Skip to content

Commit

Permalink
Fix/rules correction (#437)
Browse files Browse the repository at this point in the history
* fix category.low

* Added a missing character

* Deleted the generator.version

* Fixed the expected states based on the rule

* Added different types of hashes

* The types of hashes are described separately

* Fixed a rule that caused Subject to return the value None
  • Loading branch information
Reversenant authored Nov 8, 2024
1 parent 0ccf90f commit 1588f6f
Show file tree
Hide file tree
Showing 10 changed files with 70 additions and 25 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -34,4 +34,4 @@ else
endif
event_src.category = "Operating system"

id = "Microsoft_Windows_eventlog_Common_EventTracing_17_The security_descriptor_for_session_has_been_updated"
id = "Microsoft_Windows_eventlog_Common_EventTracing_17_The_security_descriptor_for_session_has_been_updated"
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
EventDescriptions:
- Criteria: id = "Microsoft_Windows_eventlog_Common_EventTracing_17_The security_descriptor_for_session_has_been_updated"
- Criteria: id = "Microsoft_Windows_eventlog_Common_EventTracing_17_The_security_descriptor_for_session_has_been_updated"
LocalizationId: LOC_Microsoft_Title_eventlog_event_name_17
ExpertContext:
Created: 02.05.2024
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
expect 1 {"action": "create", "alert.context": "lab\\admin \"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "alert.key": "\"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "category.high": "Command and Control", "category.low": "Traffic Signaling", "correlation_name": "Portproxy_netsh", "correlation_type": "incident", "event_src.category": "Operating system", "event_src.host": "pc1.lab.local", "event_src.hostname": "pc1", "event_src.subsys": "Security", "event_src.title": "windows", "event_src.vendor": "microsoft", "importance": "medium", "incident.aggregation.key": "Portproxy_netsh|pc1.lab.local", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "medium", "object": "process", "object.account.domain": "lab", "object.account.id": "S-1-5-21-1840087645-2506612525-4240436938-1000", "object.account.name": "admin", "object.account.session_id": "336094", "object.process.cmdline": "\"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "object.process.fullpath": "c:\\windows\\system32\\netsh.exe", "object.process.id": "3328", "object.process.name": "netsh.exe", "object.process.parent.fullpath": "c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe", "object.process.parent.id": "2300", "object.process.parent.name": "powershell.exe", "object.process.parent.path": "c:\\windows\\system32\\windowspowershell\\v1.0\\", "object.process.path": "c:\\windows\\system32\\", "status": "success", "subject": "account", "subject.account.domain": "lab", "subject.account.id": "S-1-5-21-1840087645-2506612525-4240436938-1000", "subject.account.name": "admin", "subject.account.privileges": "TokenElevationTypeDefault", "subject.account.session_id": "336094"}
expect 1 {"action": "create", "alert.context": "lab\\admin \"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "alert.key": "\"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "category.high": "Command and Control", "category.low": "Proxy", "correlation_name": "Portproxy_netsh", "correlation_type": "incident", "event_src.category": "Operating system", "event_src.host": "pc1.lab.local", "event_src.hostname": "pc1", "event_src.subsys": "Security", "event_src.title": "windows", "event_src.vendor": "microsoft", "importance": "medium", "incident.aggregation.key": "Portproxy_netsh|pc1.lab.local", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "medium", "object": "process", "object.account.domain": "lab", "object.account.id": "S-1-5-21-1840087645-2506612525-4240436938-1000", "object.account.name": "admin", "object.account.session_id": "336094", "object.process.cmdline": "\"C:\\Windows\\system32\\netsh.exe\" interface port add v4 listenaddress=0.0.0.0 listenport=8882 connecta=0.0.0.0 