetry.servers.qetqo.com'\n - 'tmate.io'\n - 'zohoassist.com'\n selection_rustdesk: # https://twitter.com/malmoeb/status/1668504345132822531?s=20 and https://www.adamsdesk.com/posts/rustdesk-not-connecting/ mention this pattern\n QueryName|endswith: '.rustdesk.com'\n QueryName|startswith: 'rs-'\n # Exclude browsers for legitimate visits of the domains mentioned above\n # Add missing browsers you use and exclude the ones you don't\n filter_optional_chrome:\n Image:\n - 'C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe'\n - 'C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe'\n filter_optional_firefox:\n Image:\n - 'C:\\Program Files\\Mozilla Firefox\\firefox.exe'\n - 'C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe'\n filter_optional_ie:\n Image:\n - 'C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe'\n - 'C:\\Program Files\\Internet Explorer\\iexplore.exe'\n filter_optional_edge_1:\n - Image|startswith: 'C:\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\'\n - Image|endswith: '\\WindowsApps\\MicrosoftEdge.exe'\n - Image:\n - 'C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe'\n - 'C:\\Program Files\\Microsoft\\Edge\\Application\\msedge.exe'\n filter_optional_edge_2:\n Image|startswith:\n - 'C:\\Program Files (x86)\\Microsoft\\EdgeCore\\'\n - 'C:\\Program Files\\Microsoft\\EdgeCore\\'\n Image|endswith:\n - '\\msedge.exe'\n - '\\msedgewebview2.exe'\n filter_optional_safari:\n Image|endswith: '\\safari.exe'\n filter_optional_defender:\n Image|endswith:\n - '\\MsMpEng.exe' # Microsoft Defender executable\n - '\\MsSense.exe' # Windows Defender Advanced Threat Protection Service Executable\n filter_optional_brave:\n Image|endswith: '\\brave.exe'\n Image|startswith: 'C:\\Program Files\\BraveSoftware\\'\n filter_optional_maxthon:\n Image|contains: '\\AppData\\Local\\Maxthon\\'\n Image|endswith: '\\maxthon.exe'\n filter_optional_opera:\n Image|contains: '\\AppData\\Local\\Programs\\Opera\\'\n Image|endswith: '\\opera.exe'\n filter_optional_seamonkey:\n Image|startswith:\n - 'C:\\Program Files\\SeaMonkey\\'\n - 'C:\\Program Files (x86)\\SeaMonkey\\'\n Image|endswith: '\\seamonkey.exe'\n filter_optional_vivaldi:\n Image|contains: '\\AppData\\Local\\Vivaldi\\'\n Image|endswith: '\\vivaldi.exe'\n filter_optional_whale:\n Image|startswith:\n - 'C:\\Program Files\\Naver\\Naver Whale\\'\n - 'C:\\Program Files (x86)\\Naver\\Naver Whale\\'\n Image|endswith: '\\whale.exe'\n filter_optional_tor:\n Image|contains: '\\Tor Browser\\'\n filter_optional_whaterfox:\n Image|startswith:\n - 'C:\\Program Files\\Waterfox\\'\n - 'C:\\Program Files (x86)\\Waterfox\\'\n Image|endswith: '\\Waterfox.exe'\n filter_optional_midori:\n Image|contains: '\\AppData\\Local\\Programs\\midori-ng\\'\n Image|endswith: '\\Midori Next Generation.exe'\n filter_optional_slimbrowser:\n Image|startswith:\n - 'C:\\Program Files\\SlimBrowser\\'\n - 'C:\\Program Files (x86)\\SlimBrowser\\'\n Image|endswith: '\\slimbrowser.exe'\n filter_optional_flock:\n Image|contains: '\\AppData\\Local\\Flock\\'\n Image|endswith: '\\Flock.exe'\n filter_optional_phoebe:\n Image|contains: '\\AppData\\Local\\Phoebe\\'\n Image|endswith: '\\Phoebe.exe'\n filter_optional_falkon:\n Image|startswith:\n - 'C:\\Program Files\\Falkon\\'\n - 'C:\\Program Files (x86)\\Falkon\\'\n Image|endswith: '\\falkon.exe'\n filter_optional_avant:\n Image|startswith:\n - 'C:\\Program Files (x86)\\Avant Browser\\'\n - 'C:\\Program Files\\Avant Browser\\'\n Image|endswith: '\\avant.exe'\n condition: 1 of selection_* and not 1 of filter_optional_*\nfalsepositives:\n - Likely with other browser software. Apply additional filters for any other browsers you might use.\nlevel: medium\n",
"summary": "The Sigma Rule identifies potentially malicious activity involving remote access software being used for command and control purposes by monitoring DNS queries to specific domains associated with these tools. The rule specifies a list of domains related to popular remote access software and provides filters to exclude legitimate browser activity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/dns_query/dns_query_win_tor_onion_domain_query.yml": {
"filename": "rules/windows/dns_query/dns_query_win_tor_onion_domain_query.yml",
"creation_Date": "2024-08-07T17:55:48.910120",
"modification_Date": "2024-08-07T20:37:07.490794",
"lastUpdate_Date": "2024-08-07T20:37:07.490797",
"sigmaRule": "title: DNS Query Tor .Onion Address - Sysmon\nid: b55ca2a3-7cff-4dda-8bdd-c7bfa63bf544\nrelated:\n - id: 8384bd26-bde6-4da9-8e5d-4174a7a47ca2\n type: similar\nstatus: test\ndescription: Detects DNS queries to an \".onion\" address related to Tor routing networks\nreferences:\n - https://www.logpoint.com/en/blog/detecting-tor-use-with-logpoint/\nauthor: frack113\ndate: 2022/02/20\nmodified: 2023/09/18\ntags:\n - attack.command_and_control\n - attack.t1090.003\nlogsource:\n product: windows\n category: dns_query\ndetection:\n selection:\n QueryName|contains: '.onion'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects DNS queries to a .onion address related to Tor routing networks on Windows systems. The rule can help identify potential use of Tor for command and control purposes (attack.command_and_control). The detection criteria is based on the QueryName containing '.onion'. False positives are listed as unknown, and the rule is rated at a high severity level.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/dns_query/dns_query_win_ufile_io_query.yml": {
"filename": "rules/windows/dns_query/dns_query_win_ufile_io_query.yml",
"creation_Date": "2024-08-07T17:55:49.977071",
"modification_Date": "2024-08-07T20:37:07.490848",
"lastUpdate_Date": "2024-08-07T20:37:07.490851",
"sigmaRule": "title: DNS Query To Ufile.io\nid: 1cbbeaaf-3c8c-4e4c-9d72-49485b6a176b\nrelated:\n - id: 090ffaad-c01a-4879-850c-6d57da98452d\n type: similar\nstatus: test\ndescription: Detects DNS queries to \"ufile.io\", which was seen abused by malware and threat actors as a method for data exfiltration\nreferences:\n - https://thedfirreport.com/2021/12/13/diavol-ransomware/\nauthor: yatinwad, TheDFIRReport\ndate: 2022/06/23\nmodified: 2023/09/18\ntags:\n - attack.exfiltration\n - attack.t1567.002\nlogsource:\n product: windows\n category: dns_query\ndetection:\n selection:\n QueryName|contains: 'ufile.io'\n condition: selection\nfalsepositives:\n - DNS queries for \"ufile\" are not malicious by nature necessarily. Investigate the source to determine the necessary actions to take\nlevel: low\n",
"summary": "This Sigma Rule detects DNS queries to \"ufile.io,\" which has been used by malware and threat actors for data exfiltration. It is a low-level detection, and false positives may occur with legitimate DNS queries for \"ufile.\"",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/file/file_event/file_event_win_dump_file_susp_creation.yml": {
"filename": "rules/windows/file/file_event/file_event_win_dump_file_susp_creation.yml",
"creation_Date": "2024-08-07T17:55:50.873476",
"modification_Date": "2024-08-07T20:37:07.490904",
"lastUpdate_Date": "2024-08-07T20:37:07.490907",
"sigmaRule": "title: Potentially Suspicious DMP/HDMP File Creation\nid: aba15bdd-657f-422a-bab3-ac2d2a0d6f1c\nrelated:\n - id: 3a525307-d100-48ae-b3b9-0964699d7f97\n type: similar\nstatus: test\ndescription: Detects the creation of a file with the \".dmp\"/\".hdmp\" extension by a shell or scripting application such as \"cmd\", \"powershell\", etc. Often created by software during a crash. Memory dumps can sometimes contain sensitive information such as credentials. It's best to determine the source of the crash.\nreferences:\n - https://learn.microsoft.com/en-us/windows/win32/wer/collecting-user-mode-dumps\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/07\ntags:\n - attack.defense_evasion\nlogsource:\n category: file_event\n product: windows\ndetection:\n selection:\n Image|endswith:\n - '\\cmd.exe'\n - '\\cscript.exe'\n - '\\mshta.exe'\n - '\\powershell.exe'\n - '\\pwsh.exe'\n - '\\wscript.exe'\n TargetFilename|endswith:\n - '.dmp'\n - '.dump'\n - '.hdmp'\n condition: selection\nfalsepositives:\n - Some administrative PowerShell or VB scripts might have the ability to collect dumps and move them to other folders which might trigger a false positive.\nlevel: medium\n",
"summary": "This Sigma rule detects the creation of a file with the \".dmp\" or \".hdmp\" extension by shell or scripting applications like \"cmd\" or \"powershell.\" These files are often generated by software during a crash and may contain sensitive information. It is important to investigate the source of the crash. The rule provides selection criteria for monitoring such file creations on Windows systems and includes a note about potential false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/file/file_event/file_event_win_office_onenote_files_in_susp_locations.yml": {
"filename": "rules/windows/file/file_event/file_event_win_office_onenote_files_in_susp_locations.yml",
"creation_Date": "2024-08-07T17:55:52.314477",
"modification_Date": "2024-08-07T20:37:07.490955",
"lastUpdate_Date": "2024-08-07T20:37:07.490959",
"sigmaRule": "title: OneNote Attachment File Dropped In Suspicious Location\nid: 7fd164ba-126a-4d9c-9392-0d4f7c243df0\nstatus: test\ndescription: Detects creation of files with the \".one\"/\".onepkg\" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments\nreferences:\n - https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/\n - https://blog.osarmor.com/319/onenote-attachment-delivers-asyncrat-malware/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/01/22\nmodified: 2023/09/19\ntags:\n - attack.defense_evasion\nlogsource:\n category: file_event\n product: windows\ndetection:\n selection:\n TargetFilename|contains:\n # Note: add more common locations for drops such as download folders and the like. Or baseline legitimate locations and alert on everything else\n - '\\AppData\\Local\\Temp\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n - ':\\Temp\\'\n TargetFilename|endswith:\n - '.one'\n - '.onepkg'\n filter_main_onenote:\n Image|contains: ':\\Program Files\\Microsoft Office\\'\n Image|endswith: '\\ONENOTE.EXE'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Legitimate usage of \".one\" or \".onepkg\" files from those locations\nlevel: medium\n",
"summary": "This Sigma Rule detects the creation of files with the \".one\" or \".onepkg\" extension in suspicious or uncommon locations, which could indicate attackers abusing OneNote attachments. The rule specifies several suspicious locations to monitor for these file types and includes a filter to ensure legitimate usage of OneNote attachments is not flagged as malicious. The rule is considered a medium level alert.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/image_load/image_load_dll_amsi_suspicious_process.yml": {
"filename": "rules/windows/image_load/image_load_dll_amsi_suspicious_process.yml",
"creation_Date": "2024-08-07T17:55:53.492747",
