Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Makes it compatible with sigmac parser and includes a FP fix #1

Open
wants to merge 6 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ detection:
ParentImage|endswith:
- '\powershell.exe'
- '\cmd.exe'
ParentCommandLine|contains|windash: '/c'
ParentCommandLine|contains: '/c'
ParentCommandLine|re: '^.*[D-Z]:\\.*\.(bat|cmdline).*$'
selection_child_proc:
Image|endswith: '\tar.exe'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,9 @@ description: Looks for the execution of non-powershell process with command line
report.
references:
- https://redcanary.com/threat-detection-report/techniques/rename-system-utilities/
author: Micah Babinski
author: Micah Babinski, Tim Shelton
date: 2022/11/04
modified: 2022/11/09
tags:
- attack.defense_evasion
- attack.t1036.003
Expand All @@ -17,11 +18,15 @@ logsource:
detection:
filter:
Image|endswith: '\powershell.exe'
filter2:
Image|endswith: '\msiexec.exe'
filter3:
Image|endswith: '\iexplore.exe'
selection:
CommandLine|contains:
- 'iex'
- 'invoke-expression'
condition: selection and not filter
condition: selection and not 1 of filter*
falsepositives:
- Unknown
level: high
level: high
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,11 @@ detection:
- 'invoke-expression'
filter:
Image|endswith: '\powershell.exe'
condition: selection and not filter
filter2:
Image|endswith: '\msiexec.exe'
filter3:
Image|endswith: '\iexplore.exe'
condition: selection and not 1 of filter*
falsepositives:
- Unknown
level: high
level: high
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,9 @@ description: Looks for the execution of PowerShell with unusually high counts of
like ^, +, $, and %. Inspired by the 2022 Red Canary Threat Detection report.
references:
- https://redcanary.com/threat-detection-report/techniques/powershell/
author: Micah Babinski
author: Micah Babinski, Tim Shelton
date: 2022/11/03
modified: 2022/11/10
tags:
- attack.execution
- attack.t1059.003
Expand All @@ -19,8 +20,8 @@ detection:
selection:
Image|endswith: '\powershell.exe'
# regex below detects five or more occurrences of the suspicious characters
CommandLine|re: '^([^^+$%]*[\^+$%]){5,}[^^+$%]*$'
CommandLine|re: '^([^^+%]*[\^+%]){5,}[^^+%]*$'
condition: selection
falsepositives:
- Unknown
level: high
level: low
Original file line number Diff line number Diff line change
Expand Up @@ -16,13 +16,14 @@ logsource:
category: process_creation
product: windows
detection:
selection:
selection2:
Image|endswith: '\schtasks.exe'
CommandLine|contains: 'create'
CommandLine|contains|all|windash:
selection1:
CommandLine|contains|all:
- '/c'
- 'cmd'
condition: selection
condition: selection1 and selection2
falsepositives:
- Creation of legitimate scheduled tasks which need to run cmd.
level: medium
level: medium
Original file line number Diff line number Diff line change
Expand Up @@ -17,14 +17,15 @@ logsource:
category: process_creation
product: windows
detection:
selection:
selection1:
Image|endswith: '\schtasks.exe'
CommandLine|contains|windash: '/create'
CommandLine|contains: '/create'
selection2:
CommandLine|contains:
- 'https://'
- 'http://'
- 'ftp://'
condition: selection
condition: selection1 and selection2
falsepositives:
- Creation of legitimate scheduled tasks which need to access external sites.
level: medium
level: medium
Original file line number Diff line number Diff line change
Expand Up @@ -25,8 +25,9 @@ detection:
- 'regsvr32.exe'
- 'rundll32.exe'
- 'mshta.exe'
CommandLine|contains|windash: '/create'
condition: selection
selection2:
CommandLine|contains: '/create'
condition: selection and selection2
falsepositives:
- Creation of legitimate scheduled tasks which need to run cmd or similar utilities.
level: medium
level: medium
2 changes: 1 addition & 1 deletion 2022_Solarmarker/win_susp_solarmarker_file_creation.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ detection:
- 'AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'
- 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp'
TargetFilename|re: '^.*\\([0-9a-fA-F]){29}\.(?i)lnk$'
condition: any of selection*
condition: 1 of selection*
falsepositives:
- Unknown
level: high
4 changes: 2 additions & 2 deletions 2022_Solarmarker/win_victim_id_file_creation.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ detection:
TargetFilename|endswith: '='
selection_2:
TargetFilename|endswith: '\AppData\Roaming\solarmarker.dat'
condition: any of selection*
condition: 1 of selection*
falsepositives:
- Unknown
level: high
level: high