mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-27 07:18:05 +01:00
Add sigma ref Detection (#272)
* Add sigma ref * Add missing sigma ref * Fix sigma link * Remove by Defender * Remove by Defender
This commit is contained in:
parent
8ff159abb7
commit
1072d3dc34
@ -26,7 +26,7 @@ Code_Sample:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/process_creation/process_creation_sysmon_uac_bypass_eventvwr.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/registry_event/registry_event_uac_bypass_eventvwr.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file_event/file_event_win_uac_bypass_eventvwr.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/file/file_event/file_event_win_uac_bypass_eventvwr.yml
|
||||
- Elastic: https://github.com/elastic/detection-rules/blob/d31ea6253ea40789b1fc49ade79b7ec92154d12a/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml
|
||||
- Splunk: https://github.com/splunk/security_content/blob/86a5b644a44240f01274c8b74d19a435c7dae66e/detections/endpoint/eventvwr_uac_bypass.yml
|
||||
- IOC: eventvwr.exe launching child process other than mmc.exe
|
||||
|
@ -31,7 +31,8 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_process_dump_rdrleakdiag.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_proc_dump_rdrleakdiag.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_process_dump_rdrleakdiag.yml
|
||||
- Elastic: https://www.elastic.co/guide/en/security/current/potential-credential-access-via-windows-utilities.html
|
||||
- Elastic: https://github.com/elastic/detection-rules/blob/5bdf70e72c6cd4547624c521108189af994af449/rules/windows/credential_access_cmdline_dump_tool.toml
|
||||
Resources:
|
||||
|
@ -14,6 +14,7 @@ Commands:
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\runexehelper.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_runexehelper.yml
|
||||
- IOC: c:\windows\system32\runexehelper.exe is run
|
||||
- IOC: Existence of runexewithargs_output.txt file
|
||||
Resources:
|
||||
|
@ -14,6 +14,7 @@ Commands:
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\setres.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_setres.yml
|
||||
- IOC: Unusual location for choice.exe file
|
||||
- IOC: Process created from choice.com binary
|
||||
- IOC: Existence of choice.cmd file
|
||||
|
@ -21,6 +21,7 @@ Commands:
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\OpenSSH\ssh.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_ssh.yml
|
||||
- IOC: Event ID 4624 with process name C:\Windows\System32\OpenSSH\sshd.exe.
|
||||
- IOC: command line arguments specifying execution.
|
||||
Acknowledgement:
|
||||
|
@ -15,6 +15,7 @@ Full_Path:
|
||||
- Path: C:\Windows\System32\unregmp2.exe
|
||||
- Path: C:\Windows\SysWOW64\unregmp2.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_unregmp2.yml
|
||||
- IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP`
|
||||
Resources:
|
||||
- Link: https://twitter.com/notwhickey/status/1466588365336293385
|
||||
|
@ -22,9 +22,9 @@ Full_Path:
|
||||
- Path: C:\Windows\System32\desk.cpl
|
||||
- Path: C:\Windows\SysWOW64\desk.cpl
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file_event/file_event_win_new_src_file.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_rundll32_installscreensaver.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/1d7ee1cd197d3b35508e2a5bf34d9d3b6ca4f504/rules/windows/file/file_event/file_event_win_new_src_file.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process_creation/proc_creation_win_lolbin_rundll32_installscreensaver.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/940f89d43dbac5b7108610a5bde47cda0d2a643b/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml
|
||||
Resources:
|
||||
- Link: https://vxug.fakedoma.in/zines/29a/29a7/Articles/29A-7.030.txt
|
||||
- Link: https://twitter.com/pabraeken/status/998627081360695297
|
||||
|
@ -32,8 +32,6 @@ Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_pester.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml
|
||||
Resources:
|
||||
- Link: https://twitter.com/Oddvarmoe/status/993383596244258816
|
||||
- Link: https://twitter.com/_st0pp3r_/status/1560072680887525378
|
||||
|
@ -26,6 +26,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code: https://docs.microsoft.com/en-us/windows/win32/winauto/custom-verification-routines
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml
|
||||
- IOC: Sysmon Event ID 1 - Process Creation
|
||||
- Analysis: https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340
|
||||
Resources:
|
||||
|
@ -23,6 +23,8 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml
|
||||
Resources:
|
||||
- Link:
|
||||
Acknowledgement:
|
||||
|
@ -14,6 +14,8 @@ Commands:
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\dotnet\shared\Microsoft.NETCore.App\*\createdump.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml
|
||||
- IOC: createdump.exe process with a command line containing the lsass.exe process id
|
||||
Resources:
|
||||
- Link: https://twitter.com/bopin2020/status/1366400799199272960
|
||||
|
@ -26,6 +26,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_mftrace.yml
|
||||
Resources:
|
||||
- Link: https://twitter.com/0rbz_/status/988911181422186496
|
||||
Acknowledgement:
|
||||
|
@ -28,6 +28,7 @@ Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||||
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_msohtmed_download.yml
|
||||
- IOC: Suspicious Office application internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: Nir Chako (Pentera)
|
||||
|
@ -25,6 +25,7 @@ Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.exe
|
||||
- Path: C:\Program Files\Microsoft Office\Office14\MSPUB.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_mspub_download.yml
|
||||
- IOC: Suspicious Office application internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: 'Nir Chako (Pentera)'
|
||||
|
@ -32,7 +32,7 @@ Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- IOC: remote.exe process spawns
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml
|
||||
Resources:
|
||||
- Link: https://blog.thecybersecuritytutor.com/Exeuction-AWL-Bypass-Remote-exe-LOLBin/
|
||||
Acknowledgement:
|
||||
|
@ -44,6 +44,8 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code: https://github.com/jreegun/POC-s/tree/master/nuget-squirrel
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_squirrel.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_squirrel_lolbin.yml
|
||||
Resources:
|
||||
- Link: https://www.youtube.com/watch?v=rOP3hnkj7ls
|
||||
- Link: https://twitter.com/reegun21/status/1144182772623269889
|
||||
|
@ -16,6 +16,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_vsiisexelauncher.yml
|
||||
- IOC: VSIISExeLauncher.exe spawned an unknown process
|
||||
Resources:
|
||||
- Link: https://github.com/timwhitez
|
||||
|
@ -31,6 +31,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_winword.yml
|
||||
- IOC: Suspicious Office application Internet/network traffic
|
||||
Resources:
|
||||
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
||||
|
Loading…
Reference in New Issue
Block a user