-
Notifications
You must be signed in to change notification settings - Fork 387
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #3257 from nterl0k/nterl0k-t1219-rmm-update-2
Nterl0k - T1219 - RMM Detection for Registry locations.
- Loading branch information
Showing
9 changed files
with
186 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
name: GitHub | ||
id: 66d95ea9-c0c5-4aa7-86f2-76e242fcd802 | ||
version: 1 | ||
date: '2025-01-14' | ||
author: Patrick Bareiss, Splunk | ||
status: production | ||
type: Anomaly | ||
description: The following analytic detects | ||
data_source: | ||
- GitHub | ||
search: '`github_enterprise` | ||
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | ||
| `github_actions_disable_security_workflow_filter`' | ||
how_to_implement: You must ingest GitHub Enterprise logs using the Splunk Add-on for GitHub https://splunkbase.splunk.com/app/6254 . | ||
known_false_positives: unknown | ||
references: | ||
- https://www.googlecloudcommunity.com/gc/Community-Blog/Monitoring-for-Suspicious-GitHub-Activity-with-Google-Security/ba-p/763610 | ||
drilldown_searches: | ||
- name: View the detection results for - "$user$" | ||
search: '%original_detection_search% | search user = "$user$"' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: View risk events for the last 7 days for - "$user$" | ||
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
tags: | ||
analytic_story: | ||
- GitHub Malicious Activity | ||
asset_type: GitHub | ||
confidence: 90 | ||
impact: 30 | ||
message: Security Workflow is disabled in branch $branch$ for repository $repository$ | ||
mitre_attack_id: | ||
- T1195.002 | ||
- T1195 | ||
observable: | ||
- name: user | ||
type: User | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- user | ||
risk_score: 27 | ||
security_domain: network | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1195.002/github_actions_disable_security_workflow/github_actions_disable_security_workflow.log | ||
source: github | ||
sourcetype: aws:firehose:json |
92 changes: 92 additions & 0 deletions
92
detections/endpoint/detect_remote_access_software_usage_registry.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,92 @@ | ||
name: Detect Remote Access Software Usage Registry | ||
id: 33804986-25dd-43cf-bb6b-dc14956c7cbc | ||
version: 1 | ||
date: '2024-11-21' | ||
author: Steven Dick | ||
status: production | ||
type: Anomaly | ||
description: The following analytic detects when a known remote access software is added to common persistence locations on a device within the environment. Adversaries use these utilities to retain remote access capabilities to the environment. Utilities in the lookup include AnyDesk, GoToMyPC, LogMeIn, TeamViewer and much more. Review the lookup for the entire list and add any others. | ||
data_source: | ||
- Sysmon EventID 12 | ||
- Sysmon EventID 13 | ||
search: '| tstats `security_content_summariesonly` latest(Registry.process_guid) as process_guid count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry where (Registry.registry_path="*\\Microsoft\\Windows\\CurrentVersion\\Run*" OR (Registry.registry_path="*\\SYSTEM\\CurrentControlSet\\Services\\*" AND Registry.registry_value_name="ImagePath")) by Registry.dest Registry.user Registry.registry_path Registry.registry_value_name Registry.registry_value_data Registry.registry_key_name | ||
| `drop_dm_object_name(Registry)` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| rex field=registry_value_data "(\")?.+\\\(?<file_name_1>[^\"=]+\.[^\" ]{1,5})(\")?" | ||
| rex field=registry_value_data "(?<file_name_2>[^\.]+\.[^\" ]{1,5}$)" | ||
| eval file_name = coalesce(file_name_1,file_name_2) | ||
| lookup remote_access_software remote_utility AS file_name OUTPUT isutility, description as signature, comment_reference as desc, category | ||
| search isutility = TRUE | ||
| `remote_access_software_usage_exceptions` | ||
| `detect_remote_access_software_usage_registry_filter`' | ||
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the file path, file name, and the user that created the file. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Registry` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process. The "exceptions" macro leverages both an Assets and Identities lookup, as well as a KVStore collection called "remote_software_exceptions" that lets you track and maintain device-based exceptions for this set of detections. | ||
known_false_positives: Known or approved applications used by the organization or usage of built-in functions. Known false positives can be added to the remote_access_software_usage_exception.csv lookup to globally suppress these situations across all remote access content | ||
references: | ||
- https://attack.mitre.org/techniques/T1219/ | ||
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/ | ||
- https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/ | ||
drilldown_searches: | ||
- name: View the detection results for - "$dest$" and "$user$" | ||
search: '%original_detection_search% | search dest = "$dest$" user = "$user$"' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: View risk events for the last 7 days for - "$dest$" and "$user$" | ||
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$","$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
- name: Investigate registry changes on $dest$ | ||
search: '| from datamodel:Endpoint.Registry| search dest=$dest$ registry_path=$registry_path$' | ||
earliest_offset: $info_min_time$ | ||
latest_offset: $info_max_time$ | ||
tags: | ||
analytic_story: | ||
- Insider Threat | ||
- Command And Control | ||
- Ransomware | ||
- Gozi Malware | ||
- CISA AA24-241A | ||
asset_type: Endpoint | ||
confidence: 50 | ||
impact: 50 | ||
message: A process for a known remote access software [$signature$] was detected on $dest$ | ||
mitre_attack_id: | ||
- T1219 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
- name: user | ||
type: User | ||
role: | ||
- Victim | ||
- name: registry_path | ||
type: Other | ||
role: | ||
- Attacker | ||
- name: signature | ||
type: Other | ||
role: | ||
- Attacker | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- _time | ||
- Registry.dest | ||
- Registry.user | ||
- Registry.registry_path | ||
- Registry.registry_value_name | ||
- Registry.registry_value_data | ||
- Registry.registry_key_name | ||
risk_score: 25 | ||
security_domain: endpoint | ||
manual_test: This detection uses A&I lookups from Enterprise Security. | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1219/screenconnect/screenconnect_sysmon.log | ||
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational | ||
sourcetype: XmlWinEventLog |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
name: GitHub Malicious Activity | ||
id: 9abdd884-909d-46a8-bf11-9fbcd076fac2 | ||
version: 1 | ||
date: '2025-01-14' | ||
author: Patrick Bareiss, Splunk | ||
description: Leverage searches that allow you to detect and investigate suspicious GitHub activities | ||
that might indicate malicious behavior, including pull requests from unknown users, disabled security | ||
workflows, and other potentially harmful repository modifications. These detections help identify | ||
attempts to compromise repositories through unauthorized code changes, bypassed security controls, | ||
and other suspicious actions that could lead to supply chain attacks or data breaches. | ||
narrative: GitHub is a popular platform for developers to collaborate on code and manage projects. | ||
However, it can also be used by malicious actors to conduct various types of attacks, including | ||
supply chain attacks, data breaches, and other malicious activities. | ||
references: | ||
- https://www.googlecloudcommunity.com/gc/Community-Blog/Monitoring-for-Suspicious-GitHub-Activity-with-Google-Security/ba-p/763610 | ||
tags: | ||
category: | ||
- Cloud Security | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
usecase: Security Monitoring | ||
|