diff --git a/yml/OSBinaries/Cipher.yml b/yml/OSBinaries/Cipher.yml index d11f57e..2cdbe54 100644 --- a/yml/OSBinaries/Cipher.yml +++ b/yml/OSBinaries/Cipher.yml @@ -15,6 +15,7 @@ Full_Path: - Path: c:\windows\system32\cipher.exe - Path: c:\windows\syswow64\cipher.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_cipher_overwrite_deleted_data.yml - IOC: cipher.exe process with /w on the command line Resources: - Link: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/ diff --git a/yml/OSBinaries/Wbadmin.yml b/yml/OSBinaries/Wbadmin.yml index 0b3b878..5af3a36 100644 --- a/yml/OSBinaries/Wbadmin.yml +++ b/yml/OSBinaries/Wbadmin.yml @@ -21,6 +21,9 @@ Commands: Full_Path: - Path: C:\Windows\System32\wbadmin.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_dump_sensitive_files.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_restore_file.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_restore_sensitive_files.yml - IOC: wbadmin.exe command lines containing "NTDS" or "NTDS.dit" Resources: - Link: https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960 diff --git a/yml/OtherMSBinaries/Vshadow.yml b/yml/OtherMSBinaries/Vshadow.yml index 01deac3..ef42e32 100644 --- a/yml/OtherMSBinaries/Vshadow.yml +++ b/yml/OtherMSBinaries/Vshadow.yml @@ -16,6 +16,7 @@ Commands: Full_Path: - Path: C:\Program Files (x86)\Windows Kits\10\bin\\x64\vshadow.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_vshadow_exec.yml - IOC: vshadow.exe usage with -exec parameter Resources: - Link: https://learn.microsoft.com/en-us/windows/win32/vss/vshadow-tool-and-sample diff --git a/yml/OtherMSBinaries/devtunnels.yml b/yml/OtherMSBinaries/devtunnels.yml index 141ce2c..d66faa5 100644 --- a/yml/OtherMSBinaries/devtunnels.yml +++ b/yml/OtherMSBinaries/devtunnels.yml @@ -15,6 +15,8 @@ Full_Path: - Path: C:\Users\\AppData\Local\Temp\.net\devtunnel\devtunnel.exe - Path: C:\Users\\AppData\Local\Temp\DevTunnels\devtunnel.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/dns_query/dns_query_win_devtunnels_communication.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/network_connection/net_connection_win_domain_devtunnels.yml - IOC: devtunnel.exe binary spawned - IOC: '*.devtunnels.ms' - IOC: '*.*.devtunnels.ms'