connectp=3382", "object.process.fullpath": "c:\\windows\\system32\\netsh.exe", "object.process.id": "3328", "object.process.name": "netsh.exe", "object.process.parent.fullpath": "c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe", "object.process.parent.id": "2300", "object.process.parent.name": "powershell.exe", "object.process.parent.path": "c:\\windows\\system32\\windowspowershell\\v1.0\\", "object.process.path": "c:\\windows\\system32\\", "status": "success", "subject": "account", "subject.account.domain": "lab", "subject.account.id": "S-1-5-21-1840087645-2506612525-4240436938-1000", "subject.account.name": "admin", "subject.account.privileges": "TokenElevationTypeDefault", "subject.account.session_id": "336094"}
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,10 @@ rule Detect_execution_imageload_wuauclt_lolbas: Process_Creation or Image_Load
$object.process.path = object.process.path
$object.process.fullpath = object.process.fullpath
$object.process.hash = object.process.hash
$object.process.hash.md5 = object.process.hash.md5
$object.process.hash.sha1 = object.process.hash.sha1
$object.process.hash.sha256 = object.process.hash.sha256
$object.process.hash.imphash = object.process.hash.imphash
$object.process.version = object.process.version
$object.process.cmdline = object.process.cmdline
$object.process.guid = object.process.guid
Expand Down Expand Up @@ -110,6 +114,10 @@ rule Detect_execution_imageload_wuauclt_lolbas: Process_Creation or Image_Load
$object.process.path = object.process.path
$object.process.fullpath = object.process.fullpath
$object.process.hash = object.process.hash
$object.process.hash.md5 = object.process.hash.md5
$object.process.hash.sha1 = object.process.hash.sha1
$object.process.hash.sha256 = object.process.hash.sha256
$object.process.hash.imphash = object.process.hash.imphash
$object.process.version = object.process.version
$object.process.cmdline = object.process.cmdline
$object.process.guid = object.process.guid
Expand Down
Original file line number Diff line number Diff line change
@@ -1 +1 @@
expect 1 {"action": "start", "alert.key": "c:\\programdata\\intel\\helpa.dll", "category.generic": "Attack", "category.high": "Execution", "category.low": "System Binary Proxy Execution", "correlation_name": "Detect_execution_imageload_wuauclt_lolbas", "correlation_type": "incident", "event_src.category": "Other", "event_src.fqdn": "laptop-ju4m3i0e", "event_src.host": "laptop-ju4m3i0e", "event_src.hostname": "laptop-ju4m3i0e", "event_src.subsys": "Microsoft-Windows-Sysmon/Operational", "event_src.title": "sysmon", "event_src.vendor": "microsoft", "generator.type": "correlationengine", "importance": "high", "incident.aggregation.key": "Detect_execution_imageload_wuauclt_lolbas|laptop-ju4m3i0e||c:\\programdata\\intel\\helpa.dll", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "high", "object": "module", "object.process.fullpath": "c:\\programdata\\intel\\helpa.dll", "object.process.hash": "IMPHASH:8DEF796746DD54062D5B3186EEF39356 MD5:6AB43126243BE72FF7D446D5A496AA76 SHA1:AF7687063F8EE1C8FD57D1A5FE6FA4F28A53C434 SHA256:56C5AFF6AC04BDF86EDBC4F0D0F9581F250A4C97DD60FD1179F153AC20230920", "object.process.meta": "Description:? | Product:? | Company:?", "object.process.name": "helpa.dll", "object.process.original_name": "?", "object.process.path": "c:\\programdata\\intel\\", "object.property": "signature status", "object.value": "not signed", "object.version": "?", "status": "success", "subject": "process", "subject.process.fullpath": "c:\\windows\\system32\\wuauclt.exe", "subject.process.guid": "00247c92-09fe-5f86-0000-001051841401", "subject.process.id": "1716", "subject.process.name": "wuauclt.exe", "subject.process.path": "c:\\windows\\system32\\"}
