Skip to content

Commit 247ea1c

Browse files
committed
feat: more updates
1 parent 6a76ab0 commit 247ea1c

12 files changed

+45
-80
lines changed

rules-emerging-threats/2023/Exploits/CVE-2023-23397/win_smbclient_connectivity_exploit_cve_2023_23397_outlook_remote_file.yml

+7-21
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ references:
66
- https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/
77
author: Nasreddine Bencherchali (Nextron Systems)
88
date: 2023/04/05
9+
modified: 2024/03/13
910
tags:
1011
- attack.exfiltration
1112
- cve.2023.23397
@@ -23,27 +24,12 @@ detection:
2324
- 30806 # The client re-established its session to the server.
2425
# - 31001 # Error (Doesn't contain the "ServerAddress" field)
2526
filter_main_local_ips:
26-
ServerAddress|startswith:
27-
- '10.' # 10.0.0.0/8
28-
- '192.168.' # 192.168.0.0/16
29-
- '172.16.' # 172.16.0.0/12
30-
- '172.17.'
31-
- '172.18.'
32-
- '172.19.'
33-
- '172.20.'
34-
- '172.21.'
35-
- '172.22.'
36-
- '172.23.'
37-
- '172.24.'
38-
- '172.25.'
39-
- '172.26.'
40-
- '172.27.'
41-
- '172.28.'
42-
- '172.29.'
43-
- '172.30.'
44-
- '172.31.'
45-
- '127.' # 127.0.0.0/8
46-
- '169.254.' # 169.254.0.0/16
27+
ServerAddress|cidr:
28+
- '10.0.0.0/8'
29+
- '127.0.0.0/8'
30+
- '169.254.0.0/16'
31+
- '172.16.0.0/12'
32+
- '192.168.0.0/16'
4733
condition: selection and not 1 of filter_main_*
4834
falsepositives:
4935
- Some false positives may occur from external trusted servers. Apply additional filters accordingly

rules-threat-hunting/windows/network_connection/net_connection_win_powershell_network_connection.yml

+14-46
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://www.youtube.com/watch?v=DLtJTxMWZ2o
1010
author: Florian Roth (Nextron Systems)
1111
date: 2017/03/13
12-
modified: 2023/09/07
12+
modified: 2024/03/13
1313
tags:
1414
- attack.execution
1515
- attack.t1059.001
@@ -23,55 +23,23 @@ detection:
2323
- '\powershell.exe'
2424
- '\pwsh.exe'
2525
Initiated: 'true'
26-
filter_main_local_ipv4:
27-
DestinationIp|startswith:
28-
- '10.'
29-
- '192.168.'
30-
- '172.16.'
31-
- '172.17.'
32-
- '172.18.'
33-
- '172.19.'
34-
- '172.20.'
35-
- '172.21.'
36-
- '172.22.'
37-
- '172.23.'
38-
- '172.24.'
39-
- '172.25.'
40-
- '172.26.'
41-
- '172.27.'
42-
- '172.28.'
43-
- '172.29.'
44-
- '172.30.'
45-
- '172.31.'
46-
- '127.0.0.1'
26+
filter_main_local_ip:
27+
DestinationIp|cidr:
28+
- '127.0.0.0/8'
29+
- '10.0.0.0/8'
30+
- '169.254.0.0/16' # link-local address
31+
- '172.16.0.0/12'
32+
- '192.168.0.0/16'
33+
- '::1/128' # IPv6 loopback
34+
- 'fe80::/10' # IPv6 link-local addresses
35+
- 'fc00::/7' # IPv6 private addresses
4736
User|contains: # covers many language settings
4837
- 'AUTHORI'
4938
- 'AUTORI'
50-
filter_main_local_ipv6:
51-
DestinationIp|startswith:
52-
- '::1' # IPv6 loopback variant
53-
- '0:0:0:0:0:0:0:1' # IPv6 loopback variant
54-
- 'fe80:' # link-local address
55-
- 'fc' # private address range fc00::/7
56-
- 'fd' # private address range fc00::/7
5739
filter_main_msrange:
58-
DestinationIp|startswith:
59-
# Subnet: 20.184.0.0/13
60-
- '20.184.'
61-
- '20.185.'
62-
- '20.186.'
63-
- '20.187.'
64-
- '20.188.'
65-
- '20.189.'
66-
- '20.190.'
67-
- '20.191.'
68-
- '23.79.'
69-
- '51.10.'
70-
# Subnet: 51.103.210.0/23
71-
- '51.103.'
72-
- '51.104.'
73-
- '51.105.'
74-
- '52.239.'
40+
DestinationIp|cidr:
41+
- '20.184.0.0/13'
42+
- '51.103.210.0/23'
7543
condition: selection and not 1 of filter_main_*
7644
falsepositives:
7745
- Administrative scripts

rules/network/zeek/zeek_http_webdav_put_request.yml

+6-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://github.com/OTRF/detection-hackathon-apt29/issues/17
77
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
88
date: 2020/05/02
9-
modified: 2024/03/11
9+
modified: 2024/03/13
1010
tags:
1111
- attack.exfiltration
1212
- attack.t1048.003
@@ -19,9 +19,11 @@ detection:
1919
method: 'PUT'
2020
filter:
2121
id.resp_h|cidr:
22-
- 10.0.0.0/8
23-
- 172.16.0.0/12
24-
- 192.168.0.0/16
22+
- '10.0.0.0/8'
23+
- '127.0.0.0/8'
24+
- '172.16.0.0/12'
25+
- '192.168.0.0/16'
26+
- '169.254.0.0/16'
2527
condition: selection and not filter
2628
falsepositives:
2729
- Unknown

rules/network/zeek/zeek_rdp_public_listener.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://attack.mitre.org/techniques/T1021/001/
88
author: Josh Brower @DefensiveDepth
99
date: 2020/08/22
10-
modified: 2024/03/11
10+
modified: 2024/03/13
1111
tags:
1212
- attack.lateral_movement
1313
- attack.t1021.001
@@ -22,6 +22,7 @@ detection:
2222
- '127.0.0.0/8'
2323
- '172.16.0.0/12'
2424
- '192.168.0.0/16'
25+
- '169.254.0.0/16'
2526
- '2620:83:8000::/48'
2627
- 'fc00::/7' # IPv6 private addresses
2728
- 'fe80::/10' # IPv6 link-local addresses