"modification_Date": "2024-08-07T20:37:07.491012",
"lastUpdate_Date": "2024-08-07T20:37:07.491015",
"sigmaRule": "title: Amsi.DLL Loaded Via LOLBIN Process\nid: 6ec86d9e-912e-4726-91a2-209359b999b9\nstatus: test\ndescription: Detects loading of \"Amsi.dll\" by a living of the land process. This could be an indication of a \"PowerShell without PowerShell\" attack\nreferences:\n - Internal Research\n - https://www.paloaltonetworks.com/blog/security-operations/stopping-powershell-without-powershell/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/06/01\nmodified: 2023/09/20\ntags:\n - attack.defense_evasion\nlogsource:\n category: image_load\n product: windows\ndetection:\n selection:\n ImageLoaded|endswith: '\\amsi.dll'\n Image|endswith:\n # TODO: Add more interesting processes\n - '\\ExtExport.exe'\n - '\\odbcconf.exe'\n - '\\regsvr32.exe'\n - '\\rundll32.exe'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma rule detects the loading of \"Amsi.dll\" by a LOLBIN (Living off the land binary) process, which could indicate a \"PowerShell without PowerShell\" attack. The rule includes a list of interesting processes to monitor for this activity. The rule's author is Nasreddine Bencherchali, and it was last modified on September 20, 2023.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/image_load/image_load_rundll32_remote_share_load.yml": {
"filename": "rules/windows/image_load/image_load_rundll32_remote_share_load.yml",
"creation_Date": "2024-08-07T17:55:54.976734",
"modification_Date": "2024-08-07T20:37:07.491060",
"lastUpdate_Date": "2024-08-07T20:37:07.491063",
"sigmaRule": "title: Remote DLL Load Via Rundll32.EXE\nid: f40017b3-cb2e-4335-ab5d-3babf679c1de\nstatus: test\ndescription: Detects a remote DLL load event via \"rundll32.exe\".\nreferences:\n - https://github.com/gabe-k/themebleed\n - Internal Research\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/18\ntags:\n - attack.execution\n - attack.t1204.002\nlogsource:\n category: image_load\n product: windows\ndetection:\n selection:\n Image|endswith: '\\rundll32.exe'\n ImageLoaded|startswith: '\\\\\\\\'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma Rule detects a remote DLL load event via \"rundll32.exe\" on Windows systems. The rule looks for rundll32.exe processes loading DLL files from remote locations. The author is Nasreddine Bencherchali and the rule was last updated on September 18, 2023. It has a medium level of severity and there are currently no known false positives for this rule.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/image_load/image_load_susp_dll_load_system_process.yml": {
"filename": "rules/windows/image_load/image_load_susp_dll_load_system_process.yml",
"creation_Date": "2024-08-07T17:55:56.238627",
"modification_Date": "2024-08-07T20:37:07.491109",
"lastUpdate_Date": "2024-08-07T20:37:07.491112",
"sigmaRule": "title: DLL Load By System Process From Suspicious Locations\nid: 9e9a9002-56c4-40fd-9eff-e4b09bfa5f6c\nstatus: test\ndescription: Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as \"C:\\Users\\Public\"\nreferences:\n - https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC (Idea)\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/07/17\nmodified: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1070\nlogsource:\n product: windows\n category: image_load\ndetection:\n selection:\n Image|startswith: 'C:\\Windows\\'\n ImageLoaded|startswith:\n # TODO: Add more suspicious paths as you see fit in your env\n - 'C:\\Users\\Public\\'\n - 'C:\\PerfLogs\\'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma Rule detects when a system process loads a DLL from a suspicious location or a location with permissive permissions, such as \"C:\\Users\\Public\". The rule looks for image loads that start with 'C:\\Windows\\' and checks if the image loaded starts with 'C:\\Users\\Public\\' or 'C:\\PerfLogs\\'. This rule was authored by Nasreddine Bencherchali and is tagged with defense evasion and T1070.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/image_load/image_load_susp_python_image_load.yml": {
"filename": "rules/windows/image_load/image_load_susp_python_image_load.yml",
"creation_Date": "2024-08-07T17:55:57.809863",
"modification_Date": "2024-08-07T20:37:07.491162",
"lastUpdate_Date": "2024-08-07T20:37:07.491168",
"sigmaRule": "title: Python Image Load By Non-Python Process\nid: cbb56d62-4060-40f7-9466-d8aaf3123f83\nstatus: test\ndescription: Detects the image load of \"Python Core\" by a non-Python process. This might be indicative of a Python script bundled with Py2Exe.\nreferences:\n - https://www.py2exe.org/\n - https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/\nauthor: Patrick St. John, OTR (Open Threat Research)\ndate: 2020/05/03\nmodified: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1027.002\nlogsource:\n product: windows\n category: image_load\ndetection:\n selection:\n Description: 'Python Core'\n filter_main_generic:\n - Image|contains: 'Python' # FPs with python38.dll, python.exe etc.\n - Image|startswith:\n - 'C:\\Program Files\\'\n - 'C:\\Program Files (x86)\\'\n - 'C:\\ProgramData\\Anaconda3\\' # Comment out if you don't use Anaconda in your environment\n filter_optional_aurora:\n Image: null\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Legitimate Py2Exe Binaries\n - Known false positive caused with Python Anaconda\nlevel: medium\n",
"summary": "This Sigma rule detects the image load of \"Python Core\" by a non-Python process, which could indicate a Python script bundled with Py2Exe. The rule specifies filters to exclude known false positives such as legitimate Py2Exe binaries and instances involving Python Anaconda.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/network_connection/net_connection_win_python.yml": {
"filename": "rules/windows/network_connection/net_connection_win_python.yml",
"creation_Date": "2024-08-07T17:55:58.698813",
"modification_Date": "2024-08-07T20:37:07.491219",
"lastUpdate_Date": "2024-08-07T20:37:07.491223",
"sigmaRule": "title: Python Initiated Connection\nid: bef0bc5a-b9ae-425d-85c6-7b2d705980c6\nstatus: test\ndescription: Detects a Python process initiating a network connection. While this often relates to package installation, it can also indicate a potential malicious script communicating with a C&C server.\nreferences:\n - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-4---port-scan-using-python\n - https://pypi.org/project/scapy/\nauthor: frack113\ndate: 2021/12/10\nmodified: 2023/09/07\ntags:\n - attack.discovery\n - attack.t1046\nlogsource:\n category: network_connection\n product: windows\n definition: 'Requirements: Field enrichment is required for the filters to work. As field such as CommandLine and ParentImage are not available by default on this event type'\ndetection:\n selection:\n Initiated: 'true'\n Image|contains: 'python'\n filter_optional_conda:\n # Related to anaconda updates. Command example: \"conda update conda\"\n # This filter will only work with aurora agent enriched data as Sysmon EID 3 doesn't contain CommandLine nor ParentImage\n ParentImage: C:\\ProgramData\\Anaconda3\\Scripts\\conda.exe\n CommandLine|contains|all:\n - ':\\ProgramData\\Anaconda3\\Scripts\\conda-script.py'\n - 'update'\n filter_optional_conda_jupyter_notebook:\n # Related to anaconda opening an instance of Jupyter Notebook\n # This filter will only work with aurora agent enriched data as Sysmon EID 3 doesn't contain CommandLine nor ParentImage\n ParentImage: C:\\ProgramData\\Anaconda3\\python.exe\n CommandLine|contains: 'C:\\ProgramData\\Anaconda3\\Scripts\\jupyter-notebook-script.py'\n filter_main_local_communication:\n # This could be caused when launching an instance of Jupyter Notebook locally for example but can also be caused by other instances of python opening sockets locally etc. So comment this out if you want to monitor for those instances\n DestinationIp: 127.0.0.1\n SourceIp: 127.0.0.1\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Legitimate python scripts using the socket library or similar will trigger this. Apply additional filters and perform an initial baseline before deploying.\nlevel: medium\n",
"summary": "The Sigma Rule titled \"Python Initiated Connection\" detects a Python process initiating a network connection, which could indicate either legitimate package installation or potentially malicious communication with a command and control server. The rule includes filters to distinguish between benign and suspicious Python connections, such as filtering out specific Anaconda updates and Jupyter Notebook instances. False positives may occur with legitimate Python scripts using the socket library, so additional filters and baseline assessments are recommended before deployment.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/pipe_created/pipe_created_sysinternals_psexec_default_pipe_susp_location.yml": {
"filename": "rules/windows/pipe_created/pipe_created_sysinternals_psexec_default_pipe_susp_location.yml",
"creation_Date": "2024-08-07T17:55:59.933735",
"modification_Date": "2024-08-07T20:37:07.491268",
"lastUpdate_Date": "2024-08-07T20:37:07.491272",
"sigmaRule": "title: PsExec Tool Execution From Suspicious Locations - PipeName\nid: 41504465-5e3a-4a5b-a5b4-2a0baadd4463\nrelated:\n - id: f3f3a972-f982-40ad-b63c-bca6afdfad7c\n type: derived\nstatus: test\ndescription: Detects PsExec default pipe creation where the image executed is located in a suspicious location. Which could indicate that the tool is being used in an attack\nreferences:\n - https://www.jpcert.or.jp/english/pub/sr/ir_research.html\n - https://jpcertcc.github.io/ToolAnalysisResultSheet\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/08/04\nmodified: 2023/09/20\ntags:\n - attack.execution\n - attack.t1569.002\n - attack.s0029\nlogsource:\n category: pipe_created\n product: windows\n definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular. How to test detection? You can check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575'\ndetection:\n selection:\n PipeName: '\\PSEXESVC'\n Image|contains: # Add or remove locations depending on how and if you execute Psexec in your env\n - ':\\Users\\Public\\'\n - ':\\Windows\\Temp\\'\n - '\\AppData\\Local\\Temp\\'\n - '\\Desktop\\'\n - '\\Downloads\\'\n condition: selection\nfalsepositives:\n - Rare legitimate use of psexec from the locations mentioned above. This will require initial tuning based on your environment.\nlevel: medium\n",
"summary": "This Sigma Rule detects suspicious PsExec tool executions from potentially malicious locations, such as '\\Users\\Public\\', '\\Windows\\Temp\\', '\\AppData\\Local\\Temp\\', '\\Desktop\\', and '\\Downloads\\'. This could indicate that the tool is being used in an attack. Detection involves monitoring Named Pipe Events using Sysmon config and verifying the configuration. False positives may occur if PsExec is legitimately used from the mentioned locations, requiring tuning based on the environment.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_7zip_exfil_dmp_files.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_7zip_exfil_dmp_files.yml",
