Skip to content

Commit 3201382

Browse files
Merge PR #5513 from @swachchhanda000 - fix FPs observed via Aurora
fix: Suspicious Sysmon as Execution Parent - add filter for Sysmon binary running from temp dir fix: Remote Thread Created In Shell Application - modify the logic to filter out legit processes creating remote thread in shell apps fix: Potential Active Directory Reconnaissance/Enumeration Via LDAP - commenting out troublesome LDAP query parameter fix: Rare Remote Thread Creation By Uncommon Source Image - add several FP filter fix: Remote Thread Creation By Uncommon Source Image - add several FP filter fix: ADS Zone.Identifier Deleted By Uncommon Application - filter msedge fix: Remote Thread Creation In Uncommon Target Image - add FP filters for notepad and sethc fix: Potential Binary Or Script Dropper Via PowerShell - add filters for legitimate binary dropped by PowerShell fix: Use Short Name Path in Command Line - add filter for aurora fix: Suspicious Userinit Child Process - filter null Image fix: CurrentVersion NT Autorun Keys Modification - add filter for RuntimeBroker.exe fix: Modification of IE Registry Settings - add filter for RuntimeBroker.exe fix: Scheduled TaskCache Change by Uncommon Program - add filter for RuntimeBroker.exe --------- Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
1 parent 75d03eb commit 3201382

13 files changed

+140
-63
lines changed

rules-emerging-threats/2022/Exploits/CVE-2022-41120/proc_creation_win_exploit_cve_2022_41120_sysmon_eop.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ references:
88
- https://twitter.com/filip_dragovic/status/1590104354727436290
99
author: Florian Roth (Nextron Systems), Tim Shelton (fp werfault)
1010
date: 2022-11-10
11-
modified: 2023-10-23
11+
modified: 2025-07-04
1212
tags:
1313
- attack.privilege-escalation
1414
- attack.t1068
@@ -22,6 +22,13 @@ detection:
2222
ParentImage|endswith:
2323
- '\Sysmon.exe'
2424
- '\Sysmon64.exe'
25+
filter_main_temp_sysmon:
26+
# C:\Users\ADMINI~1\AppData\Local\Temp\2\Sysmon.exe
27+
Image|startswith: 'C:\Users\'
28+
Image|contains: '\AppData\Local\Temp\'
29+
Image|endswith:
30+
- '\Sysmon.exe'
31+
- '\Sysmon64.exe'
2532
filter_main_generic:
2633
Image|contains:
2734
- ':\Windows\Sysmon.exe'
@@ -31,7 +38,6 @@ detection:
3138
- ':\Windows\System32\WerFaultSecure.exe' # When Sysmon crashes
3239
- ':\Windows\System32\wevtutil.exe'
3340
- ':\Windows\SysWOW64\wevtutil.exe'
34-
- '\AppData\Local\Temp\Sysmon.exe' # When launching Sysmon 32bit version.
3541
filter_main_null:
3642
Image: null
3743
condition: selection and not 1 of filter_main_*

rules-threat-hunting/windows/create_remote_thread/create_remote_thread_win_susp_target_shell_application.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://www.binarydefense.com/resources/blog/icedid-gziploader-analysis/
1010
author: Splunk Research Team
1111
date: 2024-07-29
12-
modified: 2025-06-16
12+
modified: 2025-07-04
1313
tags:
1414
- attack.defense-evasion
1515
- attack.t1055
@@ -24,11 +24,13 @@ detection:
2424
- '\powershell.exe'
2525
- '\pwsh.exe'
2626
filter_main_system:
27-
SourceImage: 'C:\Windows\System32\csrss.exe'
27+
SourceImage|startswith:
28+
- 'C:\Windows\System32\'
29+
- 'C:\Windows\SysWOW64\'
30+
- 'C:\Program Files (x86)\'
31+
- 'C:\Program Files\'
2832
filter_optional_defender:
2933
SourceImage|endswith: '\MsMpEng.exe'
30-
filter_optional_malwarebytes:
31-
SourceImage: 'C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe'
3234
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
3335
falsepositives:
3436
- Unknown

