From 5927125030fe07e8626a1527f184385286092aa0 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Tue, 22 Jul 2025 22:27:15 +0200 Subject: [PATCH] =?UTF-8?q?docs:=20=F0=9F=93=9A=20Add=20Detection=20Sigma?= =?UTF-8?q?=20ref=20(#451)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- yml/OSBinaries/Cipher.yml | 1 + yml/OSBinaries/Wbadmin.yml | 3 +++ yml/OtherMSBinaries/Vshadow.yml | 1 + yml/OtherMSBinaries/devtunnels.yml | 2 ++ 4 files changed, 7 insertions(+) diff --git a/yml/OSBinaries/Cipher.yml b/yml/OSBinaries/Cipher.yml index d11f57e..2cdbe54 100644 --- a/yml/OSBinaries/Cipher.yml +++ b/yml/OSBinaries/Cipher.yml @@ -15,6 +15,7 @@ Full_Path: - Path: c:\windows\system32\cipher.exe - Path: c:\windows\syswow64\cipher.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_cipher_overwrite_deleted_data.yml - IOC: cipher.exe process with /w on the command line Resources: - Link: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/ diff --git a/yml/OSBinaries/Wbadmin.yml b/yml/OSBinaries/Wbadmin.yml index 0b3b878..5af3a36 100644 --- a/yml/OSBinaries/Wbadmin.yml +++ b/yml/OSBinaries/Wbadmin.yml @@ -21,6 +21,9 @@ Commands: Full_Path: - Path: C:\Windows\System32\wbadmin.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_dump_sensitive_files.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_restore_file.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_wbadmin_restore_sensitive_files.yml - IOC: wbadmin.exe command lines containing "NTDS" or "NTDS.dit" Resources: - Link: https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960 diff --git a/yml/OtherMSBinaries/Vshadow.yml b/yml/OtherMSBinaries/Vshadow.yml index 01deac3..ef42e32 100644 --- a/yml/OtherMSBinaries/Vshadow.yml +++ b/yml/OtherMSBinaries/Vshadow.yml @@ -16,6 +16,7 @@ Commands: Full_Path: - Path: C:\Program Files (x86)\Windows Kits\10\bin\\x64\vshadow.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/process_creation/proc_creation_win_vshadow_exec.yml - IOC: vshadow.exe usage with -exec parameter Resources: - Link: https://learn.microsoft.com/en-us/windows/win32/vss/vshadow-tool-and-sample diff --git a/yml/OtherMSBinaries/devtunnels.yml b/yml/OtherMSBinaries/devtunnels.yml index 141ce2c..d66faa5 100644 --- a/yml/OtherMSBinaries/devtunnels.yml +++ b/yml/OtherMSBinaries/devtunnels.yml @@ -15,6 +15,8 @@ Full_Path: - Path: C:\Users\\AppData\Local\Temp\.net\devtunnel\devtunnel.exe - Path: C:\Users\\AppData\Local\Temp\DevTunnels\devtunnel.exe Detection: + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/dns_query/dns_query_win_devtunnels_communication.yml + - Sigma: https://github.com/SigmaHQ/sigma/blob/c7998c92b3c5f23ea67045bee8ee364d2ed1a775/rules/windows/network_connection/net_connection_win_domain_devtunnels.yml - IOC: devtunnel.exe binary spawned - IOC: '*.devtunnels.ms' - IOC: '*.*.devtunnels.ms'