forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR SigmaHQ#4937 from @nasbench - Multiple updates and fixes
fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Exclude additional edge cases fix: Relevant Anti-Virus Signature Keywords In Application Log - Exclude common keywords found in legitimate programs fix: Suspicious Child Process Of Wermgr.EXE - Add new exclusions fix: Uncommon Sigverif.EXE Child Process - Exclude werfault.exe fix: Wusa.EXE Executed By Parent Process Located In Suspicious Location - Exclude ".msu" files fix: Xwizard.EXE Execution From Non-Default Location - Exclude "WinSxS" update: Cab File Extraction Via Wusa.EXE - Move to TH folder update: COM Object Execution via Xwizard.EXE - Update logic update: Potential DLL Injection Via AccCheckConsole - Enhance coverage and logic update: Potential DLL Sideloading Activity Via ExtExport.EXE - Metadata and logic update update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Increase coverage update: Process Memory Dump via RdrLeakDiag.EXE - Enhance coverage
- Loading branch information
Showing
21 changed files
with
160 additions
and
118 deletions.
There are no files selected for viewing
32 changes: 32 additions & 0 deletions
32
rules-threat-hunting/windows/process_creation/proc_creation_win_extexport_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
title: Potential DLL Sideloading Activity Via ExtExport.EXE | ||
id: fb0b815b-f5f6-4f50-970f-ffe21f253f7a | ||
status: test | ||
description: | | ||
Detects the execution of "Extexport.exe".A utility that is part of the Internet Explorer browser and is used to export and import various settings and data, particularly when switching between Internet Explorer and other web browsers like Firefox. It allows users to transfer bookmarks, browsing history, and other preferences from Internet Explorer to Firefox or vice versa. | ||
It can be abused as a tool to side load any DLL. If a folder is provided in the command line it'll load any DLL with one of the following names "mozcrt19.dll", "mozsqlite3.dll", or "sqlite.dll". | ||
Arbitrary DLLs can also be loaded if a specific number of flags was provided. | ||
references: | ||
- https://lolbas-project.github.io/lolbas/Binaries/Extexport/ | ||
- https://www.hexacorn.com/blog/2018/04/24/extexport-yet-another-lolbin/ | ||
- https://www.microsoft.com/en-us/security/blog/2020/03/23/latest-astaroth-living-off-the-land-attacks-are-even-more-invisible-but-not-less-observable/ | ||
- https://res.armor.com/resources/threat-intelligence/astaroth-banking-trojan/ | ||
- https://securelist.com/the-tetrade-brazilian-banking-malware/97779/ | ||
- https://www.welivesecurity.com/2020/03/05/guildma-devil-drives-electric/ | ||
author: frack113, Nasreddine Bencherchali (Nextron Systems) | ||
date: 2021-11-26 | ||
modified: 2024-08-26 | ||
tags: | ||
- attack.defense-evasion | ||
- attack.t1218 | ||
- detection.threat-hunting | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection: | ||
- Image|endswith: '\Extexport.exe' | ||
- OriginalFileName: 'extexport.exe' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: medium |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10 changes: 8 additions & 2 deletions
10
...reation_win_wusa_cab_files_extraction.yml → ...reation_win_wusa_cab_files_extraction.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
rules/windows/process_creation/proc_creation_win_acccheckconsole_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: Potential DLL Injection Via AccCheckConsole | ||
id: 0f6da907-5854-4be6-859a-e9958747b0aa | ||
status: test | ||
description: | | ||
Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. | ||
One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. | ||
The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility. | ||
references: | ||
- https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340 | ||
- https://twitter.com/bohops/status/1477717351017680899?s=12 | ||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/AccCheckConsole/ | ||
author: Florian Roth (Nextron Systems) | ||
date: 2022-01-06 | ||
modified: 2024-08-29 | ||
tags: | ||
- attack.execution | ||
- detection.threat-hunting | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection_img: | ||
- Image|endswith: '\AccCheckConsole.exe' | ||
- OriginalFileName: 'AccCheckConsole.exe' | ||
selection_cli: | ||
CommandLine|contains: | ||
- ' -hwnd' | ||
- ' -process ' | ||
- ' -window ' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Legitimate use of the UI Accessibility Checker | ||
level: medium |
5 changes: 3 additions & 2 deletions
5
...n/proc_creation_win_lolbin_susp_dxcap.yml → ..._win_dxcap_arbitrary_binary_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
24 changes: 0 additions & 24 deletions
24
rules/windows/process_creation/proc_creation_win_lolbin_extexport.yml
This file was deleted.
Oops, something went wrong.
27 changes: 0 additions & 27 deletions
27
rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.