Add this suggestion to a batch that can be applied as a single commit. This suggestion is invalid because no changes were made to the code. Suggestions cannot be applied while the pull request is closed. Suggestions cannot be applied while viewing a subset of changes. Only one suggestion per line can be applied in a batch. Add this suggestion to a batch that can be applied as a single commit. Applying suggestions on deleted lines is not supported. You must change the existing code in this line in order to create a valid suggestion. Outdated suggestions cannot be applied. This suggestion has been applied or marked resolved. Suggestions cannot be applied from pending reviews. Suggestions cannot be applied on multi-line comments. Suggestions cannot be applied while the pull request is queued to merge. Suggestion cannot be applied right now. Please check back later.
This PR fixes the following issues
messagefield reference for linux_service_started_or_enabled #3714It also updates/adds these rules
Deprecate
Detect Rundll32 Application Control Bypass - advpack,Detect Rundll32 Application Control Bypass - setupapiandDetect Rundll32 Application Control Bypass - syssetupin favor of a unified ruleWindows Application Whitelisting Bypass Attempt via Rundll32since they are all related. - cc @MHaggisDeprecate
Windows Change Default File Association For No File Extand replace it byWindows Change File Association Command To Notepad. The reason is that the original rule was incorrectly looking file without extensions, but in reality the TTP is a TA after encrypting files with a certain extensions (in this case.encthey add a handler for that extensions to open all files with notepad and the ransom note). cc @t-contrerasUpdates
Add or Set Windows Defender Exclusionwith additional flags, namelyControlledFolderAccessAllowedApplicationsandAttackSurfaceReductionOnlyExclusionsReduce the
Attempt To Add Certificate To Untrusted Storeanalytic to anAnomalybecause this is found to be common by some installers.Fix the regex in
Common Ransomware Extensionsto account for double extension files.Updated
Linux Java Spawning ShellandWindows Java Spawning Shellsby removingapacheandw3wp.exerespectively as they are unrelated to those rules. I did createWeb or Application Server Spawning a Shellas a generic rule covering both linux and windows instances with a lot more web server and app server names.Updated
USN Journal Deletionin order to filter for the deletion keyword at the search level not after the results for better performance.Updated
Windows Archived Collected Data In TEMP Folderto used specific folders instead of just\\temp\\to avoid accidental FPs. As well as reducing it to an Anomaly rule since I found multiple cases where a match was found.Updated
Windows AutoIt3 Execution- Added an OFN field and removed the overlap of the string.Updated
Windows Certutil Root Certificate Additionby focusing on specific paths in order to avoid FPs. Since installers were found doing this as per elastic rule and VT results.Added the
--output-dirflag to the ruleWindows Curl Download to Suspicious PathUpdated
Windows Information Discovery Fsutilwith additional flags, namely thevolumesub-command that allows the discovery of disk information and was used by a TA before.Added
pwsh.exeas a possible value toWindows Remote Management Execute ShellEnhanced
Windows Renamed Powershell Executionby adding OFN fields,powershell_ise.exeand split the logic to be more accurate.Split the string logic in
Windows Rundll32 Apply User Settings Changesto be more generic and avoid easy bypass using spaces.Updated
Windows Scheduled Task Created Via XMLwith additional flags and OFN field as well as updated the different metadata sections.Added new analytic
Windows Symlink Evaluation Change via Fsutil