-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR #4698 from @swachchhanda000 - Added rules that detect possib…
…le activities associated with services and modules enumeration new: Interesting Service Enumeration Via Sc.EXE new: Loaded Module Enumeration Via Tasklist.EXE fix: SC.EXE Query Execution - Add keybase filter --------- Co-authored-by: nasbench <[email protected]>
- Loading branch information
1 parent
2acebc9
commit 7509f6a
Showing
4 changed files
with
70 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
30 changes: 30 additions & 0 deletions
30
rules/windows/process_creation/proc_creation_win_sc_query_interesting_services.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
title: Interesting Service Enumeration Via Sc.EXE | ||
id: e83e8899-c9b2-483b-b355-5decc942b959 | ||
status: experimental | ||
description: | | ||
Detects the enumeration and query of interesting and in some cases sensitive services on the system via "sc.exe". | ||
Attackers often try to enumerate the services currently running on a system in order to find different attack vectors. | ||
references: | ||
- https://www.n00py.io/2021/05/dumping-plaintext-rdp-credentials-from-svchost-exe/ | ||
- https://pentestlab.blog/tag/svchost/ | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2024/02/12 | ||
tags: | ||
- attack.t1003 | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
selection_img: | ||
- Image|endswith: '\sc.exe' | ||
- OriginalFileName: 'sc.exe' | ||
selection_cli: | ||
CommandLine|contains: 'query' | ||
selection_cmd: | ||
# Note: add more interesting services | ||
CommandLine|contains: 'termservice' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Unknown | ||
# Note: can be upgraded to medium after an initial baseline | ||
level: low |
32 changes: 32 additions & 0 deletions
32
rules/windows/process_creation/proc_creation_win_tasklist_module_enumeration.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
title: Loaded Module Enumeration Via Tasklist.EXE | ||
id: 34275eb8-fa19-436b-b959-3d9ecd53fa1f | ||
status: experimental | ||
description: | | ||
Detects the enumeration of a specific DLL or EXE being used by a binary via "tasklist.exe". | ||
This is often used by attackers in order to find the specific process identifier (PID) that is using the DLL in question. | ||
In order to dump the process memory or perform other nefarious actions. | ||
references: | ||
- https://www.n00py.io/2021/05/dumping-plaintext-rdp-credentials-from-svchost-exe/ | ||
- https://pentestlab.blog/tag/svchost/ | ||
author: Swachchhanda Shrawan Poudel | ||
date: 2024/02/12 | ||
tags: | ||
- attack.t1003 | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
selection_img: | ||
- Image|endswith: '\tasklist.exe' | ||
- OriginalFileName: 'tasklist.exe' | ||
selection_flags: | ||
CommandLine|contains: | ||
- '/m' | ||
- '-m' | ||
selection_module: | ||
# Note: add other interesting modules or binaries | ||
CommandLine|contains: 'rdpcorets.dll' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Unknown | ||
level: medium |