Skip to content

Commit

Permalink
Merge pull request #3137 from splunk/valleyrat
Browse files Browse the repository at this point in the history
Valleyrat fixes!
  • Loading branch information
patel-bhavin authored Sep 25, 2024
2 parents 693e8eb + ec168c8 commit 2e0a7c5
Show file tree
Hide file tree
Showing 5 changed files with 10 additions and 11 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint
| `windows_impair_defenses_disable_av_autostart_via_registry_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
logs with the registry value name, registry path, and registry value data from your
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
Sysmon TA. https://splunkbase.splunk.com/app/5709
known_false_positives: unknown
references:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ data_sources:
- Sysmon Event ID 13
type: Anomaly
status: production
description: The following analytic detects modifications to the Windows Registry specifically targeting Programmatic Identifier associations to bypassed User Account Control (UAC) Windows OS feature. ValleyRAT may create or alter registry entries to a targetted progIDs like `.pwn` files with malicious processes, allowing it to execute harmful scripts or commands when these files are opened. By monitoring for unusual changes in registry keys linked to ProgIDs, this detection enables security analysts to identify potential threats like ValleyRAT execution attempts. Early detection of these modifications helps mitigate unauthorized execution and prevents further exploitation of the system.
description: The following analytic detects modifications to the Windows Registry specifically targeting Programmatic Identifier associations to bypass User Account Control (UAC) Windows OS feature. ValleyRAT may create or alter registry entries to targetted progIDs like `.pwn` files with malicious processes, allowing it to execute harmful scripts or commands when these files are opened. By monitoring for unusual changes in registry keys linked to ProgIDs, this detection enables security analysts to identify potential threats like ValleyRAT execution attempts. Early detection of these modifications helps mitigate unauthorized execution and prevents further exploitation of the system.
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Registry
WHERE Registry.registry_path= "*\\ms-settings\\CurVer\\(Default)"
BY Registry.dest Registry.user Registry.registry_path Registry.registry_key_name Registry.registry_value_name Registry.registry_value_data Registry.process_guid
Expand All @@ -17,7 +17,7 @@ search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint
| `windows_modify_registry_utilize_progids_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
logs with the registry value name, registry path, and registry value data from your
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
Sysmon TA. https://splunkbase.splunk.com/app/5709
known_false_positives: unknown
references:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ data_sources:
- Sysmon EventID 13
type: TTP
status: production
description: The following analytic detects modifications to registry related to ValleyRAT C2 configuration. Specifically,
it monitors changes in registry keys where ValleyRAT saves the IP address and port information of its command-and-control (C2) server.
description: The following analytic detects modifications to theregistry related to ValleyRAT C2 configuration. Specifically, it monitors changes in registry keys where ValleyRAT saves the IP address and port information of its command-and-control (C2) server.
This activity is a key indicator of ValleyRAT attempting to establish persistent communication with its C2 infrastructure.
By identifying these unauthorized registry modifications, security analysts can quickly detect malicious configurations and
investigate the associated threats. Early detection of these changes helps prevent further exploitation and limits the malware’s
Expand All @@ -23,7 +22,7 @@ search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint
| `windows_modify_registry_valleyrat_c2_config_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
logs with the registry value name, registry path, and registry value data from your
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
Sysmon TA. https://splunkbase.splunk.com/app/5709
known_false_positives: unknown
references:
Expand All @@ -35,7 +34,7 @@ tags:
asset_type: Endpoint
confidence: 100
impact: 90
message: A possible ValleyRAT Registry modification in [$dest$].
message: A registry modification related to ValleyRAT on [$dest$]
mitre_attack_id:
- T1112
observable:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
name: Windows Schedule Task DLL Module Loaded
name: Windows Scheduled Task DLL Module Loaded
id: bc5b2304-f241-419b-874a-e927f667b7b6
version: 1
date: '2024-09-11'
Expand All @@ -19,7 +19,7 @@ search: '`sysmon` EventCode=7 Image IN ("*\\windows\\fonts\\*", "*\\windows\\tem
| stats min(_time) as firstTime max(_time) as lastTime count by user_id, dest, Image ,ImageLoaded, , OriginalFileName, ProcessGuid
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_schedule_task_dll_module_loaded_filter`'
| `windows_scheduled_task_dll_module_loaded_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
logs with the process name and imageloaded executions from your endpoints. If you
are using Sysmon, you must have at least version 6.0.4 of the Sysmon TA.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
name: Windows Schedule Tasks for CompMgmtLauncher or Eventvwr
name: Windows Scheduled Tasks for CompMgmtLauncher or Eventvwr
id: feb43b86-8c38-46cd-865e-20ce8a96c26c
version: 1
date: '2024-09-11'
Expand All @@ -14,7 +14,7 @@ search: '`wineventlog_security` EventCode=4698 TaskContent = "*<Command>C:
| stats count min(_time) as firstTime max(_time) as lastTime by dest action EventData_Xml TaskContent TaskName
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_schedule_tasks_for_compmgmtlauncher_or_eventvwr_filter`'
| `windows_scheduled_tasks_for_compmgmtlauncher_or_eventvwr_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
Windows Security Event Logs with 4698 EventCode enabled. The Windows TA as well
as the URL ToolBox application are also required.
Expand Down

0 comments on commit 2e0a7c5

Please sign in to comment.