mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-07-26 12:12:31 +02:00
Add sigma ref Detection (#272)
* Add sigma ref * Add missing sigma ref * Fix sigma link * Remove by Defender * Remove by Defender
This commit is contained in:
@@ -26,6 +26,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code: https://docs.microsoft.com/en-us/windows/win32/winauto/custom-verification-routines
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml
|
||||
- IOC: Sysmon Event ID 1 - Process Creation
|
||||
- Analysis: https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340
|
||||
Resources:
|
||||
|
@@ -23,6 +23,8 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml
|
||||
Resources:
|
||||
- Link:
|
||||
Acknowledgement:
|
||||
|
@@ -14,6 +14,8 @@ Commands:
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\dotnet\shared\Microsoft.NETCore.App\*\createdump.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml
|
||||
- IOC: createdump.exe process with a command line containing the lsass.exe process id
|
||||
Resources:
|
||||
- Link: https://twitter.com/bopin2020/status/1366400799199272960
|
||||
|
@@ -26,6 +26,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_mftrace.yml
|
||||
Resources:
|
||||
- Link: https://twitter.com/0rbz_/status/988911181422186496
|
||||
Acknowledgement:
|
||||
|
@@ -28,6 +28,7 @@ Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||||
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_msohtmed_download.yml
|
||||
- IOC: Suspicious Office application internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: Nir Chako (Pentera)
|
||||
|
@@ -25,6 +25,7 @@ Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.exe
|
||||
- Path: C:\Program Files\Microsoft Office\Office14\MSPUB.exe
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_mspub_download.yml
|
||||
- IOC: Suspicious Office application internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: 'Nir Chako (Pentera)'
|
||||
|
@@ -32,7 +32,7 @@ Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- IOC: remote.exe process spawns
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml
|
||||
Resources:
|
||||
- Link: https://blog.thecybersecuritytutor.com/Exeuction-AWL-Bypass-Remote-exe-LOLBin/
|
||||
Acknowledgement:
|
||||
|
@@ -44,6 +44,8 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code: https://github.com/jreegun/POC-s/tree/master/nuget-squirrel
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_squirrel.yml
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_squirrel_lolbin.yml
|
||||
Resources:
|
||||
- Link: https://www.youtube.com/watch?v=rOP3hnkj7ls
|
||||
- Link: https://twitter.com/reegun21/status/1144182772623269889
|
||||
|
@@ -16,6 +16,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_vsiisexelauncher.yml
|
||||
- IOC: VSIISExeLauncher.exe spawned an unknown process
|
||||
Resources:
|
||||
- Link: https://github.com/timwhitez
|
||||
|
@@ -31,6 +31,7 @@ Full_Path:
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_winword.yml
|
||||
- IOC: Suspicious Office application Internet/network traffic
|
||||
Resources:
|
||||
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
||||
|
Reference in New Issue
Block a user