Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 6 additions & 9 deletions rules/credential_access_potential_sam_hive_dumping.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,15 +19,12 @@ references:
condition: >
sequence
maxspan 10m
|spawn_process
and
not
(ps.exe imatches
(
'?:\\Program Files\\*.exe',
'?:\\Program Files (x86)\\*.exe'
)
or
|spawn_process and not (ps.exe imatches
(
'?:\\Program Files\\*.exe',
'?:\\Program Files (x86)\\*.exe'
)
or
(ps.exe imatches 'C:\\Windows\\System32\\svchost.exe' and ps.args iin ('-k', 'DcomLaunch'))
)
| by ps.child.uuid
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: .NET assembly loaded by unmanaged process
id: 34be8bd1-1143-4fa8-bed4-ae2566b1394a
version: 1.0.0
version: 1.0.1
description: |
Identifies the loading of the .NET assembly by an unmanaged process. Adversaries can load the CLR runtime
inside unmanaged process and execute the assembly via the ICLRRuntimeHost::ExecuteInDefaultAppDomain method.
Expand All @@ -27,6 +27,12 @@ condition: >
'?:\\Program Files\\WindowsPowerShell\\Modules\\*\\*.dll',
'?:\\Windows\\Microsoft.NET\\assembly\\*\\*.dll'
)
and
not
ps.exe imatches
(
'?:\\Program Files\\WindowsApps\\*\\CrossDeviceService.exe'
)

output: >
.NET assembly %image.name loaded by unmanaged process %ps.exe
Expand Down
10 changes: 9 additions & 1 deletion rules/defense_evasion_hidden_registry_key_creation.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Hidden registry key creation
id: 65deda38-9b1d-42a0-9f40-a68903e81b49
version: 1.0.0
version: 1.0.1
description: |
Identifies the creation of a hidden registry key. Adversaries can utilize the
native NtSetValueKey API to create a hidden registry key and conceal payloads
Expand All @@ -19,6 +19,14 @@ condition: >
set_value and kevt.pid != 4 and registry.key.name endswith '\\'
and
thread.callstack.symbols not imatches ('KernelBase.dll!RegSetValue*', 'KernelBase.dll!RegLoadAppKey*', 'KernelBase.dll!GetFileAttributes*')
and
not
ps.exe imatches
(
'?:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\MicrosoftEdgeUpdate.exe',
'?:\\Program Files\\Microsoft\\EdgeUpdate\\MicrosoftEdgeUpdate.exe',
'?:\\Windows\\System32\\sppsvc.exe'
)

output: >
Hidden registry key %registry.key.name created by process %ps.exe
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential Process Hollowing
id: 2a3fbae8-5e8c-4b71-b9da-56c3958c0d53
version: 1.1.0
version: 1.1.1
description: |
Adversaries may inject malicious code into suspended and hollowed processes in order to
evade process-based defenses. Process hollowing is a method of executing arbitrary code
Expand Down Expand Up @@ -29,7 +29,12 @@ references:
condition: >
sequence
maxspan 2m
|spawn_process| by ps.child.uuid
|spawn_process and not ps.sid in ('S-1-5-18', 'S-1-5-19', 'S-1-5-20') and not ps.exe imatches
(
'?:\\Program Files\\*',
'?:\\Program Files (x86)\\*'
)
| by ps.child.uuid
|unmap_view_of_section and file.view.size > 20000 and file.view.protection != 'READONLY' and (length(file.name) = 0 or not ext(file.name) = '.dll')| by ps.uuid
|load_executable| by ps.uuid
action:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,10 +23,7 @@ condition: >
sequence
maxspan 1m
|map_view_of_section and file.view.protection = 'READWRITE' and kevt.pid != 4 and file.view.size >= 4096| as e1
|map_view_of_section and file.view.protection = 'READONLY|EXECUTE' and file.key = $e1.file.key and kevt.pid != $e1.kevt.pid
and
not
ps.exe imatches
|map_view_of_section and file.view.protection = 'READONLY|EXECUTE' and file.key = $e1.file.key and kevt.pid != $e1.kevt.pid and not ps.exe imatches
(
'?:\\Program Files\\Mozilla Firefox\\firefox.exe',
'?:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,10 +30,7 @@ condition: >
sequence
maxspan 2m
by ps.uuid
|open_remote_thread and thread.access.mask.names in ('ALL_ACCESS', 'SUSPEND_THREAD')
and
not
ps.exe imatches
|open_remote_thread and thread.access.mask.names in ('ALL_ACCESS', 'SUSPEND_THREAD') and not ps.exe imatches
(
'?:\\Program Files\\*',
'?:\\Program Files (x86)\\*'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Thread context set from unbacked memory
id: f8219274-ee68-416b-8489-4d2e635c7844
version: 1.0.0
version: 1.0.1
description: |
Identifies manipulation of the thread context from unbacked memory region. This may be
indicative of process injection.
Expand All @@ -14,5 +14,13 @@ labels:

condition: >
set_thread_context and thread.callstack.summary imatches ('ntdll.dll|kernelbase.dll|unbacked')
and
not
ps.exe imatches
(
'?:\\Program Files\\Git\\mingw64\\bin\\git.exe',
'?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe',
'?:\\Program Files\\Microsoft\\Edge\\Application\\msedge.exe'
)

min-engine-version: 2.2.0
Original file line number Diff line number Diff line change
Expand Up @@ -22,15 +22,12 @@ references:
condition: >
sequence
maxspan 1m
|create_remote_thread
and
not
(ps.exe imatches
(
'?:\\Program Files\\*',
'?:\\Program Files (x86)\\*'
)
or
|create_remote_thread and not (ps.exe imatches
(
'?:\\Program Files\\*',
'?:\\Program Files (x86)\\*'
)
or
(ps.exe imatches 'C:\\Windows\\System32\\svchost.exe' and ps.args iin ('-k', 'DcomLaunch'))
)
| by thread.pid
Expand Down
11 changes: 2 additions & 9 deletions rules/initial_access_macro_execution_via_script_interpreter.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,8 @@ condition: >
(create_file)
or
(
load_module
and
not
image.name imatches
(
'?:\\Program Files\\*',
'?:\\Program Files (x86)\\*'
)
)
load_module and not image.name imatches ('?:\\Program Files\\*', '?:\\Program Files (x86)\\*')
)
)
| by ps.uuid

Expand Down
Loading