"creation_Date": "2024-08-07T17:56:01.214473",
"modification_Date": "2024-08-07T20:37:07.491318",
"lastUpdate_Date": "2024-08-07T20:37:07.491321",
"sigmaRule": "title: 7Zip Compressing Dump Files\nid: ec570e53-4c76-45a9-804d-dc3f355ff7a7\nrelated:\n - id: 1ac14d38-3dfc-4635-92c7-e3fd1c5f5bfc\n type: derived\nstatus: test\ndescription: Detects execution of 7z in order to compress a file with a \".dmp\"/\".dump\" extension, which could be a step in a process of dump file exfiltration.\nreferences:\n - https://thedfirreport.com/2022/09/26/bumblebee-round-two/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/09/27\nmodified: 2023/09/12\ntags:\n - attack.collection\n - attack.t1560.001\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Description|contains: '7-Zip'\n - Image|endswith:\n - '\\7z.exe'\n - '\\7zr.exe'\n - '\\7za.exe'\n - OriginalFileName:\n - '7z.exe'\n - '7za.exe'\n selection_extension:\n CommandLine|contains:\n - '.dmp'\n - '.dump'\n - '.hdmp'\n condition: all of selection_*\nfalsepositives:\n - Legitimate use of 7z with a command line in which \".dmp\" or \".dump\" appears accidentally\n - Legitimate use of 7z to compress WER \".dmp\" files for troubleshooting\nlevel: medium\n",
"summary": "This Sigma rule detects the execution of 7z to compress files with a \".dmp\" or \".dump\" extension, which could indicate a step in the process of dump file exfiltration. The rule specifies conditions related to process creation on Windows, looking for specific keywords and file extensions in the command line. It also provides information on false positives and the level of severity for this detection.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_addinutil_suspicious_cmdline.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_addinutil_suspicious_cmdline.yml",
"creation_Date": "2024-08-07T17:56:02.513602",
"modification_Date": "2024-08-07T20:37:07.491365",
"lastUpdate_Date": "2024-08-07T20:37:07.491367",
"sigmaRule": "title: Suspicious AddinUtil.EXE CommandLine Execution\nid: 631b22a4-70f4-4e2f-9ea8-42f84d9df6d8\nstatus: test\ndescription: |\n Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.\nreferences:\n - https://www.blue-prints.blog/content/blog/posts/lolbin/addinutil-lolbas.html\nauthor: Nasreddine Bencherchali (Nextron Systems), Michael McKinley (@McKinleyMike), Tony Latteri (@TheLatteri)\ndate: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith: '\\addinutil.exe'\n - OriginalFileName: 'AddInUtil.exe'\n selection_susp_1_flags:\n CommandLine|contains:\n - '-AddInRoot:'\n - '-PipelineRoot:'\n selection_susp_1_paths:\n CommandLine|contains:\n - '\\AppData\\Local\\Temp\\'\n - '\\Desktop\\'\n - '\\Downloads\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n selection_susp_2:\n CommandLine|contains:\n - '-AddInRoot:.'\n - '-AddInRoot:\".\"'\n - '-PipelineRoot:.'\n - '-PipelineRoot:\".\"'\n CurrentDirectory|contains:\n - '\\AppData\\Local\\Temp\\'\n - '\\Desktop\\'\n - '\\Downloads\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n condition: selection_img and (all of selection_susp_1_* or selection_susp_2)\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects suspicious execution of AddinUtil.exe with uncommon Addinroot or Pipelineroot paths that may point to malicious payloads in the adversary's Addins.Store. It monitors for specific command line parameters and paths commonly used by adversaries to evade detection. The rule is considered high severity and there are currently no known false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_addinutil_uncommon_child_process.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_addinutil_uncommon_child_process.yml",
"creation_Date": "2024-08-07T17:56:03.618714",
"modification_Date": "2024-08-07T20:37:07.491414",
"lastUpdate_Date": "2024-08-07T20:37:07.491417",
"sigmaRule": "title: Uncommon Child Process Of AddinUtil.EXE\nid: b5746143-59d6-4603-8d06-acbd60e166ee\nstatus: test\ndescription: |\n Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.\nreferences:\n - https://www.blue-prints.blog/content/blog/posts/lolbin/addinutil-lolbas.html\nauthor: Michael McKinley (@McKinleyMike), Tony Latteri (@TheLatteri)\ndate: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\addinutil.exe'\n filter_main_werfault:\n Image|endswith:\n - ':\\Windows\\System32\\conhost.exe'\n - ':\\Windows\\System32\\werfault.exe'\n - ':\\Windows\\SysWOW64\\werfault.exe'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma rule detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe), which could indicate potential abuse of the binary to proxy execution via a custom Addins.Store payload. The rule looks for processes that are children of AddInutil.exe and filters out common processes like conhost.exe and werfault.exe. It is tagged as attack defense evasion and attack t1218 and has a medium detection level.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_addinutil_uncommon_cmdline.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_addinutil_uncommon_cmdline.yml",
"creation_Date": "2024-08-07T17:56:04.969441",
"modification_Date": "2024-08-07T20:37:07.491466",
"lastUpdate_Date": "2024-08-07T20:37:07.491469",
"sigmaRule": "title: Uncommon AddinUtil.EXE CommandLine Execution\nid: 4f2cd9b6-4a17-440f-bb2a-687abb65993a\nstatus: test\ndescription: |\n Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with uncommon Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.\nreferences:\n - https://www.blue-prints.blog/content/blog/posts/lolbin/addinutil-lolbas.html\nauthor: Michael McKinley (@McKinleyMike), Tony Latteri (@TheLatteri)\ndate: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith: '\\addinutil.exe'\n - OriginalFileName: 'AddInUtil.exe'\n selection_cli:\n CommandLine|contains:\n - '-AddInRoot:'\n - '-PipelineRoot:'\n filter_main_addinroot:\n CommandLine|contains:\n - '-AddInRoot:\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTA'\n - '-AddInRoot:C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTA'\n - '-PipelineRoot:\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTA'\n - '-PipelineRoot:C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTA'\n condition: all of selection_* and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma rule detects the execution of Add-In deployment cache updating utility (AddInutil.exe) with uncommon Addinroot or Pipelineroot paths. The adversary may use uncommon paths pointing to their malicious payload. The rule specifies conditions and filters to identify this behavior in Windows process creation logs.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec.yml",
"creation_Date": "2024-08-07T17:56:06.346010",
"modification_Date": "2024-08-07T20:37:07.491517",
"lastUpdate_Date": "2024-08-07T20:37:07.491520",
"sigmaRule": "title: AddinUtil.EXE Execution From Uncommon Directory\nid: 6120ac2a-a34b-42c0-a9bd-1fb9f459f348\nstatus: test\ndescription: Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.\nreferences:\n - https://www.blue-prints.blog/content/blog/posts/lolbin/addinutil-lolbas.html\nauthor: Michael McKinley (@McKinleyMike), Tony Latteri (@TheLatteri)\ndate: 2023/09/18\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: '\\addinutil.exe'\n - OriginalFileName: 'AddInUtil.exe'\n filter_main_legit_location:\n Image|contains:\n - ':\\Windows\\Microsoft.NET\\Framework\\'\n - ':\\Windows\\Microsoft.NET\\Framework64\\'\n - ':\\Windows\\WinSxS\\'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma rule detects the execution of the Add-In deployment cache updating utility (AddInUtil.exe) from a non-standard directory on a Windows system. It specifies criteria for identifying the executable and filters out legitimate locations where it may be found. The rule is classified as a medium level threat with no known false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse.yml",
"creation_Date": "2024-08-07T17:56:07.684655",
"modification_Date": "2024-08-07T20:37:07.491571",
"lastUpdate_Date": "2024-08-07T20:37:07.491574",
"sigmaRule": "title: Chromium Browser Headless Execution To Mockbin Like Site\nid: 1c526788-0abe-4713-862f-b520da5e5316\nstatus: test\ndescription: Detects the execution of a Chromium based browser process with the \"headless\" flag and a URL pointing to the mockbin.org service (which can be used to exfiltrate data).\nreferences:\n - https://www.zscaler.com/blogs/security-research/steal-it-campaign\nauthor: X__Junior (Nextron Systems)\ndate: 2023/09/11\ntags:\n - attack.execution\nlogsource:\n product: windows\n category: process_creation\ndetection:\n selection_img:\n Image|endswith:\n - '\\brave.exe'\n - '\\chrome.exe'\n - '\\msedge.exe'\n - '\\opera.exe'\n - '\\vivaldi.exe'\n selection_headless:\n CommandLine|contains: '--headless'\n selection_url:\n CommandLine|contains:\n - '://run.mocky'\n - '://mockbin'\n condition: all of selection_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects the execution of a Chromium-based browser process with the \"headless\" flag and a URL pointing to the mockbin.org service, which could be used to exfiltrate data. It provides a method to identify potentially malicious activities involving browser processes and specific URLs.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_cmd_copy_dmp_from_share.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_cmd_copy_dmp_from_share.yml",
"creation_Date": "2024-08-07T17:56:08.875753",
"modification_Date": "2024-08-07T20:37:07.491618",
"lastUpdate_Date": "2024-08-07T20:37:07.491621",
"sigmaRule": "title: Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE\nid: 044ba588-dff4-4918-9808-3f95e8160606\nstatus: test\ndescription: Detects usage of the copy builtin cmd command to copy files with the \".dmp\"/\".dump\" extension from a remote share\nreferences:\n - https://thedfirreport.com/2022/09/26/bumblebee-round-two/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/09/27\nmodified: 2023/09/12\ntags:\n - attack.credential_access\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # Example: copy \\\\<host>\\\\<folder>\\\\process.dmp C:\\Users\\process.dmp\n selection_img:\n - Image|endswith: '\\cmd.exe'\n - OriginalFileName: 'Cmd.Exe'\n selection_cli:\n CommandLine|contains|all:\n - 'copy '\n - ' \\\\\\\\'\n CommandLine|contains:\n - '.dmp'\n - '.dump'\n - '.hdmp'\n condition: all of selection_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects the usage of the copy command in cmd.exe to copy files with the \".dmp\" or \".dump\" extension from a remote share. It provides examples of command line parameters to look for and specifies the conditions that need to be met for the rule to trigger. The rule has a high level of severity and there are no specified false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_cmd_del_greedy_deletion.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_cmd_del_greedy_deletion.yml",
"creation_Date": "2024-08-07T17:56:10.150825",
"modification_Date": "2024-08-07T20:37:07.491664",
"lastUpdate_Date": "2024-08-07T20:37:07.491667",
"sigmaRule": "title: Greedy File Deletion Using Del\nid: 204b17ae-4007-471b-917b-b917b315c5db\nstatus: test\ndescription: Detects execution of the \"del\" builtin command to remove files using greedy/wildcard expression. This is often used by malware to delete content of folders that perhaps contains the initial malware infection or to delete evidence.\nreferences:\n - https://www.joesandbox.com/analysis/509330/0/html#1044F3BDBE3BB6F734E357235F4D5898582D\n - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/erase\nauthor: frack113 , X__Junior (Nextron Systems)\ndate: 2021/12/02\nmodified: 2023/09/11\ntags:\n - attack.defense_evasion\n - attack.t1070.004\nlogsource:\n category: process_creation\n product: windows\ndetection:\n # Example:\n # del C:\\ProgramData\\*.dll & exit\n selection_img:\n - Image|endswith: '\\cmd.exe'\n - OriginalFileName: 'Cmd.Exe'\n selection_del:\n CommandLine|contains:\n - 'del '\n - 'erase '\n selection_extensions:\n CommandLine|contains:\n - '\\\\\\*.au3'\n - '\\\\\\*.dll'\n - '\\\\\\*.exe'\n - '\\\\\\*.js'\n condition: all of selection_*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "Sigma Rule ID 204b17ae-4007-471b-917b-b917b315c5db detects the execution of the \"del\" command in Windows, which is often used by malware to delete files using wildcard expressions. This behavior is commonly seen in malicious activities to remove evidence or delete content of folders containing malware infections. The rule provides specific criteria for detection, including the presence of specific file extensions and the use of the del command in the command line.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_diskshadow_child_process_susp.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_diskshadow_child_process_susp.yml",
"creation_Date": "2024-08-07T17:56:11.595190",
"modification_Date": "2024-08-07T20:37:07.491712",
"lastUpdate_Date": "2024-08-07T20:37:07.491715",
"sigmaRule": "title: Potentially Suspicious Child Process Of DiskShadow.EXE\nid: 9f546b25-5f12-4c8d-8532-5893dcb1e4b8\nrelated:\n - id: fa1a7e52-3d02-435b-81b8-00da14dd66c1 # Diskshadow Script Mode - Execution From Potential Suspicious Location\n type: similar\n - id: 1dde5376-a648-492e-9e54-4241dd9b0c7f # Diskshadow Script Mode - Uncommon Script Extension Execution\n type: similar\n - id: 56b1dde8-b274-435f-a73a-fb75eb81262a # Diskshadow Child Process Spawned\n type: similar\n - id: 0c2f8629-7129-4a8a-9897-7e0768f13ff2 # Diskshadow Script Mode Execution\n type: similar\nstatus: test\ndescription: Detects potentially suspicious child processes of \"Diskshadow.exe\". This could be an attempt to bypass parent/child relationship detection or application whitelisting rules.\nreferences:\n - https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration\n - https://medium.com/@cyberjyot/lolbin-execution-via-diskshadow-f6ff681a27a4\n - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/diskshadow\n - https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf\n - https://www.zscaler.com/blogs/security-research/technical-analysis-crytox-ransomware\n - https://research.checkpoint.com/2022/evilplayout-attack-against-irans-state-broadcaster/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/15\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\diskshadow.exe'\n Image|endswith:\n # Note: add or remove additional binaries according to your org needs\n - '\\certutil.exe'\n - '\\cscript.exe'\n - '\\mshta.exe'\n - '\\powershell.exe'\n - '\\pwsh.exe'\n - '\\regsvr32.exe'\n - '\\rundll32.exe'\n - '\\wscript.exe'\n condition: selection\nfalsepositives:\n - False postitve can occur in cases where admin scripts levreage the \"exec\" flag to execute applications\nlevel: medium\n",
"summary": "This Sigma Rule detects potentially suspicious child processes of \"Diskshadow.exe,\" which may indicate an attempt to bypass parent/child relationship detection or application whitelisting rules. The rule provides a selection of binaries commonly associated with malicious activity for comparison, with potential false positives occurring in cases where admin scripts leverage the \"exec\" flag to execute applications.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_location.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_diskshadow_script_mode_susp_location.yml",
"creation_Date": "2024-08-07T17:56:12.699383",
"modification_Date": "2024-08-07T20:37:07.491764",
"lastUpdate_Date": "2024-08-07T20:37:07.491767",
"sigmaRule": "title: Diskshadow Script Mode - Execution From Potential Suspicious Location\nid: fa1a7e52-3d02-435b-81b8-00da14dd66c1\nrelated:\n - id: 1dde5376-a648-492e-9e54-4241dd9b0c7f # Diskshadow Script Mode - Uncommon Script Extension Execution\n type: similar\n - id: 9f546b25-5f12-4c8d-8532-5893dcb1e4b8 # Potentially Suspicious Child Process Of DiskShadow.EXE\n type: similar\n - id: 56b1dde8-b274-435f-a73a-fb75eb81262a # Diskshadow Child Process Spawned\n type: similar\n - id: 0c2f8629-7129-4a8a-9897-7e0768f13ff2 # Diskshadow Script Mode Execution\n type: similar\nstatus: test\ndescription: Detects execution of \"Diskshadow.exe\" in script mode using the \"/s\" flag where the script is located in a potentially suspicious location.\nreferences:\n - https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/\n - https://www.ired.team/offensive-security/credential-access-and-credential-dumping/ntds.dit-enumeration\n - https://medium.com/@cyberjyot/lolbin-execution-via-diskshadow-f6ff681a27a4\n - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/diskshadow\n - https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf\n - https://www.zscaler.com/blogs/security-research/technical-analysis-crytox-ransomware\n - https://research.checkpoint.com/2022/evilplayout-attack-against-irans-state-broadcaster/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/15\nmodifier: 2024/03/05\ntags:\n - attack.defense_evasion\n - attack.t1218\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - OriginalFileName: 'diskshadow.exe'\n - Image|endswith: '\\diskshadow.exe'\n selection_cli:\n CommandLine|contains|windash: '-s '\n selection_paths:\n CommandLine|contains:\n # Note: Add additional susp paths based on your org needs\n - ':\\Temp\\'\n - ':\\Windows\\Temp\\'\n - '\\AppData\\Local\\'\n - '\\AppData\\Roaming\\'\n - '\\ProgramData\\'\n - '\\Users\\Public\\'\n condition: all of selection_*\nfalsepositives:\n - False positives may occur if you execute the script from one of the paths mentioned in the rule. Apply additional filters that fits your org needs.\nlevel: medium\n",
"summary": "This Sigma Rule detects the execution of \"Diskshadow.exe\" in script mode with the \"/s\" flag, where the script is located in a potentially suspicious location. It provides related rules and references for further information. The rule includes detection criteria based on process creation events on Windows, with selection of image, command line, and paths to identify suspicious activity. False positives may occur if the script is executed from the specified paths, and organizations are advised to apply additional filters as needed. The rule is classified as a medium level alert.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_driverquery_recon.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_driverquery_recon.yml",
"creation_Date": "2024-08-07T17:56:14.049389",
"modification_Date": "2024-08-07T20:37:07.491810",
"lastUpdate_Date": "2024-08-07T20:37:07.491813",
"sigmaRule": "title: Potential Recon Activity Using DriverQuery.EXE\nid: 9fc3072c-dc8f-4bf7-b231-18950000fadd\nrelated:\n - id: a20def93-0709-4eae-9bd2-31206e21e6b2\n type: similar\nstatus: test\ndescription: Detect usage of the \"driverquery\" utility to perform reconnaissance on installed drivers\nreferences:\n - https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/\n - https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/\n - https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/01/19\nmodified: 2023/09/29\ntags:\n - attack.discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith: 'driverquery.exe'\n - OriginalFileName: 'drvqry.exe'\n selection_parent:\n - ParentImage|endswith:\n - '\\cscript.exe'\n - '\\mshta.exe'\n - '\\regsvr32.exe'\n - '\\rundll32.exe'\n - '\\wscript.exe'\n - ParentImage|contains:\n - '\\AppData\\Local\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n condition: all of selection_*\nfalsepositives:\n - Legitimate usage by some scripts might trigger this as well\nlevel: high\n",
"summary": "This Sigma Rule detects potential reconnaissance activity using the \"driverquery\" utility to gather information on installed drivers. It looks for instances of driverquery.exe being executed by specific parent processes such as cscript.exe, mshta.exe, regsvr32.exe, rundll32.exe, and wscript.exe, and in specific locations like AppData\\Local, Users\\Public, and Windows\\Temp. Legitimate usage by some scripts may trigger false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_driverquery_usage.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_driverquery_usage.yml",
"creation_Date": "2024-08-07T17:56:15.350852",
"modification_Date": "2024-08-07T20:37:07.491856",
"lastUpdate_Date": "2024-08-07T20:37:07.491859",
"sigmaRule": "title: DriverQuery.EXE Execution\nid: a20def93-0709-4eae-9bd2-31206e21e6b2\nrelated:\n - id: 9fc3072c-dc8f-4bf7-b231-18950000fadd\n type: similar\nstatus: test\ndescription: Detect usage of the \"driverquery\" utility. Which can be used to perform reconnaissance on installed drivers\nreferences:\n - https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/\n - https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/\n - https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/01/19\nmodified: 2023/09/29\ntags:\n - attack.discovery\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n - Image|endswith: 'driverquery.exe'\n - OriginalFileName: 'drvqry.exe'\n filter_main_other: # These are covered in 9fc3072c-dc8f-4bf7-b231-18950000fadd to avoid duplicate alerting\n - ParentImage|endswith:\n - '\\cscript.exe'\n - '\\mshta.exe'\n - '\\regsvr32.exe'\n - '\\rundll32.exe'\n - '\\wscript.exe'\n - ParentImage|contains:\n - '\\AppData\\Local\\'\n - '\\Users\\Public\\'\n - '\\Windows\\Temp\\'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Legitimate use by third party tools in order to investigate installed drivers\nlevel: medium # Level could be reduced to low if this utility is often used in your environment\n",
"summary": "The Sigma rule detects the execution of the \"driverquery\" utility, which can be used for recon on installed drivers. It specifies conditions for detecting the utility's usage and includes references for further reading. The rule also mentions potential false positives and provides a medium level of severity for alerts.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_renamed_autoit.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_renamed_autoit.yml",