expect 1 {"action":"start","alert.key":"c:\\programdata\\intel\\helpa.dll","category.generic":"Attack","category.high":"Execution","category.low":"System Binary Proxy Execution","correlation_name":"Detect_execution_imageload_wuauclt_lolbas","correlation_type":"incident","event_src.category":"Other","event_src.fqdn":"laptop-ju4m3i0e","event_src.host":"laptop-ju4m3i0e","event_src.hostname":"laptop-ju4m3i0e","event_src.subsys":"Microsoft-Windows-Sysmon/Operational","event_src.title":"sysmon","event_src.vendor":"microsoft","generator.type":"correlationengine","importance":"high","incident.aggregation.key":"Detect_execution_imageload_wuauclt_lolbas|laptop-ju4m3i0e||c:\\programdata\\intel\\helpa.dll","incident.aggregation.timeout":7200,"incident.category":"Undefined","incident.severity":"high","object":"module","object.process.fullpath":"c:\\programdata\\intel\\helpa.dll","object.process.hash.imphash":"8DEF796746DD54062D5B3186EEF39356","object.process.hash.md5":"6AB43126243BE72FF7D446D5A496AA76","object.process.hash.sha1":"AF7687063F8EE1C8FD57D1A5FE6FA4F28A53C434","object.process.hash.sha256":"56C5AFF6AC04BDF86EDBC4F0D0F9581F250A4C97DD60FD1179F153AC20230920","object.process.meta":"Description:? | Product:? | Company:?","object.process.name":"helpa.dll","object.process.original_name":"?","object.process.path":"c:\\programdata\\intel\\","object.property":"signature status","object.value":"not signed","object.version":"?","status":"success","subject":"process","subject.process.fullpath":"c:\\windows\\system32\\wuauclt.exe","subject.process.guid":"00247c92-09fe-5f86-0000-001051841401","subject.process.id":"1716","subject.process.name":"wuauclt.exe","subject.process.path":"c:\\windows\\system32\\"}
Original file line number Diff line number Diff line change
@@ -1 +1 @@
expect 1 {"action": "start", "alert.key": "wuauclt.exe /updatedeploymentprovider c:\\programdata\\intel\\helpa.dll /runhandlercomserver", "category.generic": "Attack", "category.high": "Execution", "category.low": "System Binary Proxy Execution", "correlation_name": "Detect_execution_imageload_wuauclt_lolbas", "correlation_type": "incident", "datafield6": "00247c92-de70-5f85-0000-002059f80600", "event_src.category": "Other", "event_src.fqdn": "laptop-ju4m3i0e", "event_src.host": "laptop-ju4m3i0e", "event_src.hostname": "laptop-ju4m3i0e", "event_src.subsys": "Microsoft-Windows-Sysmon/Operational", "event_src.title": "sysmon", "event_src.vendor": "microsoft", "generator.type": "correlationengine", "importance": "high", "incident.aggregation.key": "Detect_execution_imageload_wuauclt_lolbas|laptop-ju4m3i0e|wuauclt.exe /UpdateDeploymentProvider C:\\ProgramData\\Intel\\helpa.dll /RunHandlerComServer|c:\\windows\\system32\\cmd.exe", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "high", "object": "process", "object.account.domain": "laptop-ju4m3i0e", "object.account.id": "synthetic:bouss@laptop-ju4m3i0e", "object.account.name": "bouss", "object.account.session_id": "456793", "object.process.cmdline": "c:\\windows\\system32\\cmd.exe", "object.process.cwd": "c:\\Windows\\System32\\", "object.process.fullpath": "c:\\windows\\system32\\cmd.exe", "object.process.guid": "00247c92-09fe-5f86-0000-0010ac861401", "object.process.hash": "IMPHASH:272245E2988E1E430500B852C4FB5E18 MD5:D7AB69FAD18D4A643D84A271DFC0DBDF SHA1:8DCA9749CD48D286950E7A9FA1088C937CBCCAD4 SHA256:FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5", "object.process.id": "6372", "object.process.meta": "Description:Windows Command Processor | Product:Microsoft® Windows® Operating System | Company:Microsoft Corporation", "object.process.name": "cmd.exe", "object.process.original_name": "Cmd.Exe", "object.process.parent.cmdline": "wuauclt.exe /UpdateDeploymentProvider C:\\ProgramData\\Intel\\helpa.dll /RunHandlerComServer", "object.process.parent.fullpath": "c:\\windows\\system32\\wuauclt.exe", "object.process.parent.guid": "00247c92-09fe-5f86-0000-001051841401", "object.process.parent.id": "1716", "object.process.parent.name": "wuauclt.exe", "object.process.parent.path": "c:\\windows\\system32\\", "object.process.path": "c:\\windows\\system32\\", "object.process.version": "10.0.18362.449 (WinBuild.160101.0800)", "status": "success", "subject": "account", "subject.account.domain": "laptop-ju4m3i0e", "subject.account.id": "synthetic:bouss@laptop-ju4m3i0e", "subject.account.name": "bouss", "subject.account.privileges": "Medium", "subject.account.session_id": "456793"}
