added several rules
This commit is contained in:
98
spl.md
98
spl.md
@ -128,4 +128,102 @@ index=* sourcetype=wineventlog OR sourcetype=sysmon
|
||||
| stats count by Hostname, User, CommandLine, Parent_Process_Name, Image
|
||||
| rename CommandLine as "Command Line", Parent_Process_Name as "Parent Process", Image as "Executable", User as "Executing User"
|
||||
| sort -count
|
||||
```
|
||||
|
||||
#20250417 dj
|
||||
mspaint Strange Process Spawn
|
||||
```
|
||||
index=win_sysmon EventCode=10 ParentUser="NT AUTHORITY\\SYSTEM" process_name=*
|
||||
| stats count by _time, ParentUser, ParentImage, process_name, EventCode
|
||||
| where ParentImage!="C:\\Windows\\explorer.exe" AND ParentImage!="C:\\Windows\\System32\\cmd.exe"
|
||||
| rename process_name as ProcessName
|
||||
| table _time, ParentUser, ParentImage, ProcessName, EventCode
|
||||
```
|
||||
|
||||
#20250417 wip yaml
|
||||
|
||||
```
|
||||
title: Detect VARGEIT Malware Execution
|
||||
id: f1234567-89ab-cdef-0123-456789abcdef
|
||||
description: Detects potential execution patterns of the VARGEIT backdoor, including DLL sideloading, process injection into mspaint.exe, and network activity linked to Earth Alux operations.
|
||||
author: YourName
|
||||
references:
|
||||
- https://www.trendmicro.com/en_us/research/25/c/the-espionage-toolkit-of-earth-alux.html
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
Image|endswith:
|
||||
- "\mspaint.exe" # VARGEIT injects payloads into mspaint.exe
|
||||
ParentImage|endswith:
|
||||
- "\rundll32.exe" # DLL sideloading through rundll32
|
||||
condition: selection
|
||||
fields:
|
||||
- Image
|
||||
- ParentImage
|
||||
- CommandLine
|
||||
- User
|
||||
level: high
|
||||
```
|
||||
|
||||
**sigma rule for sus graph api usage by non-outlook process**
|
||||
```
|
||||
title: Suspicious ICMP Activity from mspaint.exe
|
||||
id: abcdef12-3456-7890-abcd-ef1234567890
|
||||
status: experimental
|
||||
description: |
|
||||
Detects Sysmon network events (EventID 3) where the process image is mspaint.exe
|
||||
and the protocol used is ICMP, which is unusual for the MS Paint process.
|
||||
author: Your Name
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 3
|
||||
Image|endswith: "\mspaint.exe"
|
||||
Protocol: ICMP
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Rare legitimate diagnostic tools or scanning software
|
||||
level: high
|
||||
```
|
||||
|
||||
|
||||
**sigma sus icmp activity from mspaint**
|
||||
```
|
||||
title: Suspicious ICMP Activity from mspaint.exe
|
||||
id: abcdef12-3456-7890-abcd-ef1234567890
|
||||
status: experimental
|
||||
description: |
|
||||
Detects Sysmon network events (EventID 3) where the process image is mspaint.exe
|
||||
and the protocol used is ICMP, which is unusual for the MS Paint process.
|
||||
author: Your Name
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 3
|
||||
Image|endswith: "\mspaint.exe"
|
||||
Protocol: ICMP
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Rare legitimate diagnostic tools or scanning software
|
||||
level: high
|
||||
```
|
||||
|
||||
#suricata wip
|
||||
```
|
||||
alert http any any -> any any (
|
||||
msg:"Earth Alux - Potential Godzilla web shell indicator observed in HTTP payload";
|
||||
flow:to_server,established;
|
||||
content:"Godzilla";
|
||||
nocase;
|
||||
http_client_body;
|
||||
classtype:trojan-activity;
|
||||
sid:1000002;
|
||||
rev:1;
|
||||
)
|
||||
```
|
Reference in New Issue
Block a user