-
Notifications
You must be signed in to change notification settings - Fork 418
secret_blizzard #3644
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
secret_blizzard #3644
Conversation
detections/endpoint/windows_certutil_certificate_addition_in_temp_path.yml
Outdated
Show resolved
Hide resolved
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime values(Processes.process) | ||
as process max(_time) as lastTime from datamodel=Endpoint.Processes | ||
where `process_certutil` Processes.process=*-addstore* Processes.process=*root* |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is also covered by Attempt To Add Certificate To Untrusted Store
. If you say that the store name root
is unique and must be monitored then you can add this analytic but you have to take care of the description and explaining why it is important to monitor it.
detections/endpoint/windows_firewallapi_dll_load_from_unusual_path.yml
Outdated
Show resolved
Hide resolved
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry | ||
WHERE (Registry.registry_value_name= "Category" Registry.registry_path = "*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkList\\Profiles*") Registry.registry_value_data = 0x00000000 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we know if the adversary used reg or PowerShell in this case? Because perhaps the default behavior of this is that svchost make that change but an attacker might use a tool.
Of course a GUI could still be used but just thinking out loud to try and make this more accurate.
Perhaps a VT search for this registry change would bring good results.
Co-authored-by: Nasreddine Bencherchali <[email protected]>
New
analytic story
What does this PR have in it? Screenshots are worth 1000 words 😄
Checklist
<platform>_<mitre att&ck technique>_<short description>
nomenclatureNotes For Submitters and Reviewers
build
CI job when it fails will likely show an error about what is failing. You may have a very descriptive error of the specific field(s) in the specific file(s) that is causing an issue. In some cases, its also possible there is an issue with the YAML. Many of these can be caught with the pre-commit hooks if you set them up. These errors will be less descriptive as to what exactly is wrong, but will give you a column and row position in a specific file where the YAML processing breaks. If you're having trouble with this, feel free to add a comment to your PR tagging one of the maintainers and we'll be happy to help troubleshoot it.