rules/windows/builtin/ldap/win_ldap_recon.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ references:
1111
- https://ipurple.team/2024/07/15/sharphound-detection/
1212
author: Adeem Mawani
1313
date: 2021-06-22
14-
modified: 2024-08-27
14+
modified: 2025-07-04
1515
tags:
1616
- attack.discovery
1717
- attack.t1069.002
@@ -37,7 +37,7 @@ detection:
3737
- '(sAMAccountType=268435456)'
3838
- '(objectCategory=groupPolicyContainer)'
3939
- '(objectCategory=organizationalUnit)'
40-
- '(objectCategory=Computer)'
40+
# - '(objectCategory=Computer)' Prone to false positives
4141
- '(objectCategory=nTDSDSA)'
4242
- '(objectCategory=server)'
4343
- '(objectCategory=domain)'

rules/windows/create_remote_thread/create_remote_thread_win_susp_relevant_source_image.yml

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ references:
1010
- https://lolbas-project.github.io
1111
author: Perez Diego (@darkquassar), oscd.community
1212
date: 2019-10-27
13-
modified: 2025-05-13
13+
modified: 2025-07-08
1414
tags:
1515
- attack.privilege-escalation
1616
- attack.defense-evasion
@@ -62,12 +62,22 @@ detection:
6262
- '\winword.exe'
6363
- '\wmic.exe'
6464
- '\wscript.exe'
65-
filter_main_defrag_conhost:
66-
SourceImage: 'C:\Windows\System32\Defrag.exe'
65+
filter_main_conhost:
66+
SourceImage:
67+
- 'C:\Windows\System32\Defrag.exe'
68+
- 'C:\Windows\System32\makecab.exe'
6769
TargetImage: 'C:\Windows\System32\conhost.exe'
6870
filter_main_provtol_svchost:
6971
SourceImage: 'C:\Windows\System32\provtool.exe'
7072
TargetImage: 'C:\Windows\System32\svchost.exe'
73+
filter_main_userinit:
74+
SourceImage: 'C:\Windows\System32\userinit.exe'
75+
TargetImage: 'C:\Windows\explorer.exe'
76+
filter_main_winword:
77+
SourceImage|endswith: '\WINWORD.EXE'
78+
TargetImage|startswith:
79+
- 'C:\Program Files (x86)\' # C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
80+
- 'C:\Program Files\' # C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\AI\ai.exe
7181
filter_optional_explorer_vmtools:
7282
SourceImage|endswith: '\SysWOW64\explorer.exe'
7383
TargetImage:

rules/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_source_image.yml

Lines changed: 28 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ references:
1010
- https://lolbas-project.github.io
1111
author: Perez Diego (@darkquassar), oscd.community
1212
date: 2019-10-27
13-
modified: 2025-03-07
13+
modified: 2025-07-08
1414
tags:
1515
- attack.privilege-escalation
1616
- attack.defense-evasion
@@ -35,6 +35,10 @@ detection:
3535
- 'C:\Windows\System32\csrss.exe' # multiple OS
3636
- 'C:\Windows\System32\LogonUI.exe' # multiple OS
3737
- 'C:\Windows\System32\wlrmdr.exe'
38+
- 'C:\Windows\System32\AtBroker.exe'
39+
- 'C:\Windows\System32\dwm.exe'
40+
- 'C:\Windows\System32\fontdrvhost.exe'
41+
- 'C:\Windows\System32\userinit.exe'
3842
filter_main_winlogon_2:
3943
SourceImage: 'C:\Windows\System32\winlogon.exe'
4044
TargetParentProcessId: 4
@@ -52,13 +56,29 @@ detection:
5256
- 'C:\Windows\SysWOW64\'
5357
filter_main_system:
5458
TargetImage: 'System'
55-
filter_main_msiexec:
59+
filter_main_msiexec_1:
5660
# Note: MSI installers will trigger this
5761
SourceImage|endswith: '\msiexec.exe'
5862
TargetImage|contains:
5963
- '\AppData\Local\'
6064
- 'C:\Program Files (x86)\'
6165
- 'C:\Program Files\'
66+
- 'C:\Windows\Microsoft.NET\Framework64\' # C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
67+
filter_main_msiexec_2:
68+
SourceImage|endswith: '\msiexec.exe'
69+
TargetImage:
70+
- 'C:\Windows\System32\msiexec.exe'
71+
- 'C:\Windows\SysWOW64\msiexec.exe'
72+
filter_main_iexplore:
73+
SourceImage: 'C:\Program Files\Internet Explorer\iexplore.exe'
74+
TargetImage:
75+
- 'C:\Program Files (x86)\Internet Explorer\iexplore.exe'
76+
- 'C:\Windows\System32\rundll32.exe'
77+
filter_main_powerpnt:
78+
SourceImage|endswith: '\POWERPNT.EXE'
79+
TargetImage|contains:
80+
- 'C:\Program Files\Microsoft Office\' # C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\AI\ai.exe
81+
- 'C:\Program Files (x86)\Microsoft Office\'
6282
filter_optional_aurora_smartconsole1:
6383
SourceImage: 'C:\Program Files\internet explorer\iexplore.exe'
6484
SourceCommandLine|contains|all:
@@ -86,6 +106,12 @@ detection:
86106
filter_optional_onedrive:
87107
SourceImage: 'C:\Windows\explorer.exe'
88108
TargetImage|endswith: '\AppData\Local\Microsoft\OneDrive\OneDrive.exe'
109+
filter_optional_aurora:
110+
SourceImage: 'C:\Windows\explorer.exe'
111+
TargetImage|endswith: '\aurora-dashboard.exe'
112+
filter_optional_officesetup:
113+
SourceImage: 'C:\Windows\explorer.exe'
114+
TargetImage|endswith: '\OfficeSetup.exe'
89115
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
90116
falsepositives:
91117
- This rule is best put in testing first in order to create a baseline that reflects the data in your environment.

rules/windows/create_remote_thread/create_remote_thread_win_susp_uncommon_target_image.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://web.archive.org/web/20220319032520/https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
1010
author: Florian Roth (Nextron Systems)
1111
date: 2022-03-16
12-
modified: 2024-07-15
12+
modified: 2025-07-04
1313
tags:
1414
- attack.defense-evasion
1515
- attack.privilege-escalation
@@ -31,6 +31,14 @@ detection:
3131
- '\write.exe'
3232
filter_main_csrss:
3333
SourceImage: 'C:\Windows\System32\csrss.exe'
34+
filter_main_notepad:
35+
SourceImage:
36+
- 'C:\Windows\System32\explorer.exe'
37+
- 'C:\Windows\System32\OpenWith.exe'
38+
TargetImage: 'C:\Windows\System32\notepad.exe'
39+
filter_main_sethc:
40+
SourceImage: 'C:\Windows\System32\AtBroker.exe'
41+
TargetImage: 'C:\Windows\System32\Sethc.exe'
3442
filter_optional_aurora_1:
3543
StartFunction: 'EtwpNotificationThread'
3644
filter_optional_aurora_2:

rules/windows/file/file_delete/file_delete_win_zone_identifier_ads_uncommon.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ references:
1010
- Internal Research
1111
author: Nasreddine Bencherchali (Nextron Systems)
1212
date: 2023-09-04
13-
modified: 2024-04-26
13+
modified: 2025-07-04
1414
tags:
1515
- attack.defense-evasion
1616
- attack.t1070.004
@@ -37,6 +37,10 @@ detection:
3737
Image:
3838
- 'C:\Program Files (x86)\Mozilla Firefox\firefox.exe'
3939
- 'C:\Program Files\Mozilla Firefox\firefox.exe'
40+
filter_optional_browsers_msedge:
41+
Image:
42+
- 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe'
43+
- 'C:\Program Files\Microsoft\Edge\Application\msedge.exe'
4044
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
4145
falsepositives:
4246
- Other third party applications not listed.

