|
37500 | 37500 | ],
|
37501 | 37501 | "filename": "proc_creation_win_sysinternals_procdump_evasion.yml"
|
37502 | 37502 | },
|
| 37503 | + { |
| 37504 | + "title": "CodePage Modification Via MODE.COM To Russian Language", |
| 37505 | + "id": "12fbff88-16b5-4b42-9754-cd001a789fb3", |
| 37506 | + "status": "experimental", |
| 37507 | + "description": "Detects a CodePage modification using the \"mode.com\" utility to Russian language.\nThis behavior has been used by threat actors behind Dharma ransomware.\n", |
| 37508 | + "author": "Joseliyo Sanchez, @Joseliyo_Jstnk", |
| 37509 | + "tags": [ |
| 37510 | + "attack.defense_evasion", |
| 37511 | + "attack.t1036" |
| 37512 | + ], |
| 37513 | + "falsepositives": [ |
| 37514 | + "Russian speaking people changing the CodePage" |
| 37515 | + ], |
| 37516 | + "level": "medium", |
| 37517 | + "rule": [ |
| 37518 | + "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\mode.com' ESCAPE '\\' OR OriginalFileName = 'MODE.COM') AND (CommandLine LIKE '% con %' ESCAPE '\\' AND CommandLine LIKE '% cp %' ESCAPE '\\' AND CommandLine LIKE '% select=%' ESCAPE '\\' AND (CommandLine LIKE '%=1251' ESCAPE '\\' OR CommandLine LIKE '%=866' ESCAPE '\\')))" |
| 37519 | + ], |
| 37520 | + "filename": "proc_creation_win_mode_codepage_russian.yml" |
| 37521 | + }, |
37503 | 37522 | {
|
37504 | 37523 | "title": "Non Interactive PowerShell Process Spawned",
|
37505 | 37524 | "id": "f4bbd493-b796-416e-bbf2-121235348529",
|
|
46130 | 46149 | ],
|
46131 | 46150 | "filename": "image_load_side_load_abused_dlls_susp_paths.yml"
|
46132 | 46151 | },
|
46133 |
| - { |
46134 |
| - "title": "Possible Process Hollowing Image Loading", |
46135 |
| - "id": "e32ce4f5-46c6-4c47-ba69-5de3c9193cd7", |
46136 |
| - "status": "test", |
46137 |
| - "description": "Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g. through process hollowing by Mimikatz", |
46138 |
| - "author": "Markus Neis", |
46139 |
| - "tags": [ |
46140 |
| - "attack.defense_evasion", |
46141 |
| - "attack.t1574.002" |
46142 |
| - ], |
46143 |
| - "falsepositives": [ |
46144 |
| - "Very likely, needs more tuning" |
46145 |
| - ], |
46146 |
| - "level": "high", |
46147 |
| - "rule": [ |
46148 |
| - "SELECT * FROM logs WHERE (NewProcessName LIKE '%\\\\notepad.exe' ESCAPE '\\' AND (ImageLoaded LIKE '%\\\\samlib.dll' ESCAPE '\\' OR ImageLoaded LIKE '%\\\\WinSCard.dll' ESCAPE '\\'))" |
46149 |
| - ], |
46150 |
| - "filename": "image_load_susp_uncommon_image_load.yml" |
46151 |
| - }, |
46152 | 46152 | {
|
46153 | 46153 | "title": "UAC Bypass With Fake DLL",
|
46154 | 46154 | "id": "a5ea83a7-05a5-44c1-be2e-addccbbd8c03",
|
|
46853 | 46853 | ],
|
46854 | 46854 | "filename": "image_load_side_load_cpl_from_non_system_location.yml"
|
46855 | 46855 | },
|
| 46856 | + { |
| 46857 | + "title": "Unsigned DLL Loaded by RunDLL32/RegSvr32", |
| 46858 | + "id": "b5de0c9a-6f19-43e0-af4e-55ad01f550af", |
| 46859 | + "status": "experimental", |
| 46860 | + "description": "Detects RunDLL32/RegSvr32 loading an unsigned or untrusted DLL.\nAdversaries often abuse those programs to proxy execution of malicious code.\n", |
| 46861 | + "author": "Swachchhanda Shrawan Poudel", |
| 46862 | + "tags": [ |
| 46863 | + "attack.t1218.011", |
| 46864 | + "attack.t1218.010", |
| 46865 | + "attack.defense_evasion" |
| 46866 | + ], |
| 46867 | + "falsepositives": [ |
| 46868 | + "Unknown" |
| 46869 | + ], |
| 46870 | + "level": "medium", |
| 46871 | + "rule": [ |
| 46872 | + "SELECT * FROM logs WHERE ((NewProcessName LIKE '%\\\\regsvr32.exe' ESCAPE '\\' OR NewProcessName LIKE '%\\\\rundll32.exe' ESCAPE '\\') AND NOT ((Signed = 'true' OR (SignatureStatus LIKE 'errorChaining' ESCAPE '\\' OR SignatureStatus LIKE 'errorCode\\_endpoint' ESCAPE '\\' OR SignatureStatus LIKE 'errorExpired' ESCAPE '\\' OR SignatureStatus LIKE 'trusted' ESCAPE '\\'))))" |
| 46873 | + ], |
| 46874 | + "filename": "image_load_susp_unsigned_dll.yml" |
| 46875 | + }, |
46856 | 46876 | {
|
46857 | 46877 | "title": "VMMap Signed Dbghelp.DLL Potential Sideloading",
|
46858 | 46878 | "id": "98ffaed4-aec2-4e04-9b07-31492fe68b3d",
|
|
49293 | 49313 | ],
|
49294 | 49314 | "filename": "proc_creation_win_taskkill_execution.yml"
|
49295 | 49315 | },
|
| 49316 | + { |
| 49317 | + "title": "CodePage Modification Via MODE.COM", |
| 49318 | + "id": "d48c5ffa-3b02-4c0f-9a9e-3c275650dd0e", |
| 49319 | + "status": "experimental", |
| 49320 | + "description": "Detects a CodePage modification using the \"mode.com\" utility.\nThis behavior has been used by threat actors behind Dharma ransomware.\n", |
| 49321 | + "author": "Nasreddine Bencherchali (Nextron Systems), Joseliyo Sanchez, @Joseliyo_Jstnk", |
| 49322 | + "tags": [ |
| 49323 | + "attack.defense_evasion", |
| 49324 | + "attack.t1036", |
| 49325 | + "detection.threat_hunting" |
| 49326 | + ], |
| 49327 | + "falsepositives": [ |
| 49328 | + "Unknown" |
| 49329 | + ], |
| 49330 | + "level": "low", |
| 49331 | + "rule": [ |
| 49332 | + "SELECT * FROM logs WHERE ((EventID = '4688' AND Channel = 'Security') AND (NewProcessName LIKE '%\\\\mode.com' ESCAPE '\\' OR OriginalFileName = 'MODE.COM') AND (CommandLine LIKE '% con %' ESCAPE '\\' AND CommandLine LIKE '% cp %' ESCAPE '\\' AND CommandLine LIKE '% select=%' ESCAPE '\\'))" |
| 49333 | + ], |
| 49334 | + "filename": "proc_creation_win_mode_codepage_change.yml" |
| 49335 | + }, |
49296 | 49336 | {
|
49297 | 49337 | "title": "PsExec Default Named Pipe",
|
49298 | 49338 | "id": "f3f3a972-f982-40ad-b63c-bca6afdfad7c",
|
|
0 commit comments