Skip to content

Commit 2bfb093

Browse files
Merge PR #5177 from @nasbench - promote older rules status from experimental to test
chore: promote older rules status from `experimental` to `test` Co-authored-by: nasbench <nasbench@users.noreply.github.com>
1 parent 1d8c843 commit 2bfb093

File tree

58 files changed

+58
-58
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+58
-58
lines changed

rules-emerging-threats/2024/Exploits/CVE-2024-1212/web_exploit_cve_2024_1212_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection
22
id: eafb8bd5-7605-4bfe-a9ec-0442bc151f15
3-
status: experimental
3+
status: test
44
description: |
55
Detects potential exploitation of CVE-2024-1709 an unauthenticated command injection in Progress Kemp LoadMaster.
66
It looks for GET requests to '/access/set' API with the parameters 'param=enableapi' and 'value=1' as well as an "Authorization" header with a base64 encoded value with an uncommon character.

rules-emerging-threats/2024/Malware/KamiKakaBot/proc_creation_win_malware_kamikakabot_lnk_lure_execution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential KamiKakaBot Activity - Lure Document Execution
22
id: 24474469-bd80-46cc-9e08-9fbe81bfaaca
3-
status: experimental
3+
status: test
44
description: |
55
Detects the execution of a Word document via the WinWord Start Menu shortcut.
66
This behavior was observed being used by KamiKakaBot samples in order to initiate the 2nd stage of the infection.

rules-emerging-threats/2024/Malware/KamiKakaBot/proc_creation_win_malware_kamikakabot_schtasks_persistence.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential KamiKakaBot Activity - Shutdown Schedule Task Creation
22
id: fe9e8ba9-4419-41e6-a574-bd9f7b3af961
3-
status: experimental
3+
status: test
44
description: |
55
Detects the creation of a schedule task that runs weekly and execute the "shutdown /l /f" command.
66
This behavior was observed being used by KamiKakaBot samples in order to achieve persistence on a system.

rules-emerging-threats/2024/Malware/KamiKakaBot/registry_set_malware_kamikakabot_winlogon_persistence.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential KamiKakaBot Activity - Winlogon Shell Persistence
22
id: c9b86500-1ec2-4de6-9120-d744c8fb5caf
3-
status: experimental
3+
status: test
44
description: |
55
Detects changes to the "Winlogon" registry key where a process will set the value of the "Shell" to a value that was observed being used by KamiKakaBot samples in order to achieve persistence.
66
references:

rules-threat-hunting/windows/network_connection/net_connection_win_dfsvc_non_local_ip.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Dfsvc.EXE Network Connection To Non-Local IPs
22
id: 3c21219b-49b5-4268-bce6-c914ed50f09c
3-
status: experimental
3+
status: test
44
description: Detects network connections from "dfsvc.exe" used to handled ClickOnce applications to non-local IPs
55
references:
66
- https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5

rules-threat-hunting/windows/network_connection/net_connection_win_powershell_network_connection.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Network Connection Initiated By PowerShell Process
22
id: 1f21ec3f-810d-4b0e-8045-322202e22b4b
3-
status: experimental
3+
status: test
44
description: |
55
Detects a network connection that was initiated from a PowerShell process.
66
Often times malicious powershell scripts download additional payloads or communicate back to command and control channels via uncommon ports or IPs.

rules-threat-hunting/windows/registry/registry_set/registry_set_service_image_path_user_controlled_folder.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 277dc340-0540-42e7-8efb-5ff460045e07
33
related:
44
- id: 277dc340-0540-42e7-8efb-5ff460045e07
55
type: obsolete
6-
status: experimental
6+
status: test
77
description: |
88
Detects the setting of the "ImagePath" value of a service registry key to a path controlled by a non-administrator user such as "\AppData\" or "\ProgramData\".
99
Attackers often use such directories for staging purposes.

rules/application/kubernetes/audit/kubernetes_audit_deployment_deleted.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Deployment Deleted From Kubernetes Cluster
22
id: 40967487-139b-4811-81d9-c9767a92aa5a
3-
status: experimental
3+
status: test
44
description: |
55
Detects the removal of a deployment from a Kubernetes cluster.
66
This could indicate disruptive activity aiming to impact business operations.

rules/application/kubernetes/audit/kubernetes_audit_events_deleted.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 3132570d-cab2-4561-9ea6-1743644b2290
33
related:
44
- id: 225d8b09-e714-479c-a0e4-55e6f29adf35
55
type: derived
6-
status: experimental
6+
status: test
77
description: |
88
Detects when events are deleted in Kubernetes.
99
An adversary may delete Kubernetes events in an attempt to evade detection.

rules/application/kubernetes/audit/kubernetes_audit_exec_into_container.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential Remote Command Execution In Pod Container
22
id: a1b0ca4e-7835-413e-8471-3ff2b8a66be6
3-
status: experimental
3+
status: test
44
description: |
55
Detects attempts to execute remote commands, within a Pod's container using e.g. the "kubectl exec" command.
66
references:

0 commit comments

Comments
 (0)