Skip to content

Add rule to detect makecab staging of LOLBins #5254

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

alexegorov1
Copy link

Summary of the Pull Request

Adds a new Sigma rule for detecting makecab.exe usage to stage known LOLBins (regsvr32.exe, rundll32.exe, mshta.exe, certreq.exe). This behavior was previously uncovered by existing rules. The rule was field-tested with Chainsaw against real-world Sysmon logs and tuned for reliability: zero false positives in clean baselines, strong signal in known attack traces. YAML schema, field names, and detection logic follow current project conventions. Happy to adjust structure or placement based on team feedback.

Changelog

new: Suspicious Makecab Usage Against Known LOLBins

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

Adds a new Sigma rule for detecting makecab.exe usage to stage known LOLBins (regsvr32.exe, rundll32.exe, mshta.exe, certreq.exe). This behavior was previously uncovered by existing rules.
The rule was field-tested with Chainsaw against real-world Sysmon logs and tuned for reliability: zero false positives in clean baselines, strong signal in known attack traces. YAML schema, field names, and detection logic follow current project conventions.
Happy to adjust structure or placement based on team feedback.
@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Apr 4, 2025
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @alexegorov1 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant