mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-28 15:58:24 +01:00
Add Detection Sigma ref (#368)
This commit is contained in:
parent
fc23c999e6
commit
2cc01b0113
@ -35,6 +35,8 @@ Full_Path:
|
|||||||
- Path: C:\Windows\System32\tar.exe
|
- Path: C:\Windows\System32\tar.exe
|
||||||
- Path: C:\Windows\SysWOW64\tar.exe
|
- Path: C:\Windows\SysWOW64\tar.exe
|
||||||
Detection:
|
Detection:
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_tar_compression.yml
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_tar_extraction.yml
|
||||||
- IOC: tar.exe extracting files from a remote host within the environment
|
- IOC: tar.exe extracting files from a remote host within the environment
|
||||||
- IOC: Abnormal processes spawning tar.exe
|
- IOC: Abnormal processes spawning tar.exe
|
||||||
- IOC: tar.exe interacting with alternate data streams (ADS)
|
- IOC: tar.exe interacting with alternate data streams (ADS)
|
||||||
|
@ -27,6 +27,8 @@ Commands:
|
|||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
OperatingSystem: Windows 10, Windows 11
|
OperatingSystem: Windows 10, Windows 11
|
||||||
|
Detection:
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Mert Daş
|
- Person: Mert Daş
|
||||||
Handle: '@merterpreter'
|
Handle: '@merterpreter'
|
||||||
|
@ -35,6 +35,7 @@ Commands:
|
|||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe
|
- Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe
|
||||||
Detection:
|
Detection:
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml
|
||||||
- IOC: 'msedgewebview2.exe spawned with any of the following: --gpu-launcher, --utility-cmd-prefix, --renderer-cmd-prefix, --browser-subprocess-path'
|
- IOC: 'msedgewebview2.exe spawned with any of the following: --gpu-launcher, --utility-cmd-prefix, --renderer-cmd-prefix, --browser-subprocess-path'
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://medium.com/@MalFuzzer/one-electron-to-rule-them-all-dc2e9b263daf
|
- Link: https://medium.com/@MalFuzzer/one-electron-to-rule-them-all-dc2e9b263daf
|
||||||
|
@ -17,6 +17,7 @@ Full_Path:
|
|||||||
- Path: c:\windows\system32\scrobj.dll
|
- Path: c:\windows\system32\scrobj.dll
|
||||||
- Path: c:\windows\syswow64\scrobj.dll
|
- Path: c:\windows\syswow64\scrobj.dll
|
||||||
Detection:
|
Detection:
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_rundll32_susp_activity.yml
|
||||||
- IOC: Execution of rundll32.exe with 'GenerateTypeLib' and a protocol handler ('://') on the command line
|
- IOC: Execution of rundll32.exe with 'GenerateTypeLib' and a protocol handler ('://') on the command line
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://twitter.com/eral4m/status/1479106975967240209
|
- Link: https://twitter.com/eral4m/status/1479106975967240209
|
||||||
|
@ -17,6 +17,7 @@ Full_Path:
|
|||||||
- Path: c:\windows\system32\shimgvw.dll
|
- Path: c:\windows\system32\shimgvw.dll
|
||||||
- Path: c:\windows\syswow64\shimgvw.dll
|
- Path: c:\windows\syswow64\shimgvw.dll
|
||||||
Detection:
|
Detection:
|
||||||
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_rundll32_susp_activity.yml
|
||||||
- IOC: Execution of rundll32.exe with 'ImageView_Fullscreen' and a protocol handler ('://') on the command line
|
- IOC: Execution of rundll32.exe with 'ImageView_Fullscreen' and a protocol handler ('://') on the command line
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://twitter.com/eral4m/status/1479080793003671557
|
- Link: https://twitter.com/eral4m/status/1479080793003671557
|
||||||
|
Loading…
Reference in New Issue
Block a user