-
Notifications
You must be signed in to change notification settings - Fork 514
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] Windows DR Tuning - 14 #3376
Conversation
@@ -13,7 +13,7 @@ Identifies Component Object Model (COM) hijacking via registry modification. Adv | |||
executing malicious content triggered by hijacked references to COM objects. | |||
""" | |||
from = "now-9m" | |||
index = ["logs-endpoint.events.*", "endgame-*"] | |||
index = ["logs-endpoint.events.*"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I removed Endgame support to check signer info; Endgame doesn't have this data outside process events.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good call
process.name : "svchost.exe" and | ||
process.code_signature.trusted == true and process.code_signature.subject_name == "Microsoft Windows Publisher" and | ||
registry.value : "DelegateExecute" and | ||
registry.data.strings : ( | ||
/* https://strontic.github.io/xcyclopedia/library/clsid_4ED3A719-CEA8-4BD9-910D-E252F997AFC2.html */ | ||
"{4ED3A719-CEA8-4BD9-910D-E252F997AFC2}", | ||
|
||
/* https://strontic.github.io/xcyclopedia/library/clsid_A56A841F-E974-45C1-8001-7E3F8A085917.html */ | ||
"{A56A841F-E974-45C1-8001-7E3F8A085917}", | ||
|
||
/* https://strontic.github.io/xcyclopedia/library/clsid_BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78.html */ | ||
"{BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78}", | ||
"%SystemRoot%\\system32\\shdocvw.dll" | ||
) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A second 👀 to confirm if we can exclude those would be nice.
Cc @Samirbous
rule_id = "d12bac54-ab2a-4159-933f-d7bcefa7b61d" | ||
severity = "low" | ||
severity = "medium" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Low volume, bumping severity
"?:\\WINDOWS\\system32\\spool\\DRIVERS\\x64\\*.dll", | ||
"?:\\WINDOWS\\system32\\spool\\DRIVERS\\W32X86\\*.dll", | ||
"?:\\WINDOWS\\system32\\spool\\PRTPROCS\\x64\\*.dll", | ||
"?:\\WINDOWS\\system32\\spool\\{????????-????-????-????-????????????}\\*.dll" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Super high volume (>900k events last 90d), ?s cover the GUID format
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice work. Glad to see the component object model hijacking rule receive some good tuning!
registry.path : ("HK*\\InprocServer32\\", "\\REGISTRY\\*\\InprocServer32\\") and | ||
registry.data.strings: ("scrobj.dll", "C:\\*\\scrobj.dll") and | ||
registry.path : "HK*\\InprocServer32\\" and | ||
registry.data.strings: ("scrobj.dll", "?:\\*\\scrobj.dll") and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Almost feel like we should audit all Windows rules and check for this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great stuff!
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
* [Rule Tuning] Windows DR Tuning - 14 * Update persistence_suspicious_com_hijack_registry.toml * Update rules/windows/persistence_webshell_detection.toml (cherry picked from commit 0469785)
Issues
Part of #3186
Summary
Tunes the following rules: