Skip to content

Commit b86a494

Browse files
authored
Merge PR #4993 from @nasbench - Fix Issues
new: Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image - A detection replacement for `e0552b19-5a83-4222-b141-b36184bb8d79` remove: OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd - Moved to "unsupported" folder, due to the need of correlation. remove: Potential Persistence Via COM Search Order Hijacking - Moved to "deprecated" in favour of `790317c0-0a36-4a6a-a105-6e576bf99a14`. update: Potential CommandLine Obfuscation Using Unicode Characters - Moved to "threat-hunting" due to the nature FPs update: Potential Remote WMI ActiveScriptEventConsumers Activity - Moved to "threat-hunting" as its meant as an enrichment rule.
1 parent bd284a9 commit b86a494

File tree

7 files changed

+95
-24
lines changed

7 files changed

+95
-24
lines changed

rules/linux/auditd/lnx_auditd_omigod_scx_runasprovider_executeshellcommand.yml renamed to deprecated/linux/lnx_auditd_omigod_scx_runasprovider_executeshellcommand.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd
22
id: 045b5f9c-49f7-4419-a236-9854fb3c827a
3-
status: test
3+
status: unsupported # This rule requires correlations. See https://github.com/SigmaHQ/sigma/discussions/4440#discussioncomment-7070862 and https://user-images.githubusercontent.com/9653181/133756156-4fb9c2b1-aa65-4380-957b-72170de36fc4.png
44
description: |
55
Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell.
66
SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager.
@@ -10,7 +10,7 @@ references:
1010
- https://github.com/Azure/Azure-Sentinel/pull/3059
1111
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
1212
date: 2021-09-17
13-
modified: 2022-11-26
13+
modified: 2024-09-02
1414
tags:
1515
- attack.privilege-escalation
1616
- attack.initial-access