rules/windows/file/file_event/file_event_win_powershell_drop_binary_or_script.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://www.zscaler.com/blogs/security-research/onenote-growing-threat-malware-distribution
77
author: frack113, Nasreddine Bencherchali (Nextron Systems)
88
date: 2023-03-17
9-
modified: 2025-03-05
9+
modified: 2025-07-04
1010
tags:
1111
- attack.persistence
1212
logsource:
@@ -16,6 +16,7 @@ detection:
1616
selection:
1717
Image|endswith:
1818
- '\powershell.exe'
19+
- '\powershell_ise.exe'
1920
- '\pwsh.exe'
2021
TargetFilename|endswith:
2122
- '.bat'
@@ -47,6 +48,13 @@ detection:
4748
TargetFilename|endswith:
4849
- '.dll'
4950
- '.exe'
51+
filter_main_powershell_module:
52+
TargetFilename|startswith: 'C:\Users\'
53+
TargetFilename|contains: '\WindowsPowerShell\Modules\' # C:\Users\xxxx\Documents\WindowsPowerShell\Modules\powershell-yaml\0.4.12\lib\net47\PowerShellYamlSerializer.dll
54+
TargetFilename|endswith: '.dll'
55+
filter_main_nuget:
56+
TargetFilename|startswith: 'C:\Program Files\PackageManagement\ProviderAssemblies\nuget\'
57+
TargetFilename|endswith: '\Microsoft.PackageManagement.NuGetProvider.dll'
5058
condition: selection and not 1 of filter_main_*
5159
falsepositives:
5260
- False positives will differ depending on the environment and scripts used. Apply additional filters accordingly.

rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_cli.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ references:
1111
- https://twitter.com/frack113/status/1555830623633375232
1212
author: frack113, Nasreddine Bencherchali
1313
date: 2022-08-07
14-
modified: 2022-10-26
14+
modified: 2025-07-04
1515
tags:
1616
- attack.defense-evasion
1717
- attack.t1564.004
@@ -34,6 +34,8 @@ detection:
3434
- '\veam.backup.shell.exe'
3535
- '\winget.exe'
3636
- '\Everything\Everything.exe'
37+
- '\aurora-agent-64.exe'
38+
- '\aurora-agent.exe'
3739
- ParentImage|contains: '\AppData\Local\Temp\WinGet\'
3840
- CommandLine|contains:
3941
- '\appdata\local\webex\webex64\meetings\wbxreport.exe'

rules/windows/process_creation/proc_creation_win_susp_userinit_child.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://twitter.com/SBousseaden/status/1139811587760562176
77
author: Florian Roth (Nextron Systems), Samir Bousseaden (idea)
88
date: 2019-06-17
9-
modified: 2022-12-09
9+
modified: 2025-07-04
1010
tags:
1111
- attack.defense-evasion
1212
- attack.t1055
@@ -16,12 +16,14 @@ logsource:
1616
detection:
1717
selection:
1818
ParentImage|endswith: '\userinit.exe'
19-
filter1:
19+
filter_main_netlogon:
2020
CommandLine|contains: '\netlogon\'
21-
filter2:
21+
filter_main_explorer:
2222
- Image|endswith: '\explorer.exe'
2323
- OriginalFileName: 'explorer.exe'
24-
condition: selection and not 1 of filter*
24+
filter_main_null:
25+
Image: null
26+
condition: selection and not 1 of filter_main_*
2527
fields:
2628
- CommandLine
2729
- ParentCommandLine

0 commit comments

Comments
 (0)