"creation_Date": "2024-08-07T17:56:16.392809",
"modification_Date": "2024-08-07T20:37:07.491904",
"lastUpdate_Date": "2024-08-07T20:37:07.491907",
"sigmaRule": "title: Renamed AutoIt Execution\nid: f4264e47-f522-4c38-a420-04525d5b880f\nstatus: test\ndescription: |\n Detects the execution of a renamed AutoIt2.exe or AutoIt3.exe.\n AutoIt is a scripting language and automation tool for Windows systems. While primarily used for legitimate automation tasks, it can be misused in cyber attacks.\n Attackers can leverage AutoIt to create and distribute malware, including keyloggers, spyware, and botnets. A renamed AutoIt executable is particularly suspicious.\nreferences:\n - https://twitter.com/malmoeb/status/1665463817130725378?s=12&t=C0_T_re0wRP_NfKa27Xw9w\n - https://www.autoitscript.com/site/\nauthor: Florian Roth (Nextron Systems)\ndate: 2023/06/04\nmodified: 2023/09/19\ntags:\n - attack.defense_evasion\n - attack.t1027\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_1:\n CommandLine|contains:\n - ' /AutoIt3ExecuteScript'\n - ' /ErrorStdOut'\n selection_2:\n - Imphash:\n - 'fdc554b3a8683918d731685855683ddf' # AutoIt v2 - doesn't cover all binaries\n - 'cd30a61b60b3d60cecdb034c8c83c290' # AutoIt v2 - doesn't cover all binaries\n - 'f8a00c72f2d667d2edbb234d0c0ae000' # AutoIt v3 - doesn't cover all binaries\n - Hashes|contains:\n - 'IMPHASH=FDC554B3A8683918D731685855683DDF' # AutoIt v2 - doesn't cover all binaries\n - 'IMPHASH=CD30A61B60B3D60CECDB034C8C83C290' # AutoIt v2 - doesn't cover all binaries\n - 'IMPHASH=F8A00C72F2D667D2EDBB234D0C0AE000' # AutoIt v3 - doesn't cover all binaries\n selection_3:\n OriginalFileName:\n - 'AutoIt3.exe'\n - 'AutoIt2.exe'\n - 'AutoIt.exe'\n filter_main_legit_name:\n Image|endswith:\n - '\\AutoIt.exe'\n - '\\AutoIt2.exe'\n - '\\AutoIt3_x64.exe'\n - '\\AutoIt3.exe'\n condition: 1 of selection_* and not 1 of filter_main_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects the execution of a renamed AutoIt2.exe or AutoIt3.exe, which are scripting languages used for automation tasks on Windows systems. Attackers can misuse AutoIt to create and distribute malware, making a renamed AutoIt executable particularly suspicious. The rule includes criteria such as specific command line parameters, imphashes, file names, and file paths to identify potentially malicious activity.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_rundll32_webdav_client_susp_execution.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_rundll32_webdav_client_susp_execution.yml",
"creation_Date": "2024-08-07T17:56:18.529748",
"modification_Date": "2024-08-07T20:37:07.491957",
"lastUpdate_Date": "2024-08-07T20:37:07.491960",
"sigmaRule": "title: Suspicious WebDav Client Execution Via Rundll32.EXE\nid: 982e9f2d-1a85-4d5b-aea4-31f5e97c6555\nstatus: test\ndescription: |\n Detects \"svchost.exe\" spawning \"rundll32.exe\" with command arguments like C:\\windows\\system32\\davclnt.dll,DavSetCookie. This could be an indicator of exfiltration or use of WebDav to launch code (hosted on WebDav Server) or potentially a sign of exploitation of CVE-2023-23397\nreferences:\n - https://twitter.com/aceresponder/status/1636116096506818562\n - https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/\n - https://www.pwndefend.com/2023/03/15/the-long-game-persistent-hash-theft/\n - https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2023/03/Figure-7-sample-webdav-process-create-event.png\n - https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/\nauthor: Nasreddine Bencherchali (Nextron Systems), Florian Roth (Nextron Systems)\ndate: 2023/03/16\nmodified: 2023/09/18\ntags:\n - attack.exfiltration\n - attack.t1048.003\n - cve.2023.23397\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: '\\svchost.exe'\n ParentCommandLine|contains: '-s WebClient'\n Image|endswith: '\\rundll32.exe'\n CommandLine|contains: 'C:\\windows\\system32\\davclnt.dll,DavSetCookie'\n CommandLine|re: '://\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}'\n filter_local_ips:\n CommandLine|contains:\n - '://10.' # 10.0.0.0/8\n - '://192.168.' # 192.168.0.0/16\n - '://172.16.' # 172.16.0.0/12\n - '://172.17.'\n - '://172.18.'\n - '://172.19.'\n - '://172.20.'\n - '://172.21.'\n - '://172.22.'\n - '://172.23.'\n - '://172.24.'\n - '://172.25.'\n - '://172.26.'\n - '://172.27.'\n - '://172.28.'\n - '://172.29.'\n - '://172.30.'\n - '://172.31.'\n - '://127.' # 127.0.0.0/8\n - '://169.254.' # 169.254.0.0/16\n condition: selection and not 1 of filter_*\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects instances of \"svchost.exe\" spawning \"rundll32.exe\" with specific command arguments related to WebDav, which could indicate exfiltration, code execution, or exploitation of CVE-2023-23397. The rule includes specific filters to exclude common local IP ranges and has a high level of confidence.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_vscode_tunnel_renamed_execution.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_vscode_tunnel_renamed_execution.yml",
"creation_Date": "2024-08-07T17:56:20.204468",
"modification_Date": "2024-08-07T20:37:07.492003",
"lastUpdate_Date": "2024-08-07T20:37:07.492006",
"sigmaRule": "title: Renamed Visual Studio Code Tunnel Execution\nid: 2cf29f11-e356-4f61-98c0-1bdb9393d6da\nstatus: test\ndescription: Detects renamed Visual Studio Code tunnel execution. Attackers can abuse this functionality to establish a C2 channel\nreferences:\n - https://ipfyx.fr/post/visual-studio-code-tunnel/\n - https://badoption.eu/blog/2023/01/31/code_c2.html\n - https://code.visualstudio.com/docs/remote/tunnels\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/28\ntags:\n - attack.command_and_control\n - attack.t1071.001\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_image_only_tunnel:\n OriginalFileName: null\n CommandLine|endswith: '.exe tunnel'\n selection_image_tunnel_args:\n CommandLine|contains|all:\n - '.exe tunnel'\n - '--name '\n - '--accept-server-license-terms'\n selection_image_tunnel_service:\n CommandLine|contains|all:\n - 'tunnel '\n - 'service'\n - 'internal-run'\n - 'tunnel-service.log'\n selection_parent_tunnel:\n ParentCommandLine|endswith: ' tunnel'\n Image|endswith: '\\cmd.exe'\n CommandLine|contains|all:\n - '/d /c '\n - '\\servers\\Stable-'\n - 'code-server.cmd'\n filter_main_parent_code:\n ParentImage|endswith:\n - '\\code-tunnel.exe'\n - '\\code.exe'\n filter_main_image_code:\n Image|endswith:\n - '\\code-tunnel.exe'\n - '\\code.exe'\n condition: (1 of selection_image_* and not 1 of filter_main_image_*) or (selection_parent_tunnel and not 1 of filter_main_parent_*)\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma rule detects renamed Visual Studio Code tunnel execution, which attackers can exploit to establish a command and control channel. It includes various detection criteria based on process creation events in Windows. The rule was authored by Nasreddine Bencherchali and references related articles. The detection criteria involve identifying specific command line parameters and parent processes associated with Visual Studio Code tunnel execution. The rule has a high level of detection and potential false positives are listed as unknown.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_winrar_exfil_dmp_files.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_winrar_exfil_dmp_files.yml",
"creation_Date": "2024-08-07T17:56:21.597034",
"modification_Date": "2024-08-07T20:37:07.492049",
"lastUpdate_Date": "2024-08-07T20:37:07.492052",
"sigmaRule": "title: Winrar Compressing Dump Files\nid: 1ac14d38-3dfc-4635-92c7-e3fd1c5f5bfc\nrelated:\n - id: ec570e53-4c76-45a9-804d-dc3f355ff7a7\n type: similar\nstatus: test\ndescription: Detects execution of WinRAR in order to compress a file with a \".dmp\"/\".dump\" extension, which could be a step in a process of dump file exfiltration.\nreferences:\n - https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/\nauthor: Florian Roth (Nextron Systems)\ndate: 2022/01/04\nmodified: 2023/09/12\ntags:\n - attack.collection\n - attack.t1560.001\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith:\n - '\\rar.exe'\n - '\\winrar.exe'\n - Description: 'Command line RAR'\n selection_extension:\n CommandLine|contains:\n - '.dmp'\n - '.dump'\n - '.hdmp'\n condition: all of selection_*\nfalsepositives:\n - Legitimate use of WinRAR with a command line in which \".dmp\" or \".dump\" appears accidentally\n - Legitimate use of WinRAR to compress WER \".dmp\" files for troubleshooting\nlevel: medium\n",
"summary": "This Sigma rule detects the execution of WinRAR to compress files with a \".dmp\" or \".dump\" extension, which could indicate a step in the process of dump file exfiltration. It provides specific selection criteria for detecting this activity and lists potential false positives, such as legitimate use of WinRAR for troubleshooting purposes. The rule is considered a medium-level detection.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_wmic_recon_unquoted_service_search.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_wmic_recon_unquoted_service_search.yml",
"creation_Date": "2024-08-07T17:56:22.911602",
"modification_Date": "2024-08-07T20:37:07.492096",
"lastUpdate_Date": "2024-08-07T20:37:07.492099",
"sigmaRule": "title: Potential Unquoted Service Path Reconnaissance Via Wmic.EXE\nid: 68bcd73b-37ef-49cb-95fc-edc809730be6\nrelated:\n - id: 09658312-bc27-4a3b-91c5-e49ab9046d1b # PowerShell Variant\n type: similar\n - id: 76f55eaa-d27f-4213-9d45-7b0e4b60bbae\n type: similar\nstatus: test\ndescription: Detects known WMI recon method to look for unquoted service paths using wmic. Often used by pentester and attacker enumeration scripts\nreferences:\n - https://github.com/nccgroup/redsnarf/blob/35949b30106ae543dc6f2bc3f1be10c6d9a8d40e/redsnarf.py\n - https://github.com/S3cur3Th1sSh1t/Creds/blob/eac23d67f7f90c7fc8e3130587d86158c22aa398/PowershellScripts/jaws-enum.ps1\n - https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/06/20\nmodified: 2023/09/11\ntags:\n - attack.execution\n - attack.t1047\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - OriginalFileName: 'wmic.exe'\n - Image|endswith: '\\WMIC.exe'\n selection_cli:\n CommandLine|contains|all:\n - ' service get '\n - 'name,displayname,pathname,startmode'\n condition: all of selection*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma Rule detects potential unquoted service path reconnaissance using Wmic.EXE, a known WMI reconnaissance method often used by pentesters and attackers. The rule looks for the presence of 'wmic.exe' in process creation events on Windows systems, along with specific command line parameters related to service path enumeration. The rule has a medium severity level and may have some false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/process_creation/proc_creation_win_wmic_terminate_application.yml": {
