forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'master' into EDRSilencer
- Loading branch information
Showing
83 changed files
with
936 additions
and
613 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...xploits/CVE-2022-42475/fortios_sslvpnd_exploit_cve_2022_42475_exploitation_indicators.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...ng-threats/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...-emerging-threats/2024/Exploits/CVE-2024-1709/web_exploit_cve_2024_1709_screenconnect.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
...ng-threats/2024/Exploits/CVE-2024-50623/proc_creation_win_exploit_cve_2024_50623_cleo.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
title: CVE-2024-50623 Exploitation Attempt - Cleo | ||
id: f007b877-02e3-45b7-8501-1b78c2864029 | ||
status: experimental | ||
description: | | ||
Detects exploitation attempt of Cleo's CVE-2024-50623 by looking for a "cmd.exe" process spawning from the Celo software suite with suspicious Powershell commandline. | ||
references: | ||
- https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild | ||
author: Tanner Filip, Austin Worline, Chad Hudson, Matt Anderson | ||
date: 2024-12-09 | ||
tags: | ||
- attack.execution | ||
- attack.t1190 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection: | ||
ParentImage|endswith: '\javaw.exe' | ||
ParentCommandLine|contains: | ||
- 'Harmony' | ||
- 'lexicom' | ||
- 'VersaLex' | ||
- 'VLTrader' | ||
Image|endswith: '\cmd.exe' | ||
CommandLine|contains: | ||
- 'powershell' | ||
- ' -enc ' | ||
- ' -EncodedCommand' | ||
- '.Download' | ||
condition: selection | ||
falsepositives: | ||
- Unlikely | ||
level: high |
34 changes: 34 additions & 0 deletions
34
...reats/2024/Malware/Generic/file_event_win_malware_generic_creation_configuration_rats.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
title: File Creation Related To RAT Clients | ||
id: 2f3039c8-e8fe-43a9-b5cf-dcd424a2522d | ||
status: experimental | ||
description: | | ||
File .conf created related to VenomRAT, AsyncRAT and Lummac samples observed in the wild. | ||
references: | ||
- https://www.virustotal.com/gui/file/c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761 | ||
- https://www.virustotal.com/gui/file/e96a0c1bc5f720d7f0a53f72e5bb424163c943c24a437b1065957a79f5872675 | ||
author: Joseliyo Sanchez, @Joseliyo_Jstnk | ||
date: 2024-12-19 | ||
tags: | ||
- attack.execution | ||
logsource: | ||
category: file_event | ||
product: windows | ||
detection: | ||
# VT Query: behaviour_files:"\\AppData\\Roaming\\DataLogs\\DataLogs.conf" | ||
# VT Query: behaviour_files:"DataLogs.conf" or behaviour_files:"hvnc.conf" or behaviour_files:"dcrat.conf" | ||
selection_required: | ||
TargetFilename|contains: '\AppData\Roaming\' | ||
selection_variants: | ||
TargetFilename|contains: | ||
- '\mydata\' | ||
- '\datalogs\' | ||
- '\hvnc\' | ||
- '\dcrat\' | ||
TargetFilename|endswith: | ||
- '\datalogs.conf' | ||
- '\hvnc.conf' | ||
- '\dcrat.conf' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Legitimate software creating a file with the same name | ||
level: high |
31 changes: 31 additions & 0 deletions
31
...merging-threats/2024/Malware/Lummac-Stealer/proc_creation_win_malware_lummac_more_vbc.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
title: Lummac Stealer Activity - Execution Of More.com And Vbc.exe | ||
id: 19b3806e-46f2-4b4c-9337-e3d8653245ea | ||
status: experimental | ||
description: | | ||
Detects the execution of more.com and vbc.exe in the process tree. | ||
This behavior was observed by a set of samples related to Lummac Stealer. | ||
The Lummac payload is injected into the vbc.exe process. | ||
references: | ||
- https://www.virustotal.com/gui/search/behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CSysWOW64%255C%255Cmore.com%2522%2520behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CMicrosoft.NET%255C%255CFramework%255C%255Cv4.0.30319%255C%255Cvbc.exe%2522/files | ||
- https://www.virustotal.com/gui/file/14d886517fff2cc8955844b252c985ab59f2f95b2849002778f03a8f07eb8aef | ||
- https://strontic.github.io/xcyclopedia/library/more.com-EDB3046610020EE614B5B81B0439895E.html | ||
- https://strontic.github.io/xcyclopedia/library/vbc.exe-A731372E6F6978CE25617AE01B143351.html | ||
author: Joseliyo Sanchez, @Joseliyo_Jstnk | ||
date: 2024-12-19 | ||
tags: | ||
- attack.defense-evasion | ||
- attack.t1055 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
# VT Query: behaviour_processes:"C:\\Windows\\SysWOW64\\more.com" behaviour_processes:"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe" | ||
selection_parent: | ||
ParentImage|endswith: '\more.com' | ||
selection_child: | ||
- Image|endswith: '\vbc.exe' | ||
- OriginalFileName: 'vbc.exe' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Unknown | ||
level: high |
2 changes: 1 addition & 1 deletion
2
...spberry-Robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
rules-emerging-threats/2024/TA/DPRK/dns_query_win_apt_dprk_malicious_domains.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
.../SlashAndGrab-Exploitation-In-Wild/file_event_win_apt_unknown_exploitation_indicators.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