deprecated/windows/registry_set_persistence_com_hijacking_susp_locations.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
11
title: Potential Persistence Via COM Hijacking From Suspicious Locations
22
id: 3d968d17-ffa4-4bc0-bfdc-f139de76ce77
3+
related:
4+
- id: 790317c0-0a36-4a6a-a105-6e576bf99a14
5+
type: derived
36
status: deprecated
47
description: Detects potential COM object hijacking where the "Server" (In/Out) is pointing to a suspicious or unusual location.
58
references:
Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,15 @@
11
title: Potential Persistence Via COM Search Order Hijacking
22
id: a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12
3-
status: test
3+
related:
4+
- id: 790317c0-0a36-4a6a-a105-6e576bf99a14
5+
type: derived
6+
status: deprecated
47
description: Detects potential COM object hijacking leveraging the COM Search Order
58
references:
69
- https://www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
710
author: Maxime Thiebaut (@0xThiebaut), oscd.community, Cédric Hien
811
date: 2020-04-14
9-
modified: 2023-09-28
12+
modified: 2024-09-02
1013
tags:
1114
- attack.persistence
1215
- attack.t1546.015
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,18 @@
1-
title: Remote WMI ActiveScriptEventConsumers
1+
title: Potential Remote WMI ActiveScriptEventConsumers Activity
22
id: 9599c180-e3a8-4743-8f92-7fb96d3be648
33
status: test
4-
description: Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network
4+
description: |
5+
Detect potential adversaries leveraging WMI ActiveScriptEventConsumers remotely to move laterally in a network.
6+
This event is best correlated and used as an enrichment to determine the potential lateral movement activity.
57
references:
68
- https://threathunterplaybook.com/hunts/windows/200902-RemoteWMIActiveScriptEventConsumers/notebook.html
79
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
810
date: 2020-09-02
9-
modified: 2021-11-27
11+
modified: 2024-09-02
1012
tags:
1113
- attack.lateral-movement
1214
- attack.privilege-escalation
15+
- detection.threat-hunting
1316
- attack.persistence
1417
- attack.t1546.003
1518
logsource:
@@ -20,9 +23,9 @@ detection:
2023
EventID: 4624
2124
LogonType: 3
2225
ProcessName|endswith: 'scrcons.exe'
23-
filter:
24-
TargetLogonId: '0x3e7'
25-
condition: selection and not filter
26+
filter_main_local_system:
27+
TargetLogonId: '0x3e7' # Local System
28+
condition: selection and not 1 of filter_main_*
2629
falsepositives:
2730
- SCCM
28-
level: high
31+
level: medium
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,45 @@
1-
title: Potential Commandline Obfuscation Using Unicode Characters
1+
title: Potential CommandLine Obfuscation Using Unicode Characters
22
id: e0552b19-5a83-4222-b141-b36184bb8d79
33
related:
4+
- id: 584bca0f-3608-4402-80fd-4075ff6072e3
5+
type: similar
46
- id: 2c0d2d7b-30d6-4d14-9751-7b9113042ab9
57
type: obsolete
68
status: test
79
description: |
8-
Detects potential commandline obfuscation using unicode characters.
10+
Detects potential CommandLine obfuscation using unicode characters.
911
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.
1012
references:
1113
- https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
1214
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md#atomic-test-6---dlp-evasion-via-sensitive-data-in-vba-macro-over-http
1315
author: frack113, Florian Roth (Nextron Systems)
1416
date: 2022-01-15
15-
modified: 2024-07-22
17+
modified: 2024-09-02
1618
tags:
1719
- attack.defense-evasion
1820
- attack.t1027
21+
- detection.threat-hunting
1922
logsource:
2023
category: process_creation
2124
product: windows
2225
detection:
23-
selection_spacing_modifiers:
24-
CommandLine|contains: # spacing modifier letters that get auto-replaced
26+
selection:
27+
CommandLine|contains:
28+
# spacing modifier letters that get auto-replaced
2529
- 'ˣ' # 0x02E3
2630
- '˪' # 0x02EA
2731
- 'ˢ' # 0x02E2
28-
selection_unicode_slashes: # forward slash alternatives
29-
CommandLine|contains:
32+
# Forward slash alternatives
3033
- '' # 0x22FF
3134
- '' # 0x206F
32-
selection_unicode_hyphens: # hyphen alternatives
33-
CommandLine|contains:
35+
# Hyphen alternatives
3436
- '' # 0x2015
3537
- '' # 0x2014
36-
selection_other:
37-
CommandLine|contains:
38+
# Other
3839
- '¯'
3940
- '®'
4041
- ''
41-
condition: 1 of selection_*
42+
condition: selection
4243
falsepositives:
4344
- Unknown
44-
level: high
45+
level: medium
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
title: Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image
2+
id: 584bca0f-3608-4402-80fd-4075ff6072e3
3+
related:
4+
- id: e0552b19-5a83-4222-b141-b36184bb8d79
5+
type: similar
6+
- id: 2c0d2d7b-30d6-4d14-9751-7b9113042ab9
7+
type: obsolete
8+
status: test
9+
description: |
10+
Detects potential commandline obfuscation using unicode characters.
11+
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.
12+
references:
13+
- https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
14+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md#atomic-test-6---dlp-evasion-via-sensitive-data-in-vba-macro-over-http
15+
author: frack113, Florian Roth (Nextron Systems), Josh Nickels
16+
date: 2024-09-02
17+
tags:
18+
- attack.defense-evasion
19+
- attack.t1027
20+
logsource:
21+
category: process_creation
22+
product: windows
23+
detection:
24+
selection_img:
25+
Image|endswith:
26+
- '\cmd.exe'
27+
- '\cscript.exe'
28+
- '\powershell.exe'
29+
- '\pwsh.exe'
30+
- '\wscript.exe'
31+
OriginalFileName:
32+
- 'Cmd.EXE'
33+
- 'cscript.exe'
34+
- 'PowerShell.EXE'
35+
- 'pwsh.dll'
36+
- 'wscript.exe'
37+
selection_special_chars:
38+
CommandLine|contains:
39+
# spacing modifier letters that get auto-replaced
40+
- 'ˣ' # 0x02E3
41+
- '˪' # 0x02EA
42+
- 'ˢ' # 0x02E2
43+
# Forward slash alternatives
44+
- '' # 0x22FF
45+
- '' # 0x206F
46+
# Hyphen alternatives
47+
- '' # 0x2015
48+
- '' # 0x2014
49+
# Other
50+
- '¯'
51+
- '®'
52+
- ''
53+
condition: all of selection_*
54+
falsepositives:
55+
- Unknown
56+
level: high

rules/windows/registry/registry_set/registry_set_persistence_com_hijacking_builtin.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
title: COM Object Hijacking Via Modification Of Default System CLSID Default Value
22
id: 790317c0-0a36-4a6a-a105-6e576bf99a14
3+
related:
4+
- id: 3d968d17-ffa4-4bc0-bfdc-f139de76ce77
5+
type: obsolete
6+
- id: a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12
7+
type: obsolete
38
status: experimental
49
description: Detects potential COM object hijacking via modification of default system CLSID.
510
references:

0 commit comments

Comments
 (0)