"filename": "rules/windows/process_creation/proc_creation_win_wmic_terminate_application.yml",
"creation_Date": "2024-08-07T17:56:24.106430",
"modification_Date": "2024-08-07T20:37:07.492142",
"lastUpdate_Date": "2024-08-07T20:37:07.492145",
"sigmaRule": "title: Application Terminated Via Wmic.EXE\nid: 49d9671b-0a0a-4c09-8280-d215bfd30662\nrelated:\n - id: 847d5ff3-8a31-4737-a970-aeae8fe21765 # Uninstall Security Products\n type: derived\nstatus: test\ndescription: Detects calls to the \"terminate\" function via wmic in order to kill an application\nreferences:\n - https://cyble.com/blog/lockfile-ransomware-using-proxyshell-attack-to-deploy-ransomware/\n - https://www.bitdefender.com/files/News/CaseStudies/study/377/Bitdefender-Whitepaper-WMI-creat4871-en-EN-GenericUse.pdf\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/09/11\ntags:\n - attack.execution\n - attack.t1047\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_img:\n - Image|endswith: '\\WMIC.exe'\n - OriginalFileName: 'wmic.exe'\n selection_cli:\n CommandLine|contains|all:\n - 'call'\n - 'terminate'\n condition: all of selection_*\nfalsepositives:\n - Unknown\nlevel: medium\n",
"summary": "This Sigma rule detects calls to the \"terminate\" function via wmic.exe in order to kill an application on Windows systems. The rule includes specific conditions for detection based on process creation events. The rule is authored by Nasreddine Bencherchali from Nextron Systems and is currently in a test status. More information and references can be found in the description.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/registry/registry_set/registry_set_office_trusted_location_uncommon.yml": {
"filename": "rules/windows/registry/registry_set/registry_set_office_trusted_location_uncommon.yml",
"creation_Date": "2024-08-07T17:56:25.362184",
"modification_Date": "2024-08-07T20:37:07.492347",
"lastUpdate_Date": "2024-08-07T20:37:07.492353",
"sigmaRule": "title: Uncommon Microsoft Office Trusted Location Added\nid: f742bde7-9528-42e5-bd82-84f51a8387d2\nrelated:\n - id: a0bed973-45fa-4625-adb5-6ecdf9be70ac\n type: derived\nstatus: test\ndescription: Detects changes to registry keys related to \"Trusted Location\" of Microsoft Office where the path is set to something uncommon. Attackers might add additional trusted locations to avoid macro security restrictions.\nreferences:\n - Internal Research\n - https://admx.help/?Category=Office2016&Policy=excel16.Office.Microsoft.Policies.Windows::L_TrustedLoc01\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2023/06/21\nmodified: 2023/09/29\ntags:\n - attack.defense_evasion\n - attack.t1112\nlogsource:\n category: registry_set\n product: windows\ndetection:\n selection:\n TargetObject|contains: 'Security\\Trusted Locations\\Location'\n TargetObject|endswith: '\\Path'\n filter_exclude_known_paths:\n Details|contains:\n - '%APPDATA%\\Microsoft\\Templates'\n - '%%APPDATA%%\\Microsoft\\Templates'\n - '%APPDATA%\\Microsoft\\Word\\Startup'\n - '%%APPDATA%%\\Microsoft\\Word\\Startup'\n - ':\\Program Files (x86)\\Microsoft Office\\root\\Templates\\'\n - ':\\Program Files\\Microsoft Office (x86)\\Templates'\n - ':\\Program Files\\Microsoft Office\\root\\Templates\\'\n - ':\\Program Files\\Microsoft Office\\Templates\\'\n filter_main_office_click_to_run:\n Image|contains: ':\\Program Files\\Common Files\\Microsoft Shared\\ClickToRun\\'\n Image|endswith: '\\OfficeClickToRun.exe'\n filter_main_office_apps:\n Image|contains:\n - ':\\Program Files\\Microsoft Office\\'\n - ':\\Program Files (x86)\\Microsoft Office\\'\n condition: selection and not 1 of filter_main_* and not 1 of filter_exclude_*\nfalsepositives:\n - Other unknown legitimate or custom paths need to be filtered to avoid false positives\nlevel: high\n",
"summary": "This Sigma Rule detects changes to registry keys related to \"Trusted Location\" in Microsoft Office where the path is set to something uncommon. Attackers may add additional trusted locations to bypass macro security restrictions. The rule filters out known paths related to Microsoft Office templates and ClickToRun, reducing false positives.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/registry/registry_set/registry_set_persistence_search_order.yml": {
"filename": "rules/windows/registry/registry_set/registry_set_persistence_search_order.yml",
"creation_Date": "2024-08-07T17:56:26.434109",
"modification_Date": "2024-08-07T20:37:07.492432",
"lastUpdate_Date": "2024-08-07T20:37:07.492436",
"sigmaRule": "title: Potential Persistence Via COM Search Order Hijacking\nid: a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12\nstatus: test\ndescription: Detects potential COM object hijacking leveraging the COM Search Order\nreferences:\n - https://www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/\nauthor: Maxime Thiebaut (@0xThiebaut), oscd.community, C\u00e9dric Hien\ndate: 2020/04/14\nmodified: 2023/09/28\ntags:\n - attack.persistence\n - attack.t1546.015\nlogsource:\n category: registry_set\n product: windows\ndetection:\n selection: # Detect new COM servers in the user hive\n TargetObject|contains: '\\CLSID\\'\n TargetObject|endswith: '\\InprocServer32\\(Default)'\n filter_main_generic:\n Details|contains: # Exclude privileged directories and observed FPs\n - '%%systemroot%%\\system32\\'\n - '%%systemroot%%\\SysWow64\\'\n filter_main_onedrive:\n Details|contains:\n # Related To OneDrive\n - '\\AppData\\Local\\Microsoft\\OneDrive\\'\n - '\\FileCoAuthLib64.dll'\n - '\\FileSyncShell64.dll'\n - '\\FileSyncApi64.dll'\n filter_main_health_service:\n Image|endswith: ':\\WINDOWS\\system32\\SecurityHealthService.exe'\n filter_main_teams:\n Details|contains|all:\n - '\\AppData\\Local\\Microsoft\\TeamsMeetingAddin\\'\n - '\\Microsoft.Teams.AddinLoader.dll'\n filter_main_dropbox:\n Details|contains|all:\n - '\\AppData\\Roaming\\Dropbox\\'\n - '\\DropboxExt64.*.dll'\n filter_main_trend_micro:\n Details|endswith: 'TmopIEPlg.dll' # TrendMicro osce\n filter_main_update:\n Image|endswith:\n - ':\\WINDOWS\\system32\\wuauclt.exe'\n - ':\\WINDOWS\\system32\\svchost.exe'\n filter_main_defender:\n Image|contains:\n - ':\\ProgramData\\Microsoft\\Windows Defender\\Platform\\'\n - ':\\Program Files\\Windows Defender\\'\n Image|endswith: '\\MsMpEng.exe'\n filter_main_nvidia:\n Details|contains: '\\FileRepository\\nvmdi.inf'\n filter_main_edge:\n Image|endswith: '\\MicrosoftEdgeUpdateComRegisterShell64.exe'\n filter_main_dx:\n Image|endswith: ':\\WINDOWS\\SYSTEM32\\dxdiag.exe'\n filter_main_python:\n Details|endswith:\n - ':\\Windows\\pyshellext.amd64.dll'\n - ':\\Windows\\pyshellext.dll'\n filter_main_bonjourlib:\n Details|endswith:\n - ':\\Windows\\system32\\dnssdX.dll'\n - ':\\Windows\\SysWOW64\\dnssdX.dll'\n filter_main_printextensionmanager:\n Details|endswith: ':\\Windows\\system32\\spool\\drivers\\x64\\3\\PrintConfig.dll'\n filter_main_programfiles:\n Details|contains:\n - ':\\Program Files\\'\n - ':\\Program Files (x86)\\'\n filter_main_programdata:\n Details|contains: ':\\ProgramData\\Microsoft\\'\n filter_main_gameservice:\n Details|contains: ':\\WINDOWS\\system32\\GamingServicesProxy.dll'\n filter_main_poqexec:\n Image|endswith: ':\\Windows\\System32\\poqexec.exe'\n Details|contains: ':\\Windows\\System32\\Autopilot.dll'\n filter_main_sec_health_svc:\n Image|endswith: ':\\Windows\\system32\\SecurityHealthService.exe'\n Details|contains: ':\\Windows\\System32\\SecurityHealth'\n filter_main_inprocserver:\n Image|endswith:\n - ':\\Windows\\System32\\poqexec.exe'\n - ':\\Windows\\System32\\regsvr32.exe'\n TargetObject|endswith: '\\InProcServer32\\(Default)'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Some installed utilities (i.e. OneDrive) may serve new COM objects at user-level\nlevel: medium\n",
"summary": "This Sigma Rule detects potential COM object hijacking by monitoring for new COM servers in the user hive that do not belong to privileged directories. It includes filters to exclude known false positives related to OneDrive, security health services, Microsoft Teams, Dropbox, TrendMicro, Windows updates, Windows Defender, NVIDIA, Microsoft Edge, DirectX, Python, Bonjour, printer extensions, program files, program data, game services, and specific executable files. The rule has a medium level of severity and may produce false positives for some installed utilities.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/registry/registry_set/registry_set_uac_bypass_eventvwr.yml": {
"filename": "rules/windows/registry/registry_set/registry_set_uac_bypass_eventvwr.yml",
"creation_Date": "2024-08-07T17:56:28.175799",
"modification_Date": "2024-08-07T20:37:07.492497",
"lastUpdate_Date": "2024-08-07T20:37:07.492501",
"sigmaRule": "title: UAC Bypass via Event Viewer\nid: 7c81fec3-1c1d-43b0-996a-46753041b1b6\nstatus: test\ndescription: Detects UAC bypass method using Windows event viewer\nreferences:\n - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/\n - https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100\nauthor: Florian Roth (Nextron Systems)\ndate: 2017/03/19\nmodified: 2023/09/28\ntags:\n - attack.defense_evasion\n - attack.privilege_escalation\n - attack.t1548.002\n - car.2019-04-001\nlogsource:\n product: windows\n category: registry_set\ndetection:\n selection:\n TargetObject|endswith: '\\mscfile\\shell\\open\\command'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects a UAC bypass method using Windows Event Viewer by monitoring registry changes that involve a specific file path related to Event Viewer. The rule has a high level of severity and was created by Florian Roth.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/sysmon/sysmon_file_block_executable.yml": {
"filename": "rules/windows/sysmon/sysmon_file_block_executable.yml",
"creation_Date": "2024-08-07T17:56:29.201610",
"modification_Date": "2024-08-07T20:37:07.492556",
"lastUpdate_Date": "2024-08-07T20:37:07.492560",
"sigmaRule": "title: Sysmon Blocked Executable\nid: 23b71bc5-953e-4971-be4c-c896cda73fc2\nstatus: test\ndescription: Triggers on any Sysmon \"FileBlockExecutable\" event, which indicates a violation of the configured block policy\nreferences:\n - https://medium.com/@olafhartong/sysmon-14-0-fileblockexecutable-13d7ba3dff3e\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/08/16\nmodified: 2023/09/16\ntags:\n - attack.defense_evasion\nlogsource:\n product: windows\n service: sysmon\ndetection:\n selection:\n EventID: 27 # this is fine, we want to match any FileBlockExecutable event\n condition: selection\nfalsepositives:\n - Unlikely\nlevel: high\n",
"summary": "This Sigma Rule triggers on any Sysmon \"FileBlockExecutable\" event, indicating a violation of the configured block policy. The rule has a high level of severity and is unlikely to result in false positives. It was authored by Nasreddine Bencherchali and last modified on September 16, 2023.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml": {