rules/web/proxy_generic/proxy_webdav_search_ms.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
88
author: Micah Babinski
99
date: 2023/08/21
10-
modified: 2023/08/25
10+
modified: 2024/03/13
1111
tags:
1212
- attack.initial_access
1313
- attack.t1584
@@ -33,6 +33,7 @@ detection:
3333
- '10.0.0.0/8'
3434
- '172.16.0.0/12'
3535
- '192.168.0.0/16'
36+
- '169.254.0.0/16'
3637
- '::1/128' # IPv6 loopback
3738
- 'fe80::/10' # IPv6 link-local addresses
3839
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_office_outbound_non_local_ip.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://corelight.com/blog/detecting-cve-2021-42292
1010
author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth (Nextron Systems), Tim Shelton
1111
date: 2021/11/10
12-
modified: 2024/03/12
12+
modified: 2024/03/13
1313
tags:
1414
- attack.execution
1515
- attack.t1203
@@ -30,6 +30,7 @@ detection:
3030
- '10.0.0.0/8'
3131
- '172.16.0.0/12'
3232
- '192.168.0.0/16'
33+
- '169.254.0.0/16'
3334
- '::1/128' # IPv6 loopback
3435
- 'fe80::/10' # IPv6 link-local addresses
3536
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_rundll32_net_connections.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://www.hybrid-analysis.com/sample/759fb4c0091a78c5ee035715afe3084686a8493f39014aea72dae36869de9ff6?environmentId=100
77
author: Florian Roth (Nextron Systems)
88
date: 2017/11/04
9-
modified: 2024/03/11
9+
modified: 2024/03/13
1010
tags:
1111
- attack.defense_evasion
1212
- attack.t1218.011
@@ -24,6 +24,7 @@ detection:
2424
- '10.0.0.0/8'
2525
- '172.16.0.0/12'
2626
- '192.168.0.0/16'
27+
- '169.254.0.0/16'
2728
- '::1/128' # IPv6 loopback
2829
- 'fe80::/10' # IPv6 link-local addresses
2930
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_script_wan.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://github.com/redcanaryco/atomic-red-team/blob/28d190330fe44de6ff4767fc400cc10fa7cd6540/atomics/T1105/T1105.md
77
author: frack113, Florian Roth (Nextron Systems)
88
date: 2022/08/28
9-
modified: 2024/03/12
9+
modified: 2024/03/13
1010
tags:
1111
- attack.command_and_control
1212
- attack.t1105
@@ -25,6 +25,7 @@ detection:
2525
- '10.0.0.0/8'
2626
- '172.16.0.0/12'
2727
- '192.168.0.0/16'
28+
- '169.254.0.0/16'
2829
- '::1/128' # IPv6 loopback
2930
- 'fe80::/10' # IPv6 link-local addresses
3031
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_susp_malware_callback_port.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ references:
1010
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
1111
author: Florian Roth (Nextron Systems)
1212
date: 2017/03/19
13-
modified: 2024/03/11
13+
modified: 2024/03/12
1414
tags:
1515
- attack.persistence
1616
- attack.command_and_control
@@ -80,6 +80,7 @@ detection:
8080
- '10.0.0.0/8'
8181
- '172.16.0.0/12'
8282
- '192.168.0.0/16'
83+
- '169.254.0.0/16'
8384
- '::1/128' # IPv6 loopback
8485
- 'fe80::/10' # IPv6 link-local addresses
8586
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_susp_malware_callback_ports_uncommon.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
1010
author: Florian Roth (Nextron Systems)
1111
date: 2017/03/19
12-
modified: 2024/03/11
12+
modified: 2024/03/12
1313
tags:
1414
- attack.persistence
1515
- attack.command_and_control
@@ -29,6 +29,7 @@ detection:
2929
- '10.0.0.0/8'
3030
- '172.16.0.0/12'
3131
- '192.168.0.0/16'
32+
- '169.254.0.0/16'
3233
- '::1/128' # IPv6 loopback
3334
- 'fe80::/10' # IPv6 link-local addresses
3435
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_susp_outbound_mobsync_connection.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://redcanary.com/blog/intelligence-insights-november-2021/
77
author: elhoim
88
date: 2022/04/28
9-
modified: 2024/03/11
9+
modified: 2024/03/12
1010
tags:
1111
- attack.t1055
1212
- attack.t1218
@@ -24,6 +24,7 @@ detection:
2424
- '10.0.0.0/8'
2525
- '172.16.0.0/12'
2626
- '192.168.0.0/16'
27+
- '169.254.0.0/16'
2728
- '::1/128' # IPv6 loopback
2829
- 'fe80::/10' # IPv6 link-local addresses
2930
- 'fc00::/7' # IPv6 private addresses

rules/windows/network_connection/net_connection_win_winlogon_net_connections.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/
77
author: Christopher Peacock @securepeacock, SCYTHE @scythe_io
88
date: 2023/04/28
9-
modified: 2024/03/11
9+
modified: 2024/03/12
1010
tags:
1111
- attack.defense_evasion
1212
- attack.execution
@@ -25,6 +25,7 @@ detection:
2525
- '10.0.0.0/8'
2626
- '172.16.0.0/12'
2727
- '192.168.0.0/16'
28+
- '169.254.0.0/16'
2829
- '::1/128' # IPv6 loopback
2930
- 'fe80::/10' # IPv6 link-local addresses
3031
- 'fc00::/7' # IPv6 private addresses

0 commit comments

Comments
 (0)