Skip to content

Create proc_creation_win_code_devtunnel_tunneling.yaml #5004

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 14 commits into
base: master
Choose a base branch
from

Conversation

0xAnalyst
Copy link

Summary of the Pull Request

Changelog

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Sep 9, 2024
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @0xAnalyst 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

@0xAnalyst
Copy link
Author

@frack113 Thank you I commited the changes. this is my first sigma rule so your help is much appreciated

@nasbench nasbench closed this Sep 11, 2024
@nasbench nasbench reopened this Sep 11, 2024
@0xAnalyst
Copy link
Author

0xAnalyst commented Sep 12, 2024

@frack113
Copy link
Member

ProcessVersionInfoProductName

In the sysmon event (but not in the windows 4688) you have:

  • Description
  • Product
  • Company
  • OriginalFileName

Can be somethink like this

    selection_exe:
        - Image|endswith:
            - '\code.exe'
            - '\devtunnel.exe'
        - OriginalFileName:
            - 'code.exe' ???
            - 'devtunnel.exe' ???
    selection_cli_tunel:
        CommandLine|contains: 'tunnel'
    selection_cli_temporary:
    selection_cli_persistent:
    condition: selection_exe and 1 of selection_cli_*

@0xAnalyst
Copy link
Author

0xAnalyst commented Sep 15, 2024

ProcessVersionInfoProductName

In the sysmon event (but not in the windows 4688) you have:

  • Description
  • Product
  • Company
  • OriginalFileName

Can be somethink like this

    selection_exe:
        - Image|endswith:
            - '\code.exe'
            - '\devtunnel.exe'
        - OriginalFileName:
            - 'code.exe' ???
            - 'devtunnel.exe' ???
    selection_cli_tunel:
        CommandLine|contains: 'tunnel'
    selection_cli_temporary:
    selection_cli_persistent:
    condition: selection_exe and 1 of selection_cli_*

I changed it to reflect windows event logs now with Image so all should be ok now

|  selection_cli:
        Image|endswith: 'code.exe'
        CommandLine|contains: 'tunnel'
    selection_temporary:
        CommandLine|contains|all:
            - 'host'
            - 'allow-anonymous'
    selection_persistent:
        CommandLine|contains|all:
            - 'port'
            - 'create'
            - '-p'

0xAnalyst and others added 2 commits September 15, 2024 11:15
@frack113
Copy link
Member

Sorry,
As the file extension was yaml not yml , some validation workflows were not used.

@frack113 frack113 added the Work In Progress Some changes are needed label Sep 15, 2024
Copy link
Member

@frack113 frack113 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@frack113 frack113 added 2nd Review Needed PR need a second approval and removed Work In Progress Some changes are needed labels Sep 15, 2024
@frack113 frack113 requested a review from nasbench September 15, 2024 12:21
@nasbench nasbench added the Work In Progress Some changes are needed label Sep 18, 2024
@0xAnalyst
Copy link
Author

Can this get merged?

@nasbench
Copy link
Member

Can this get merged?

Are you in a rush or something?

@0xAnalyst
Copy link
Author

Can this get merged?

Are you in a rush or something?

hahhaha nope all good

@0xAnalyst
Copy link
Author

0xAnalyst commented Apr 13, 2025

I think I am unable to create pull request can you help me add this new sigma rule

https://github.com/0xAnalyst/sigma/blob/master/rules/windows/network_connection/net_connection_win_domain_Bublup.yml

@nasbench @frack113
title: Potential Data Exfiltration to Bublup.com
id: 61b9d488-49f6-44e5-a9fa-d0a4dfdbfd85
status: experimental
description: Detects network connections to bublup.com, a legitimate cloud storage platform abused by threat actors (e.g., BlackSuit ransomware) for data exfiltration.
references:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2nd Review Needed PR need a second approval Rules Windows Pull request add/update windows related rules Work In Progress Some changes are needed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants