Skip to content

Commit

Permalink
crypto_campaign
Browse files Browse the repository at this point in the history
  • Loading branch information
tccontre committed Dec 17, 2024
1 parent 95be36e commit 3db1a7e
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@ date: '2024-12-12'
author: Teoderick Contreras, Splunk
data_sources:
- Sysmon Event ID 11
type: TTP
type: Anomaly
status: production
description: The following analytic detects the creation of RAR Self-Extracting (SFX) files by monitoring the generation of file related to rar sfx installation. This method leverages a heuristic to identify RAR SFX archives based on specific markers that indicate a combination of executable code and compressed RAR data. By tracking such activity, the analytic helps pinpoint potentially unauthorized or suspicious file creation events, which are often associated with malware packaging or data exfiltration. Legitimate usage may include custom installers or compressed file delivery.
description: The following analytic detects the creation of RAR Self-Extracting (SFX) files by monitoring the generation of file related to rar sfx .tmp file creation during sfx installation. This method leverages a heuristic to identify RAR SFX archives based on specific markers that indicate a combination of executable code and compressed RAR data. By tracking such activity, the analytic helps pinpoint potentially unauthorized or suspicious file creation events, which are often associated with malware packaging or data exfiltration. Legitimate usage may include custom installers or compressed file delivery.
kind: endpoint
search: '`sysmon` EventCode=11 Image="*.exe" TargetFilename IN ("*__tmp_rar_sfx_access_check*")
| stats count min(_time) as firstTime max(_time) as lastTime by Image TargetFilename Computer
Expand Down
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
name: 'Windows Account Access Removal via Quser LogOff'
name: 'Windows Powershell Logoff User via Quser'
id: 6d70780d-4cfe-4820-bafd-1b43941986b5
version: 1
date: '2024-12-12'
author: Teoderick Contreras, Splunk
data_sources:
- Powershell Script Block Logging 4104
type: TTP
type: Anomaly
status: production
description: The following analytic detects the process of logging off a user through the use of the quser and logoff commands. By monitoring for these commands, the analytic identifies actions where a user session is forcibly terminated, which could be part of an administrative task or a potentially unauthorized access attempt. This detection helps identify potential misuse or malicious activity where a user’s access is revoked without proper authorization, providing insight into potential security incidents involving account management or session manipulation.
kind: endpoint
search: '`powershell` EventCode=4104 ScriptBlockText = "*quser*" ScriptBlockText = "*logoff*"
search: '`powershell` EventCode=4104 ScriptBlockText = "*quser*logoff*"
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText UserID Computer
| rename Computer as dest, UserID as user
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_account_access_removal_via_quser_logoff_filter`'
| `windows_powershell_logoff_user_via_quser_filter`'
how_to_implement: The following Hunting analytic requires PowerShell operational logs to be imported. Modify the powershell macro as needed to match the sourcetype or add index. This analytic is specific to 4104, or PowerShell Script Block Logging.
known_false_positives: Administrators or power users may use this command.
references:
Expand All @@ -32,11 +32,13 @@ tags:
analytic_story:
- Crypto Stealer
asset_type: Endpoint
confidence: 70
impact: 70
confidence: 30
impact: 30
message: Powershell process having commandline [$ScriptBlockText$] used to logoff user on [$dest$].
mitre_attack_id:
- T1531
- T1059.001
- T1059
observable:
- name: dest
type: Hostname
Expand All @@ -56,7 +58,7 @@ tags:
- Message
- dest
- user
risk_score: 49
risk_score: 9
security_domain: endpoint
tests:
- name: True Positive Test
Expand Down

0 comments on commit 3db1a7e

Please sign in to comment.