expect 1 {"action":"start","alert.key":"wuauclt.exe /updatedeploymentprovider c:\\programdata\\intel\\helpa.dll /runhandlercomserver","category.generic":"Attack","category.high":"Execution","category.low":"System Binary Proxy Execution","correlation_name":"Detect_execution_imageload_wuauclt_lolbas","correlation_type":"incident","datafield6":"00247c92-de70-5f85-0000-002059f80600","event_src.category":"Other","event_src.fqdn":"laptop-ju4m3i0e","event_src.host":"laptop-ju4m3i0e","event_src.hostname":"laptop-ju4m3i0e","event_src.subsys":"Microsoft-Windows-Sysmon/Operational","event_src.title":"sysmon","event_src.vendor":"microsoft","generator.type":"correlationengine","importance":"high","incident.aggregation.key":"Detect_execution_imageload_wuauclt_lolbas|laptop-ju4m3i0e|wuauclt.exe /UpdateDeploymentProvider C:\\ProgramData\\Intel\\helpa.dll /RunHandlerComServer|c:\\windows\\system32\\cmd.exe","incident.aggregation.timeout":7200,"incident.category":"Undefined","incident.severity":"high","object":"process","object.account.domain":"laptop-ju4m3i0e","object.account.id":"synthetic:bouss@laptop-ju4m3i0e","object.account.name":"bouss","object.account.session_id":"456793","object.process.cmdline":"c:\\windows\\system32\\cmd.exe","object.process.cwd":"c:\\Windows\\System32\\","object.process.fullpath":"c:\\windows\\system32\\cmd.exe","object.process.guid":"00247c92-09fe-5f86-0000-0010ac861401","object.process.hash.imphash":"272245E2988E1E430500B852C4FB5E18","object.process.hash.md5":"D7AB69FAD18D4A643D84A271DFC0DBDF","object.process.hash.sha1":"8DCA9749CD48D286950E7A9FA1088C937CBCCAD4","object.process.hash.sha256":"FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5","object.process.id":"6372","object.process.meta":"Description:Windows Command Processor | Product:Microsoft® Windows® Operating System | Company:Microsoft Corporation","object.process.name":"cmd.exe","object.process.original_name":"Cmd.Exe","object.process.parent.cmdline":"wuauclt.exe /UpdateDeploymentProvider C:\\ProgramData\\Intel\\helpa.dll /RunHandlerComServer","object.process.parent.fullpath":"c:\\windows\\system32\\wuauclt.exe","object.process.parent.guid":"00247c92-09fe-5f86-0000-001051841401","object.process.parent.id":"1716","object.process.parent.name":"wuauclt.exe","object.process.parent.path":"c:\\windows\\system32\\","object.process.path":"c:\\windows\\system32\\","object.process.version":"10.0.18362.449 (WinBuild.160101.0800)","status":"success","subject":"account","subject.account.domain":"laptop-ju4m3i0e","subject.account.id":"synthetic:bouss@laptop-ju4m3i0e","subject.account.name":"bouss","subject.account.privileges":"Medium","subject.account.session_id":"456793"}
Original file line number Diff line number Diff line change
@@ -1 +1 @@
expect 1 {"action": "start", "alert.context": "C:\\Windows\\system32\\svchost.exe -k DcomLaunch -> C:\\Windows\\System32\\mshta.exe -Embedding", "alert.key": "c:\\windows\\system32\\svchost.exe -k dcomlaunch|c:\\windows\\system32\\mshta.exe -embedding|description:microsoft (r) html application host | product:internet explorer | company:microsoft corporation", "category.generic": "Attack", "category.high": "Lateral Movement", "category.low": "Remote Services: Distributed Component Object Model", "correlation_name": "Detect_MSHTA_LethalHTA", "correlation_type": "incident", "count": 1, "dst.host": "10.0.2.17", "dst.ip": "10.0.2.17", "dst.port": 55683, "event_src.category": "Other", "event_src.fqdn": "iewin7", "event_src.host": "iewin7", "event_src.hostname": "iewin7", "event_src.subsys": "Microsoft-Windows-Sysmon/Operational", "event_src.title": "sysmon", "event_src.vendor": "microsoft", "generator.type": "correlationengine", "generator.version": "26.0.3002 (libservice v.2.0.787)", "importance": "medium", "incident.aggregation.key": "Detect_MSHTA_LethalHTA|iewin7", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "medium", "normalized": true, "object": "process", "object.account.domain": "iewin7", "object.account.id": "synthetic:ieuser@iewin7", "object.account.name": "ieuser", "object.account.session_id": "1077454", "object.process.cmdline": "C:\\Windows\\System32\\mshta.exe -Embedding", "object.process.cwd": "C:\\Windows\\system32\\", "object.process.fullpath": "c:\\windows\\system32\\mshta.exe", "object.process.guid": "365abb72-19e0-5cda-0000-001006711000", "object.process.id": "1932", "object.process.meta": "Description:Microsoft (R) HTML Application host | Product:Internet Explorer | Company:Microsoft Corporation", "object.process.name": "mshta.exe", "object.process.parent.cmdline": "C:\\Windows\\system32\\svchost.exe -k DcomLaunch", "object.process.parent.fullpath": "c:\\windows\\system32\\svchost.exe", "object.process.parent.guid": "365abb72-965e-5cda-0000-0010af760000", "object.process.parent.id": "596", "object.process.parent.name": "svchost.exe", "object.process.parent.path": "c:\\windows\\system32\\", "object.process.path": "c:\\windows\\system32\\", "object.process.version": "11.00.9600.16428 (winblue_gdr.131013-1700)", "src.host": "iewin7", "src.ip": "10.0.2.16", "src.port": 49168, "status": "success", "subject": "account", "subject.account.domain": "iewin7", "subject.account.id": "synthetic:ieuser@iewin7", "subject.account.name": "ieuser", "subject.account.privileges": "High", "subject.account.session_id": "1077454", "time": "2019-05-14T01:29:04.293Z"}
expect 1 {"action": "start", "alert.context": "C:\\Windows\\system32\\svchost.exe -k DcomLaunch -> C:\\Windows\\System32\\mshta.exe -Embedding", "alert.key": "c:\\windows\\system32\\svchost.exe -k dcomlaunch|c:\\windows\\system32\\mshta.exe -embedding|description:microsoft (r) html application host | product:internet explorer | company:microsoft corporation", "category.generic": "Attack", "category.high": "Lateral Movement", "category.low": "Remote Services: Distributed Component Object Model", "correlation_name": "Detect_MSHTA_LethalHTA", "correlation_type": "incident", "count": 1, "dst.host": "10.0.2.17", "dst.ip": "10.0.2.17", "dst.port": 55683, "event_src.category": "Other", "event_src.fqdn": "iewin7", "event_src.host": "iewin7", "event_src.hostname": "iewin7", "event_src.subsys": "Microsoft-Windows-Sysmon/Operational", "event_src.title": "sysmon", "event_src.vendor": "microsoft", "generator.type": "correlationengine", "importance": "medium", "incident.aggregation.key": "Detect_MSHTA_LethalHTA|iewin7", "incident.aggregation.timeout": 7200, "incident.category": "Undefined", "incident.severity": "medium", "normalized": true, "object": "process", "object.account.domain": "iewin7", "object.account.id": "synthetic:ieuser@iewin7", "object.account.name": "ieuser", "object.account.session_id": "1077454", "object.process.cmdline": "C:\\Windows\\System32\\mshta.exe -Embedding", "object.process.cwd": "C:\\Windows\\system32\\", "object.process.fullpath": "c:\\windows\\system32\\mshta.exe", "object.process.guid": "365abb72-19e0-5cda-0000-001006711000", "object.process.id": "1932", "object.process.meta": "Description:Microsoft (R) HTML Application host | Product:Internet Explorer | Company:Microsoft Corporation", "object.process.name": "mshta.exe", "object.process.parent.cmdline": "C:\\Windows\\system32\\svchost.exe -k DcomLaunch", "object.process.parent.fullpath": "c:\\windows\\system32\\svchost.exe", "object.process.parent.guid": "365abb72-965e-5cda-0000-0010af760000", "object.process.parent.id": "596", "object.process.parent.name": "svchost.exe", "object.process.parent.path": "c:\\windows\\system32\\", "object.process.path": "c:\\windows\\system32\\", "object.process.version": "11.00.9600.16428 (winblue_gdr.131013-1700)", "src.host": "iewin7", "src.ip": "10.0.2.16", "src.port": 49168, "status": "success", "subject": "account", "subject.account.domain": "iewin7", "subject.account.id": "synthetic:ieuser@iewin7", "subject.account.name": "ieuser", "subject.account.privileges": "High", "subject.account.session_id": "1077454", "time": "2019-05-14T01:29:04.293Z"}
Loading

0 comments on commit 1588f6f

Please sign in to comment.