Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Windows BBR Tuning - 3 #3382

Merged
merged 4 commits into from
Feb 14, 2024
Merged

[Rule Tuning] Windows BBR Tuning - 3 #3382

merged 4 commits into from
Feb 14, 2024

Conversation

w0rk3r
Copy link
Contributor

@w0rk3r w0rk3r commented Jan 11, 2024

Issues

Part of #3186

Summary

Tunes the following rules:

  • PowerShell Script with Log Clear Capabilities
  • Service Path Modification via sc.exe
  • Unusual Process Extension
  • Service Disabled via Registry Modification
  • Discovery of Internet Capabilities via Built-in Tools

@w0rk3r w0rk3r added Rule: Tuning tweaking or tuning an existing rule OS: Windows windows related rules Domain: Endpoint backport: auto labels Jan 11, 2024
@w0rk3r w0rk3r self-assigned this Jan 11, 2024
@botelastic botelastic bot added the bbr Building Block Rules label Jan 11, 2024
@@ -44,6 +44,7 @@ registry where host.os.type == "windows" and event.type == "change" and
(
process.name : "services.exe" and user.id : "S-1-5-18"
)
and not registry.path : "HKLM\\SYSTEM\\ControlSet001\\Services\\MrxSmb10\\Start"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Smb v1 service, very high volume, not that much relevance

process where event.type == "start" and
process.name : "sc.exe" and process.args : "*binPath*"
process where event.type == "start" and process.name : "sc.exe" and
process.args : "*config*" and process.args : "*binPath*"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It was matching on service creation

@@ -36,7 +36,7 @@ type = "new_terms"
query = '''
host.os.type:windows and event.category:process and event.type:start and
process.name.caseless:("ping.exe" or "tracert.exe" or "pathping.exe") and
not process.args:("127.0.0.1" or "0.0.0.0" or "localhost" or "1.1.1.1" or "1.2.3.4" or "::1")
not process.args:("127.0.0.1" or "0.0.0.0" or "localhost" or "::1")
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1.1.1.1 -> Cloudflare
1.2.3.4 -> External IP

@w0rk3r w0rk3r merged commit 5334601 into main Feb 14, 2024
13 checks passed
@w0rk3r w0rk3r deleted the rt_bbr_3 branch February 14, 2024 18:00
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

Removed changes from:
- rules_building_block/discovery_internet_capabilities.toml

(selectively cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

Removed changes from:
- rules_building_block/discovery_internet_capabilities.toml

(selectively cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

Removed changes from:
- rules_building_block/discovery_internet_capabilities.toml

(selectively cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
protectionsmachine pushed a commit that referenced this pull request Feb 14, 2024
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <[email protected]>

(cherry picked from commit 5334601)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto bbr Building Block Rules Domain: Endpoint OS: Windows windows related rules Rule: Tuning tweaking or tuning an existing rule
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants