Skip to content

Commit 1072d3d

Browse files
authored
Add sigma ref Detection (#272)
* Add sigma ref * Add missing sigma ref * Fix sigma link * Remove by Defender * Remove by Defender
1 parent 8ff159a commit 1072d3d

18 files changed

+23
-8
lines changed

yml/OSBinaries/Eventvwr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Code_Sample:
2626
Detection:
2727
- Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/process_creation/process_creation_sysmon_uac_bypass_eventvwr.yml
2828
- Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/registry_event/registry_event_uac_bypass_eventvwr.yml
29-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file_event/file_event_win_uac_bypass_eventvwr.yml
29+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/file/file_event/file_event_win_uac_bypass_eventvwr.yml
3030
- Elastic: https://github.com/elastic/detection-rules/blob/d31ea6253ea40789b1fc49ade79b7ec92154d12a/rules/windows/privilege_escalation_uac_bypass_event_viewer.toml
3131
- Splunk: https://github.com/splunk/security_content/blob/86a5b644a44240f01274c8b74d19a435c7dae66e/detections/endpoint/eventvwr_uac_bypass.yml
3232
- IOC: eventvwr.exe launching child process other than mmc.exe

yml/OSBinaries/Rdrleakdiag.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,8 @@ Full_Path:
3131
Code_Sample:
3232
- Code:
3333
Detection:
34-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_process_dump_rdrleakdiag.yml
34+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_proc_dump_rdrleakdiag.yml
35+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_process_dump_rdrleakdiag.yml
3536
- Elastic: https://www.elastic.co/guide/en/security/current/potential-credential-access-via-windows-utilities.html
3637
- Elastic: https://github.com/elastic/detection-rules/blob/5bdf70e72c6cd4547624c521108189af994af449/rules/windows/credential_access_cmdline_dump_tool.toml
3738
Resources:

yml/OSBinaries/Runexehelper.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ Commands:
1414
Full_Path:
1515
- Path: c:\windows\system32\runexehelper.exe
1616
Detection:
17+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_runexehelper.yml
1718
- IOC: c:\windows\system32\runexehelper.exe is run
1819
- IOC: Existence of runexewithargs_output.txt file
1920
Resources:

yml/OSBinaries/Setres.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ Commands:
1414
Full_Path:
1515
- Path: c:\windows\system32\setres.exe
1616
Detection:
17+
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_setres.yml
1718
- IOC: Unusual location for choice.exe file
1819
- IOC: Process created from choice.com binary
1920
- IOC: Existence of choice.cmd file

yml/OSBinaries/Ssh.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Commands:
2121
Full_Path:
2222
- Path: c:\windows\system32\OpenSSH\ssh.exe
2323
Detection:
24+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_ssh.yml
2425
- IOC: Event ID 4624 with process name C:\Windows\System32\OpenSSH\sshd.exe.
2526
- IOC: command line arguments specifying execution.
2627
Acknowledgement:

yml/OSBinaries/Unregmp2.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Full_Path:
1515
- Path: C:\Windows\System32\unregmp2.exe
1616
- Path: C:\Windows\SysWOW64\unregmp2.exe
1717
Detection:
18+
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_unregmp2.yml
1819
- IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP`
1920
Resources:
2021
- Link: https://twitter.com/notwhickey/status/1466588365336293385

yml/OSLibraries/Desk.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ Full_Path:
2222
- Path: C:\Windows\System32\desk.cpl
2323
- Path: C:\Windows\SysWOW64\desk.cpl
2424
Detection:
25-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file_event/file_event_win_new_src_file.yml
26-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_rundll32_installscreensaver.yml
27-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml
25+
- Sigma: https://github.com/SigmaHQ/sigma/blob/1d7ee1cd197d3b35508e2a5bf34d9d3b6ca4f504/rules/windows/file/file_event/file_event_win_new_src_file.yml
26+
- Sigma: https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process_creation/proc_creation_win_lolbin_rundll32_installscreensaver.yml
27+
- Sigma: https://github.com/SigmaHQ/sigma/blob/940f89d43dbac5b7108610a5bde47cda0d2a643b/rules/windows/registry/registry_set/registry_set_scr_file_executed_by_rundll32.yml
2828
Resources:
2929
- Link: https://vxug.fakedoma.in/zines/29a/29a7/Articles/29A-7.030.txt
3030
- Link: https://twitter.com/pabraeken/status/998627081360695297

yml/OSScripts/pester.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@ Code_Sample:
3232
- Code:
3333
Detection:
3434
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_pester.yml
35-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml
36-
- Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_pester_parent.yml
3735
Resources:
3836
- Link: https://twitter.com/Oddvarmoe/status/993383596244258816
3937
- Link: https://twitter.com/_st0pp3r_/status/1560072680887525378

yml/OtherMSBinaries/AccCheckConsole.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Full_Path:
2626
Code_Sample:
2727
- Code: https://docs.microsoft.com/en-us/windows/win32/winauto/custom-verification-routines
2828
Detection:
29+
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_susp_acccheckconsole.yml
2930
- IOC: Sysmon Event ID 1 - Process Creation
3031
- Analysis: https://gist.github.com/bohops/2444129419c8acf837aedda5f0e7f340
3132
Resources:

yml/OtherMSBinaries/Agentexecutor.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ Full_Path:
2323
Code_Sample:
2424
- Code:
2525
Detection:
26+
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor.yml
27+
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_agentexecutor_susp_usage.yml
2628
Resources:
2729
- Link:
2830
Acknowledgement:

0 commit comments

Comments
 (0)