Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Windows DR Tuning - 14 #3376

Merged
merged 5 commits into from
Jan 15, 2024
Merged

[Rule Tuning] Windows DR Tuning - 14 #3376

merged 5 commits into from
Jan 15, 2024

Conversation

w0rk3r
Copy link
Contributor

@w0rk3r w0rk3r commented Jan 9, 2024

Issues

Part of #3186

Summary

Tunes the following rules:

  • Component Object Model Hijacking
  • Potential Persistence via Time Provider Modification
  • Web Shell Detection: Script Process Child of Common Web Processes
  • Expired or Revoked Driver Loaded
  • Suspicious PrintSpooler Service Executable File Creation

@@ -13,7 +13,7 @@ Identifies Component Object Model (COM) hijacking via registry modification. Adv
executing malicious content triggered by hijacked references to COM objects.
"""
from = "now-9m"
index = ["logs-endpoint.events.*", "endgame-*"]
index = ["logs-endpoint.events.*"]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I removed Endgame support to check signer info; Endgame doesn't have this data outside process events.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good call

Comment on lines +109 to +122
process.name : "svchost.exe" and
process.code_signature.trusted == true and process.code_signature.subject_name == "Microsoft Windows Publisher" and
registry.value : "DelegateExecute" and
registry.data.strings : (
/* https://strontic.github.io/xcyclopedia/library/clsid_4ED3A719-CEA8-4BD9-910D-E252F997AFC2.html */
"{4ED3A719-CEA8-4BD9-910D-E252F997AFC2}",

/* https://strontic.github.io/xcyclopedia/library/clsid_A56A841F-E974-45C1-8001-7E3F8A085917.html */
"{A56A841F-E974-45C1-8001-7E3F8A085917}",

/* https://strontic.github.io/xcyclopedia/library/clsid_BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78.html */
"{BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78}",
"%SystemRoot%\\system32\\shdocvw.dll"
)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A second 👀 to confirm if we can exclude those would be nice.

Cc @Samirbous

rule_id = "d12bac54-ab2a-4159-933f-d7bcefa7b61d"
severity = "low"
severity = "medium"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Low volume, bumping severity

"?:\\WINDOWS\\system32\\spool\\DRIVERS\\x64\\*.dll",
"?:\\WINDOWS\\system32\\spool\\DRIVERS\\W32X86\\*.dll",
"?:\\WINDOWS\\system32\\spool\\PRTPROCS\\x64\\*.dll",
"?:\\WINDOWS\\system32\\spool\\{????????-????-????-????-????????????}\\*.dll"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Super high volume (>900k events last 90d), ?s cover the GUID format

Copy link
Contributor

@Aegrah Aegrah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice work. Glad to see the component object model hijacking rule receive some good tuning!

registry.path : ("HK*\\InprocServer32\\", "\\REGISTRY\\*\\InprocServer32\\") and
registry.data.strings: ("scrobj.dll", "C:\\*\\scrobj.dll") and
registry.path : "HK*\\InprocServer32\\" and
registry.data.strings: ("scrobj.dll", "?:\\*\\scrobj.dll") and
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Almost feel like we should audit all Windows rules and check for this.

Copy link
Contributor

@terrancedejesus terrancedejesus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great stuff!

@w0rk3r w0rk3r merged commit 0469785 into main Jan 15, 2024
13 checks passed
@w0rk3r w0rk3r deleted the rt_14 branch January 15, 2024 14:16
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
protectionsmachine pushed a commit that referenced this pull request Jan 15, 2024
* [Rule Tuning] Windows DR Tuning - 14

* Update persistence_suspicious_com_hijack_registry.toml

* Update rules/windows/persistence_webshell_detection.toml

(cherry picked from commit 0469785)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto Domain: Endpoint OS: Windows windows related rules Rule: Tuning tweaking or tuning an existing rule
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants