Skip to content

Commit ed789f5

Browse files
authored
Merge PR #4853 from @nasbench - Add some cosmetic changes and small updates
update: Potentially Suspicious Execution Of PDQDeployRunner - Add additional processes to the list update: Use Icacls to Hide File to Everyone - Remove "C:\Users" to increase coverage
1 parent 2837671 commit ed789f5

5 files changed

+32
-29
lines changed

rules/windows/process_creation/proc_creation_win_attrib_system.yml rules-threat-hunting/windows/process_creation/proc_creation_win_attrib_system.yml

+1
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ modified: 2023/03/14
1515
tags:
1616
- attack.defense_evasion
1717
- attack.t1564.001
18+
- detection.threat_hunting
1819
logsource:
1920
category: process_creation
2021
product: windows

rules/windows/process_creation/proc_creation_win_attrib_hiding_files.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ detection:
2020
- OriginalFileName: 'ATTRIB.EXE'
2121
selection_cli:
2222
CommandLine|contains: ' +h '
23-
filter_msiexec:
23+
filter_main_msiexec:
2424
CommandLine|contains: '\desktop.ini '
25-
filter_intel:
25+
filter_optional_intel:
2626
ParentImage|endswith: '\cmd.exe'
2727
CommandLine: '+R +H +S +A \\\*.cui'
2828
ParentCommandLine: 'C:\\WINDOWS\\system32\\\*.bat'
29-
condition: all of selection_* and not 1 of filter_*
29+
condition: all of selection_* and not 1 of filter_main_* and not 1 of filter_optional_*
3030
falsepositives:
3131
- IgfxCUIService.exe hiding *.cui files via .bat script (attrib.exe a child of cmd.exe and igfxCUIService.exe is the parent of the cmd.exe)
3232
- Msiexec.exe hiding desktop.ini

rules/windows/process_creation/proc_creation_win_attrib_system_susp_paths.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ detection:
4242
- '.ps1'
4343
- '.vbe'
4444
- '.vbs'
45-
filter:
45+
filter_optional_installer:
4646
CommandLine|contains|all:
4747
- '\Windows\TEMP\'
4848
- '.exe'
49-
condition: all of selection* and not filter
49+
condition: all of selection* and not 1 of filter_optional_*
5050
falsepositives:
5151
- Unknown
5252
level: high

rules/windows/process_creation/proc_creation_win_icacls_deny.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ references:
66
- https://app.any.run/tasks/1df999e6-1cb8-45e3-8b61-499d1b7d5a9b/
77
author: frack113
88
date: 2022/07/18
9+
modified: 2024/04/29
910
tags:
1011
- attack.defense_evasion
1112
- attack.t1564.001
@@ -18,10 +19,9 @@ detection:
1819
- Image|endswith: '\icacls.exe'
1920
selection_cmd: # icacls "C:\Users\admin\AppData\Local\37f92fe8-bcf0-4ee0-b8ba-561f797f5696" /deny *S-1-1-0:(OI)(CI)(DE,DC)
2021
CommandLine|contains|all:
21-
- 'C:\Users\'
2222
- '/deny'
2323
- '*S-1-1-0:'
24-
condition: all of selection*
24+
condition: all of selection_*
2525
falsepositives:
26-
- Legitimate use
26+
- Unknown
2727
level: medium

rules/windows/process_creation/proc_creation_win_pdqdeploy_runner_susp_children.yml

+23-21
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
title: Suspicious Execution Of PDQDeployRunner
1+
title: Potentially Suspicious Execution Of PDQDeployRunner
22
id: 12b8e9f5-96b2-41e1-9a42-8c6779a5c184
33
related:
44
- id: d679950c-abb7-43a6-80fb-2a480c4fc450
@@ -9,46 +9,48 @@ references:
99
- https://twitter.com/malmoeb/status/1550483085472432128
1010
author: Nasreddine Bencherchali (Nextron Systems)
1111
date: 2022/07/22
12+
modified: 2024/05/02
1213
tags:
1314
- attack.execution
1415
logsource:
1516
category: process_creation
1617
product: windows
1718
detection:
1819
selection_parent:
19-
ParentImage|contains: 'PDQDeployRunner-'
20-
selection_susp:
20+
ParentImage|contains: '\PDQDeployRunner-'
21+
selection_child:
2122
# Improve this section by adding other suspicious processes, commandlines or paths
2223
- Image|endswith:
2324
# If you use any of the following processes legitimately comment them out
24-
- '\wscript.exe'
25-
- '\cscript.exe'
26-
- '\rundll32.exe'
27-
- '\regsvr32.exe'
28-
- '\wmic.exe'
29-
- '\msiexec.exe'
30-
- '\mshta.exe'
25+
- '\bash.exe'
26+
- '\certutil.exe'
27+
- '\cmd.exe'
3128
- '\csc.exe'
29+
- '\cscript.exe'
3230
- '\dllhost.exe'
33-
- '\certutil.exe'
31+
- '\mshta.exe'
32+
- '\msiexec.exe'
33+
- '\regsvr32.exe'
34+
- '\rundll32.exe'
3435
- '\scriptrunner.exe'
35-
- '\bash.exe'
36+
- '\wmic.exe'
37+
- '\wscript.exe'
3638
- '\wsl.exe'
3739
- Image|contains:
38-
- 'C:\Users\Public\'
39-
- 'C:\ProgramData\'
40-
- 'C:\Windows\TEMP\'
40+
- ':\ProgramData\'
41+
- ':\Users\Public\'
42+
- ':\Windows\TEMP\'
4143
- '\AppData\Local\Temp'
4244
- CommandLine|contains:
43-
- 'iex '
44-
- 'Invoke-'
45-
- 'DownloadString'
46-
- 'http'
45+
- ' -decode '
4746
- ' -enc '
4847
- ' -encodedcommand '
49-
- 'FromBase64String'
50-
- ' -decode '
5148
- ' -w hidden'
49+
- 'DownloadString'
50+
- 'FromBase64String'
51+
- 'http'
52+
- 'iex '
53+
- 'Invoke-'
5254
condition: all of selection_*
5355
falsepositives:
5456
- Legitimate use of the PDQDeploy tool to execute these commands

0 commit comments

Comments
 (0)