"filename": "rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml",
"creation_Date": "2024-08-07T17:56:30.215874",
"modification_Date": "2024-08-07T20:37:07.492609",
"lastUpdate_Date": "2024-08-07T20:37:07.492612",
"sigmaRule": "title: Suspicious Scripting in a WMI Consumer\nid: fe21810c-2a8c-478f-8dd3-5a287fb2a0e0\nstatus: test\ndescription: Detects suspicious commands that are related to scripting/powershell in WMI Event Consumers\nreferences:\n - https://in.security/an-intro-into-abusing-and-identifying-wmi-event-subscriptions-for-persistence/\n - https://github.com/Neo23x0/signature-base/blob/615bf1f6bac3c1bdc417025c40c073e6c2771a76/yara/gen_susp_lnk_files.yar#L19\n - https://github.com/RiccardoAncarani/LiquidSnake\nauthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro\ndate: 2019/04/15\nmodified: 2023/09/09\ntags:\n - attack.execution\n - attack.t1059.005\nlogsource:\n product: windows\n category: wmi_event\ndetection:\n selection_destination:\n - Destination|contains|all:\n - 'new-object'\n - 'net.webclient'\n - '.downloadstring'\n - Destination|contains|all:\n - 'new-object'\n - 'net.webclient'\n - '.downloadfile'\n - Destination|contains:\n - ' iex('\n - ' -nop '\n - ' -noprofile '\n - ' -decode '\n - ' -enc '\n - 'WScript.Shell'\n - 'System.Security.Cryptography.FromBase64Transform'\n condition: selection_destination\nfields:\n - User\n - Operation\nfalsepositives:\n - Legitimate administrative scripts\nlevel: high\n",
"summary": "This Sigma rule detects suspicious commands related to scripting or PowerShell in WMI Event Consumers. It looks for specific strings in the destination field such as 'new-object', 'net.webclient', '.downloadstring', 'iex(', '-nop', '-noprofile', '-decode', '-enc', 'WScript.Shell', and 'System.Security.Cryptography.FromBase64Transform'. False positives may occur with legitimate administrative scripts.",
"modification_count": 5,
"comment_history": [
"Merge PR #4942 from @nasbench - promote older rules status from experimental to test"
]
},
"rules-emerging-threats/2024/Malware/CSharp-Streamer/image_load_malware_csharp_streamer_dotnet_load.yml": {
"filename": "rules-emerging-threats/2024/Malware/CSharp-Streamer/image_load_malware_csharp_streamer_dotnet_load.yml",
"creation_Date": "2024-08-07T17:59:36.070244",
"modification_Date": "2024-08-07T17:59:36.070289",
"lastUpdate_Date": "2024-08-07T17:59:36.981445",
"sigmaRule": "title: Potential CSharp Streamer RAT Loading .NET Executable Image\nid: 6f6afac3-8e7a-4e4b-9588-2608ffe08f82\nstatus: experimental\ndescription: |\n Detects potential CSharp Streamer RAT loading .NET executable image by using the default file name and path associated with the tool.\nreferences:\n - https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/#detections\n - https://cyber.wtf/2023/12/06/the-csharp-streamer-rat/\nauthor: Luca Di Bartolomeo\ndate: 2024/06/22\ntags:\n - attack.command_and_control\n - attack.t1219\nlogsource:\n category: image_load\n product: windows\ndetection:\n selection:\n ImageLoaded|re: '\\\\AppData\\\\Local\\\\Temp\\\\dat[0-9A-Z]{4}\\.tmp'\n condition: selection\nfalsepositives:\n - Unknown\nlevel: high\n",
"summary": "This Sigma Rule detects potential CSharp Streamer RAT loading .NET executable image by using the default file name and path associated with the tool. The rule is tagged as high level and is considered experimental.",
"modification_count": 1,
"comment_history": [
"Merge PR #4885 from @LucaInfoSec - Add `Potential CSharp Streamer RAT Loading .NET Executable Image`"
]
},
"rules-threat-hunting/macos/process_creation/proc_creation_macos_pbpaste_execution.yml": {
"filename": "rules-threat-hunting/macos/process_creation/proc_creation_macos_pbpaste_execution.yml",
"creation_Date": "2024-08-07T17:59:36.994368",
"modification_Date": "2024-08-07T17:59:36.994416",
"lastUpdate_Date": "2024-08-07T17:59:39.554000",
"sigmaRule": "title: Clipboard Data Collection Via Pbpaste\nid: d8af0da1-2959-40f9-a3e4-37a6aa1228b7\nstatus: experimental\ndescription: |\n Detects execution of the \"pbpaste\" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout).\n The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands.\n It can also be used in shell scripts that may require clipboard content as input.\n Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information.\n Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.\nreferences:\n - https://www.loobins.io/binaries/pbpaste/\n - https://medium.com/@NullByteWht/hacking-macos-how-to-dump-1password-keepassx-lastpass-passwords-in-plaintext-723c5b1c311b\n - https://media.defense.gov/2021/Jul/19/2002805003/-1/-1/1/CSA_CHINESE_STATE-SPONSORED_CYBER_TTPS.PDF\nauthor: Daniel Cortez\ndate: 2024/07/30\ntags:\n - attack.collection\n - attack.credential_access\n - attack.t1115\n - detection.threat_hunting\nlogsource:\n product: macos\n category: process_creation\ndetection:\n selection:\n Image|endswith: '/pbpaste'\n condition: selection\nfalsepositives:\n - Legitimate administration activities\nlevel: medium\n",
"summary": "- The rule detects the execution of the \"pbpaste\" utility in macOS, which retrieves clipboard contents and writes them to standard output.\n- The utility is commonly used to create files, pass content to other commands, or provide input in shell scripts.\n- Attackers can exploit this utility to access sensitive information, like passwords, from the user's clipboard.\n- The rule helps in hunting for potential misuse of the utility by examining the parent process and suspicious command line content.\n- References include links to information on the \"pbpaste\" utility and potential password dumping techniques on macOS.\n- The rule was authored by Daniel Cortez in July 2024 and is tagged with categories like attack collection, credential access, and threat hunting.\n- It applies to macOS process creation events where the image ends with '/pbpaste'.\n- False positives may occur with legitimate administrative actions, and the severity level is medium.",
"modification_count": 1,
"comment_history": [
"Merge PR #4929 from @DefenderDaniel - Add `Clipboard Data Collection Via Pbpaste`"
]
},
"rules-threat-hunting/windows/file/file_access/file_access_win_browsers_chromium_sensitive_files.yml": {
"filename": "rules-threat-hunting/windows/file/file_access/file_access_win_browsers_chromium_sensitive_files.yml",
"creation_Date": "2024-08-07T17:59:39.575905",
"modification_Date": "2024-08-07T17:59:39.575954",
"lastUpdate_Date": "2024-08-07T17:59:40.486687",
"sigmaRule": "title: Access To Chromium Browsers Sensitive Files By Uncommon Applications\nid: c5f37810-a85f-4186-81e9-33f23abb4141\nstatus: experimental\ndescription: |\n Detects file access requests to chromium based browser sensitive files by uncommon processes.\n Could indicate potential attempt of stealing sensitive information.\nreferences:\n - Internal Research\nauthor: X__Junior (Nextron Systems)\ndate: 2024/07/29\ntags:\n - attack.t1003\n - attack.credential_access\n - detection.threat_hunting\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection:\n FileName|contains:\n - '\\User Data\\Default\\Cookies'\n - '\\User Data\\Default\\History'\n - '\\User Data\\Default\\Network\\Cookies'\n - '\\User Data\\Default\\Web Data'\n filter_main_system:\n Image: System\n filter_main_generic:\n # This filter is added to avoid large amount of FP with 3rd party software. You should remove this in favour of specific filter per-application\n Image|startswith:\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Program Files\\'\n - 'C:\\Windows\\system32\\'\n - 'C:\\Windows\\SysWOW64\\'\n filter_optional_defender:\n Image|startswith: 'C:\\ProgramData\\Microsoft\\Windows Defender\\'\n Image|endswith:\n - '\\MpCopyAccelerator.exe'\n - '\\MsMpEng.exe'\n condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Antivirus, Anti-Spyware, Anti-Malware Software\n - Backup software\n - Legitimate software installed on partitions other than \"C:\\\"\n - Searching software such as \"everything.exe\"\nlevel: low\n",
"summary": "This Sigma Rule detects file access requests to sensitive files of Chromium-based browsers by uncommon processes, which could indicate an attempt to steal sensitive information. The rule includes specific file paths to monitor and filters out common system processes and known defender applications to reduce false positives. The level of detection is low.",
"modification_count": 1,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules"
]
},
"rules-threat-hunting/windows/file/file_access/file_access_win_browsers_credential.yml": {
"filename": "rules-threat-hunting/windows/file/file_access/file_access_win_browsers_credential.yml",
"creation_Date": "2024-08-07T17:59:40.486782",
"modification_Date": "2024-08-07T17:59:40.486794",
"lastUpdate_Date": "2024-08-07T17:59:41.447372",
"sigmaRule": "title: Access To Browser Credential Files By Uncommon Applications\nid: 91cb43db-302a-47e3-b3c8-7ede481e27bf\nstatus: experimental\ndescription: |\n Detects file access requests to browser credential stores by uncommon processes.\n Could indicate potential attempt of credential stealing.\n Requires heavy baselining before usage\nreferences:\n - https://www.zscaler.com/blogs/security-research/ffdroider-stealer-targeting-social-media-platform-users\n - https://github.com/lclevy/firepwd\nauthor: frack113, X__Junior (Nextron Systems)\ndate: 2022/04/09\nmodified: 2024/07/29\ntags:\n - attack.t1003\n - attack.credential_access\n - detection.threat_hunting\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection_ie:\n FileName|endswith: '\\Appdata\\Local\\Microsoft\\Windows\\WebCache\\WebCacheV01.dat'\n selection_firefox:\n FileName|endswith:\n - '\\cookies.sqlite'\n - '\\places.sqlite'\n - 'release\\key3.db' # Firefox\n - 'release\\key4.db' # Firefox\n - 'release\\logins.json' # Firefox\n selection_chromium:\n FileName|contains:\n - '\\User Data\\Default\\Login Data'\n - '\\User Data\\Local State'\n filter_main_system:\n Image: System\n filter_main_generic:\n # This filter is added to avoid large amount of FP with 3rd party software. You should remove this in favour of specific filter per-application\n Image|startswith:\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Program Files\\'\n - 'C:\\Windows\\system32\\'\n - 'C:\\Windows\\SysWOW64\\'\n filter_optional_defender:\n Image|startswith: 'C:\\ProgramData\\Microsoft\\Windows Defender\\'\n Image|endswith:\n - '\\MpCopyAccelerator.exe'\n - '\\MsMpEng.exe'\n filter_optional_thor:\n Image|endswith:\n - '\\thor.exe'\n - '\\thor64.exe'\n condition: 1 of selection_* and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Antivirus, Anti-Spyware, Anti-Malware Software\n - Backup software\n - Legitimate software installed on partitions other than \"C:\\\"\n - Searching software such as \"everything.exe\"\nlevel: low\n",