29 changes: 29 additions & 0 deletions
29
rules-threat-hunting/windows/powershell/powershell_classic/posh_pc_bxor_operator_usage.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: bXOR Operator Usage In PowerShell Command Line - PowerShell Classic | ||
id: 812837bb-b17f-45e9-8bd0-0ec35d2e3bd6 | ||
status: test | ||
description: | | ||
Detects powershell execution with that make use of to the bxor (Bitwise XOR). | ||
Attackers might use as an alternative obfuscation method to Base64 encoded commands. | ||
Investigate the CommandLine and process tree to determine if the activity is malicious. | ||
references: | ||
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=46 | ||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_arithmetic_operators?view=powershell-5.1 | ||
author: Teymur Kheirkhabarov, Harish Segar | ||
date: 2020-06-29 | ||
modified: 2024-12-11 | ||
tags: | ||
- attack.execution | ||
- attack.t1059.001 | ||
- detection.threat-hunting | ||
logsource: | ||
product: windows | ||
category: ps_classic_start | ||
detection: | ||
selection: | ||
Data|contains|all: | ||
- 'HostName=ConsoleHost' | ||
- ' -bxor ' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: low |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...hreat-hunting/windows/registry/registry_set/registry_set_shell_context_menu_tampering.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
title: AWS SAML Provider Deletion Activity | ||
id: ccd6a6c8-bb4e-4a91-9d2a-07e632819374 | ||
status: experimental | ||
description: | | ||
Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access. | ||
An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it. | ||
references: | ||
- https://docs.aws.amazon.com/IAM/latest/APIReference/API_DeleteSAMLProvider.html | ||
author: Ivan Saakov | ||
date: 2024-12-19 | ||
tags: | ||
- attack.t1078.004 | ||
- attack.privilege-escalation | ||
- attack.t1531 | ||
logsource: | ||
product: aws | ||
service: cloudtrail | ||
detection: | ||
selection: | ||
eventSource: 'iam.amazonaws.com' | ||
eventName: 'DeleteSAMLProvider' | ||
status: 'success' | ||
condition: selection | ||
falsepositives: | ||
- Automated processes using tools like Terraform may trigger this alert. | ||
- Legitimate administrative actions by authorized system administrators could cause this alert. Verify the user identity, user agent, and hostname to ensure they are expected. | ||
- Deletions by unfamiliar users should be investigated. If the behavior is known and expected, it can be exempted from the rule. | ||
level: medium |
27 changes: 27 additions & 0 deletions
27
rules/cloud/aws/cloudtrail/aws_ec2_import_key_pair_activity.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: AWS Key Pair Import Activity | ||
id: 92f84194-8d9a-4ee0-8699-c30bfac59780 | ||
status: experimental | ||
description: | | ||
Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations. | ||
references: | ||
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ImportKeyPair.html | ||
author: Ivan Saakov | ||
date: 2024-12-19 | ||
tags: | ||
- attack.initial-access | ||
- attack.t1078 | ||
- attack.persistence | ||
- attack.privilege-escalation | ||
logsource: | ||
product: aws | ||
service: cloudtrail | ||
detection: | ||
selection: | ||
eventSource: 'ec2.amazonaws.com' | ||
eventName: 'ImportKeyPair' | ||
condition: selection | ||
falsepositives: | ||
- Legitimate administrative actions by authorized users importing keys for valid purposes. | ||
- Automated processes for infrastructure setup may trigger this alert. | ||
- Verify the user identity, user agent, and source IP address to ensure they are expected. | ||
level: medium |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: New AWS Lambda Function URL Configuration Created | ||
id: ec541962-c05a-4420-b9ea-84de072d18f4 | ||
status: experimental | ||
description: | | ||
Detects when a user creates a Lambda function URL configuration, which could be used to expose the function to the internet and potentially allow unauthorized access to the function's IAM role for AWS API calls. | ||
This could give an adversary access to the privileges associated with the Lambda service role that is attached to that function. | ||
references: | ||
- https://docs.aws.amazon.com/lambda/latest/dg/API_CreateFunctionUrlConfig.html | ||
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc | ||
- https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws | ||
author: Ivan Saakov | ||
date: 2024-12-19 | ||
tags: | ||
- attack.initial-access | ||
- attack.privilege-escalation | ||
logsource: | ||
product: aws | ||
service: cloudtrail | ||
detection: | ||
selection: | ||
eventSource: lambda.amazonaws.com | ||
eventName: 'CreateFunctionUrlConfig' | ||
condition: selection | ||
falsepositives: | ||
- Creating a Lambda function URL configuration may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. | ||
- Creating a Lambda function URL configuration from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule. | ||
level: medium |
2 changes: 1 addition & 1 deletion
2
rules/cloud/bitbucket/audit/bitbucket_audit_full_data_export_triggered.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.