|
5833 | 5833 | ],
|
5834 | 5834 | "level": "high",
|
5835 | 5835 | "rule": [
|
5836 |
| - "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND ((NewProcessName LIKE '%\\\\livekd.exe' ESCAPE '\\' OR NewProcessName LIKE '%\\\\livekd64.exe' ESCAPE '\\') OR OriginalFileName = 'livekd.exe') AND (CommandLine LIKE '% /m%' ESCAPE '\\' AND CommandLine LIKE '% -m%' ESCAPE '\\'))" |
| 5836 | + "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND ((NewProcessName LIKE '%\\\\livekd.exe' ESCAPE '\\' OR NewProcessName LIKE '%\\\\livekd64.exe' ESCAPE '\\') OR OriginalFileName = 'livekd.exe') AND (CommandLine LIKE '% -m%' ESCAPE '\\' OR CommandLine LIKE '% /m%' ESCAPE '\\'))" |
5837 | 5837 | ],
|
5838 | 5838 | "filename": "proc_creation_win_sysinternals_livekd_kernel_memory_dump.yml"
|
5839 | 5839 | },
|
|
6227 | 6227 | ],
|
6228 | 6228 | "filename": "proc_creation_win_hktl_impacket_lateral_movement.yml"
|
6229 | 6229 | },
|
6230 |
| - { |
6231 |
| - "title": "Imports Registry Key From an ADS", |
6232 |
| - "id": "0b80ade5-6997-4b1d-99a1-71701778ea61", |
6233 |
| - "status": "test", |
6234 |
| - "description": "Detects the import of a alternate datastream to the registry with regedit.exe.", |
6235 |
| - "author": "Oddvar Moe, Sander Wiebing, oscd.community", |
6236 |
| - "tags": [ |
6237 |
| - "attack.t1112", |
6238 |
| - "attack.defense_evasion" |
6239 |
| - ], |
6240 |
| - "falsepositives": [ |
6241 |
| - "Unknown" |
6242 |
| - ], |
6243 |
| - "level": "high", |
6244 |
| - "rule": [ |
6245 |
| - "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND ((NewProcessName LIKE '%\\\\regedit.exe' ESCAPE '\\' OR OriginalFileName = 'REGEDIT.EXE') AND ((CommandLine LIKE '% /i %' ESCAPE '\\' OR CommandLine LIKE '%.reg%' ESCAPE '\\') AND CommandLine REGEXP ':[^ \\\\]')) AND NOT ((CommandLine LIKE '% /e %' ESCAPE '\\' OR CommandLine LIKE '% /a %' ESCAPE '\\' OR CommandLine LIKE '% /c %' ESCAPE '\\' OR CommandLine LIKE '% -e %' ESCAPE '\\' OR CommandLine LIKE '% -a %' ESCAPE '\\' OR CommandLine LIKE '% -c %' ESCAPE '\\')))" |
6246 |
| - ], |
6247 |
| - "filename": "proc_creation_win_regedit_import_keys_ads.yml" |
6248 |
| - }, |
6249 | 6230 | {
|
6250 | 6231 | "title": "HackTool - Certipy Execution",
|
6251 | 6232 | "id": "6938366d-8954-4ddc-baff-c830b3ba8fcd",
|
|
6898 | 6879 | ],
|
6899 | 6880 | "level": "high",
|
6900 | 6881 | "rule": [
|
6901 |
| - "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\regedit.exe' ESCAPE '\\' OR OriginalFileName = 'REGEDIT.EXE') AND (CommandLine LIKE '% /E %' ESCAPE '\\' OR CommandLine LIKE '% -E %' ESCAPE '\\') AND (CommandLine LIKE '%hklm%' ESCAPE '\\' OR CommandLine LIKE '%hkey\\_local\\_machine%' ESCAPE '\\') AND (CommandLine LIKE '%\\\\system' ESCAPE '\\' OR CommandLine LIKE '%\\\\sam' ESCAPE '\\' OR CommandLine LIKE '%\\\\security' ESCAPE '\\'))" |
| 6882 | + "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\regedit.exe' ESCAPE '\\' OR OriginalFileName = 'REGEDIT.EXE') AND (CommandLine LIKE '% -E %' ESCAPE '\\' OR CommandLine LIKE '% /E %' ESCAPE '\\') AND (CommandLine LIKE '%hklm%' ESCAPE '\\' OR CommandLine LIKE '%hkey\\_local\\_machine%' ESCAPE '\\') AND (CommandLine LIKE '%\\\\system' ESCAPE '\\' OR CommandLine LIKE '%\\\\sam' ESCAPE '\\' OR CommandLine LIKE '%\\\\security' ESCAPE '\\'))" |
6902 | 6883 | ],
|
6903 | 6884 | "filename": "proc_creation_win_regedit_export_critical_keys.yml"
|
6904 | 6885 | },
|
|
7975 | 7956 | ],
|
7976 | 7957 | "level": "high",
|
7977 | 7958 | "rule": [
|
7978 |
| - "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\msdt.exe' ESCAPE '\\' OR OriginalFileName = 'msdt.exe') AND (CommandLine LIKE '%IT\\_BrowseForFile=%' ESCAPE '\\' OR (CommandLine LIKE '% PCWDiagnostic%' ESCAPE '\\' AND (CommandLine LIKE '% /af %' ESCAPE '\\' OR CommandLine LIKE '% -af %' ESCAPE '\\'))))" |
| 7959 | + "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\msdt.exe' ESCAPE '\\' OR OriginalFileName = 'msdt.exe') AND (CommandLine LIKE '%IT\\_BrowseForFile=%' ESCAPE '\\' OR (CommandLine LIKE '% PCWDiagnostic%' ESCAPE '\\' AND (CommandLine LIKE '% -af %' ESCAPE '\\' OR CommandLine LIKE '% /af %' ESCAPE '\\'))))" |
7979 | 7960 | ],
|
7980 | 7961 | "filename": "proc_creation_win_msdt_arbitrary_command_execution.yml"
|
7981 | 7962 | },
|
|
0 commit comments