"summary": "This Sigma rule detects file access requests to browser credential stores by uncommon processes, which could indicate potential credential stealing. It requires heavy baselining before usage and has specific selection criteria for Internet Explorer, Firefox, and Chromium browser files. The rule includes filters to avoid false positives from specific software types.",
"modification_count": 1,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules"
]
},
"rules-threat-hunting/windows/file/file_access/file_access_win_office_outlook_mail_credential.yml": {
"filename": "rules-threat-hunting/windows/file/file_access/file_access_win_office_outlook_mail_credential.yml",
"creation_Date": "2024-08-07T17:59:41.447474",
"modification_Date": "2024-08-07T17:59:41.447486",
"lastUpdate_Date": "2024-08-07T17:59:42.627565",
"sigmaRule": "title: Access To Windows Outlook Mail Files By Uncommon Applications\nid: fc3e237f-2fef-406c-b90d-b3ae7e02fa8f\nstatus: experimental\ndescription: |\n Detects file access requests to Windows Outlook Mail by uncommon processes.\n Could indicate potential attempt of credential stealing.\n Requires heavy baselining before usage\nreferences:\n - https://darkdefender.medium.com/windows-10-mail-app-forensics-39025f5418d2\n - https://github.com/redcanaryco/atomic-red-team/blob/58496ee3306e6e42a7054d36a94e6eb561ee3081/atomics/T1070.008/T1070.008.md#atomic-test-4---copy-and-modify-mailbox-data-on-windows\nauthor: frack113\ndate: 2024/05/10\nmodified: 2024/07/29\ntags:\n - attack.t1070.008\n - attack.defense_evasion\n - detection.threat_hunting\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection_unistore:\n FileName|contains: '\\AppData\\Local\\Comms\\Unistore\\data'\n selection_unistoredb:\n FileName|endswith: '\\AppData\\Local\\Comms\\UnistoreDB\\store.vol'\n filter_main_system:\n Image: 'System'\n filter_main_generic:\n # This filter is added to avoid large amount of FP with 3rd party software. You should remove this in favour of specific filter per-application\n Image|startswith:\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Program Files\\'\n - 'C:\\Windows\\system32\\'\n - 'C:\\Windows\\SysWOW64\\'\n filter_optional_defender:\n Image|startswith: 'C:\\ProgramData\\Microsoft\\Windows Defender\\'\n Image|endswith:\n - '\\MpCopyAccelerator.exe'\n - '\\MsMpEng.exe'\n filter_optional_thor:\n Image|endswith:\n - '\\thor64.exe'\n - '\\thor.exe'\n condition: 1 of selection_* and not 1 of filter_main_* and not 1 of filter_optional_*\nfalsepositives:\n - Antivirus, Anti-Spyware, Anti-Malware Software\n - Backup software\n - Legitimate software installed on partitions other than \"C:\\\"\n - Searching software such as \"everything.exe\"\n# Note: Increase after initial baseline\nlevel: low\n",
"summary": "This Sigma Rule detects file access requests to Windows Outlook Mail by uncommon processes, which could indicate a potential attempt of credential stealing. It requires heavy baselining before usage to minimize false positives. The rule includes filters to avoid false positives from third-party software, antivirus, backup software, and legitimate software installed on partitions other than \"C:\\\". The rule has a low severity level.",
"modification_count": 1,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules"
]
},
"rules-threat-hunting/windows/file/file_access/file_access_win_susp_reg_and_hive.yml": {
"filename": "rules-threat-hunting/windows/file/file_access/file_access_win_susp_reg_and_hive.yml",
"creation_Date": "2024-08-07T17:59:42.627816",
"modification_Date": "2024-08-07T17:59:42.627828",
"lastUpdate_Date": "2024-08-07T17:59:43.801042",
"sigmaRule": "title: Access To .Reg/.Hive Files By Uncommon Applications\nid: 337a31c6-46c4-46be-886a-260d7aa78cac\nstatus: experimental\ndescription: Detects file access requests to files ending with either the \".hive\"/\".reg\" extension, usually associated with Windows Registry backups.\nreferences:\n - https://github.com/tccontre/Reg-Restore-Persistence-Mole\nauthor: frack113\ndate: 2023/09/15\nmodified: 2024/07/29\ntags:\n - attack.t1112\n - attack.defense_evasion\n - detection.threat_hunting\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection:\n FileName|endswith:\n - '.hive'\n - '.reg'\n filter_main_generic:\n Image|startswith:\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Program Files\\'\n - 'C:\\Windows\\System32\\'\n - 'C:\\Windows\\SysWOW64\\'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Third party software installed in the user context might generate a lot of FPs. Heavy baselining and tuning might be required.\nlevel: low\n",
"summary": "This Sigma Rule detects file access requests to files ending with either the \".hive\" or \".reg\" extension, commonly associated with Windows Registry backups. It specifies requirements for the Microsoft-Windows-Kernel-File ETW provider and includes filters to exclude common system directories. The rule has a low level of severity and may result in false positives from third-party software installed in the user context.",
"modification_count": 1,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules"
]
},
"rules/windows/file/file_access/file_access_win_browsers_credential_access.yml": {
"filename": "rules/windows/file/file_access/file_access_win_browsers_credential_access.yml",
"creation_Date": "2024-08-07T17:59:43.801140",
"modification_Date": "2024-08-07T18:00:49.269194",
"lastUpdate_Date": "2024-08-07T18:00:49.269216",
"sigmaRule": "file does not exist",
"summary": "If a file does not exist, an error message should be displayed or an appropriate response should be provided to inform the user.",
"modification_count": 2,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules",
"Merge PR #4920 from @fornotes - Update `file_access` based rules"
]
},
"rules/windows/file/file_access/file_access_win_office_outlook_mail_credential.yml": {
"filename": "rules/windows/file/file_access/file_access_win_office_outlook_mail_credential.yml",
"creation_Date": "2024-08-07T17:59:44.510851",
"modification_Date": "2024-08-07T18:00:50.749308",
"lastUpdate_Date": "2024-08-07T18:00:50.749323",
"sigmaRule": "file does not exist",
"summary": "If a file does not exist, an error will occur.",
"modification_count": 2,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules",
"Merge PR #4920 from @fornotes - Update `file_access` based rules"
]
},
"rules/windows/file/file_access/file_access_win_susp_credential_manager_access.yml": {
"filename": "rules/windows/file/file_access/file_access_win_susp_credential_manager_access.yml",
"creation_Date": "2024-08-07T17:59:45.069228",
"modification_Date": "2024-08-07T18:00:52.574491",
"lastUpdate_Date": "2024-08-07T18:00:52.574505",
"sigmaRule": "title: Credential Manager Access By Uncommon Applications\nid: 407aecb1-e762-4acf-8c7b-d087bcff3bb6\nstatus: experimental\ndescription: |\n Detects suspicious processes based on name and location that access the windows credential manager and vault.\n Which can be a sign of credential stealing. Example case would be usage of mimikatz \"dpapi::cred\" function\nreferences:\n - https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz\n - https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/10/11\nmodified: 2024/07/29\ntags:\n - attack.t1003\n - attack.credential_access\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection:\n FileName|contains:\n - '\\AppData\\Local\\Microsoft\\Credentials\\'\n - '\\AppData\\Roaming\\Microsoft\\Credentials\\'\n - '\\AppData\\Local\\Microsoft\\Vault\\'\n - '\\ProgramData\\Microsoft\\Vault\\'\n filter_system_folders:\n Image|startswith:\n - 'C:\\Program Files\\'\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Windows\\system32\\'\n - 'C:\\Windows\\SysWOW64\\'\n condition: selection and not 1 of filter_*\nfalsepositives:\n - Legitimate software installed by the users for example in the \"AppData\" directory may access these files (for any reason).\n# Increase level after false positives filters are good enough\nlevel: medium\n",
"summary": "This Sigma Rule detects suspicious processes that access the Windows credential manager and vault, which can indicate credential stealing. It looks for processes in specific file paths related to the credential manager and vault, while filtering out legitimate system folders. The rule may have false positives with legitimate software accessing these files. The rule has a medium level of severity.",
"modification_count": 2,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules",
"Merge PR #4920 from @fornotes - Update `file_access` based rules"
]
},
"rules/windows/file/file_access/file_access_win_susp_credhist.yml": {
"filename": "rules/windows/file/file_access/file_access_win_susp_credhist.yml",
"creation_Date": "2024-08-07T17:59:46.082174",
"modification_Date": "2024-08-07T18:00:52.574730",
"lastUpdate_Date": "2024-08-07T18:00:52.574741",
"sigmaRule": "title: Access To Windows Credential History File By Uncommon Applications\nid: 7a2a22ea-a203-4cd3-9abf-20eb1c5c6cd2\nstatus: experimental\ndescription: |\n Detects file access requests to the Windows Credential History File by an uncommon application.\n This can be a sign of credential stealing. Example case would be usage of mimikatz \"dpapi::credhist\" function\nreferences:\n - https://tools.thehacker.recipes/mimikatz/modules/dpapi/credhist\n - https://www.passcape.com/windows_password_recovery_dpapi_credhist\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022/10/17\nmodified: 2024/07/29\ntags:\n - attack.credential_access\n - attack.t1555.004\nlogsource:\n category: file_access\n product: windows\n definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'\ndetection:\n selection:\n FileName|endswith: '\\Microsoft\\Protect\\CREDHIST'\n filter_main_system_folders:\n Image|startswith:\n - 'C:\\Program Files\\'\n - 'C:\\Program Files (x86)\\'\n - 'C:\\Windows\\system32\\'\n - 'C:\\Windows\\SysWOW64\\'\n filter_main_explorer:\n Image: 'C:\\Windows\\explorer.exe'\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n - Unknown\n# Increase level after false positives filters are good enough\nlevel: medium\n",
"summary": "This Sigma Rule detects file access requests to the Windows Credential History File by an uncommon application, which could indicate credential stealing activities. The rule focuses on detecting usage of the mimikatz \"dpapi::credhist\" function. It specifies file paths and system folders to filter out common applications and excludes file access requests initiated by Windows Explorer. The rule is currently tagged as experimental and has a medium detection level.",
"modification_count": 2,
"comment_history": [
"Merge PR #4934 from @X-Junior - Update and add new `file_access` rules",
"Merge PR #4920 from @fornotes - Update `file_access` based rules"
]
},
"rules/windows/file/file_access/file_access_win_susp_crypto_currency_wallets.yml": {
"filename": "rules/windows/file/file_access/file_access_win_susp_crypto_currency_wallets.yml",
"creation_Date": "2024-08-07T17:59:47.551082",
"modification_Date": "2024-08-07T17:59:47.551094",
"lastUpdate_Date": "2024-08-07T17:59:49.363026",