diff --git a/README.md b/README.md index 6e4ec413..ac9d94d3 100644 --- a/README.md +++ b/README.md @@ -1,20 +1,28 @@ -# sysmon-config | A Sysmon configuration file for everybody to fork # +# sysmon-config | A ransomware focused Sysmon configuration file # -This is a Microsoft Sysinternals Sysmon configuration file template with default high-quality event tracing. +This is a Microsoft Sysinternals Sysmon configuration file template with +default high-quality event tracing. This is a fork of +[SwiftOnSecurity](https://twitter.com/SwiftOnSecurity/)'s awesome +[sysmon-config](https://github.com/SwiftOnSecurity/sysmon-config), with an +additional focus on ransomware artifacts. -The file should function as a great starting point for system change monitoring in a self-contained and accessible package. This configuration and results should give you a good idea of what's possible for Sysmon. Note that this does not track things like authentication and other Windows events that are also vital for incident investigation. +## Reasoning ## -      **[sysmonconfig-export.xml](https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml)** +Ransomware commonly encrypt documents and other files, often renaming them with +deterministic file names and extensions in the process. In addition, they +create instructions in the forms of text files, images or executables detailing +how to restore these files (often in the form of payment). Monitoring for files +that match these ransomware artifacts may provide security teams with early +warnings of a ransomware outbreak. -Because virtually every line is commented and sections are marked with explanations, it should also function as a tutorial for Sysmon and a guide to critical monitoring areas in Windows systems. +It is strongly suggested that you configure your SIEM or alerting system when +there is a large number of Sysmon Event Code 11 (File Creation or Overwrites) +events that match file names or extensions commonly associated with ransomware. -- For a far more exhaustive and detailed approach to Sysmon configuration from a different approach, see also **[sysmon-modular](https://github.com/olafhartong/sysmon-modular)** by [@olafhartong](https://twitter.com/olafhartong), which can act as a superset of sysmon-config. - -- Sysmon is a compliment to native Windows logging abilities, not a replacement for it. For valuable advice on these configurations, see **[MalwareArchaeology Logging Cheat Sheets](https://www.malwarearchaeology.com/cheat-sheets)** by [@HackerHurricane](https://twitter.com/hackerhurricane). - -Note: Exact syntax and filtering choices in the configuration are highly deliberate in what they target, and to have as little performance impact as possible. Sysmon's filtering abilities are different than the built-in Windows auditing features, so often a different approach is taken than the normal static listing of paths. - -      **[See other forks of this configuration](https://github.com/SwiftOnSecurity/sysmon-config/network)** +**N.B.** There are some ransomware variants that do not rename file extensions, +or use completely random extensions, which will not be detected by this +Sysmon configuration. Use your judgment, apply appropriate Anti-Virus and +other controls, practice defense-in-depth. ## Use ## ### Install ### @@ -35,15 +43,8 @@ Run with administrator rights sysmon.exe -u ~~~~ -## Required actions ## - -### Prerequisites ### -Highly recommend using [Notepad++](https://notepad-plus-plus.org/) to edit this configuration. It understands UNIX newline format and does XML syntax highlighting, which makes this very understandable. I do not recommend using the built-in Notepad.exe. - -### Customization ### -You will need to install and observe the results of the configuration in your own environment before deploying it widely. For example, you will need to exclude actions of your antivirus, which will otherwise likely fill up your logs with useless information. - -The configuration is highly commented and designed to be self-explanatory to assist you in this customization to your environment. +## Thanks ## -### Design notes ### -This configuration expects software to be installed system-wide and NOT in the C:\Users folder. Various pieces of software install themselves in User directories, which are subject to extra monitoring. Where possible, you should install the system-wide version of these pieces of software, like Chrome. See the configuration file for more instructions. +Thanks to [SwiftOnSecurity](https://twitter.com/SwiftOnSecurity/) for their well +documented Sysmon configuration, and mark Russinovich and Thomas Garnier for +developing Sysmon. diff --git a/sysmonconfig-export.xml b/sysmonconfig-export.xml index f4acf26c..fd91976f 100644 --- a/sysmonconfig-export.xml +++ b/sysmonconfig-export.xml @@ -4,10 +4,10 @@ Source project: https://github.com/SwiftOnSecurity/sysmon-config Source license: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text. - Fork version: - Fork author: - Fork project: - Fork license: + Fork version: 1.0 + Fork author: Simon Duff (@sduff) + Fork project: https://github.com/sduff/sysmon-config + Fork license: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text. REQUIRED: Sysmon version 13 or higher (due to changes in syntax and bug-fixes) https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon @@ -515,6 +515,485 @@ .xls .ppt .rtf + + decrypt all files + _h_e_l_p_recover_instructions + help_recover_instructions + how_recover + @please_read_me@ + -read-for-hellpp.html + readme_decrypt_hydra_id_ + readme_decrypt_umbre_id_ + recover_files_ + recover_file_ + recovery_file_ + recovery + -sorry-for-files.html + @wanadecryptor@.exe + about_files.txt + allfilesarelocked_.bmp + attention.rtf + bitcryptorfilelist.txt + bleepedfiles.txt + buyunlockcode + coin.locker.txt + cryptinfo.txt + cryptlogfile.txt + decrypt all files *.bmp + decryptallfiles.txt + decryptallfiles_.txt + decrypt_instructions.html + decrypt_instructions.txt + decrypt_instruction.txt + # decrypt my files #.html + # decrypt my files #.txt + # decrypt my files #.vbs + decrypt_readme.txt.readme + decrypt_readme.txt + decrypt_your_files.html + encryptor_raas_readme_liesmich.txt + exit.hhr.obleep + filesaregone.txt + getyoufiles.txt + hellothere.txt + help_decrypt.txt + help_decrypt_your_files.html + help_decyprt_your_files.html + *-help_for_decrypt_file.html + help recover files.txt + help_recover_files.txt + help_restore_files.txt + help_to_decrypt_your_files.txt + help_to_save_files.txt + help_yourfiles.html + help_your_files.txt + howdecrypt.gif + how_decrypt.txt + _how_recover_.txt + how to decrypt files.html + how-to-decrypt-files.html + how to decrypt files.txt + how_to_decrypt_files.txt + how_to_decrypt.html + how to get data.txt + how_to_recover_files.txt + howto_recover_file_.txt + how_to_restore_files.txt + howto_restore_files.txt + howto_restore_files_.txt + iamreadytopay.txt + ihaveyoursecret.key + important read me.txt + kryptolocker_readme.txt + _locky_recover_instructions.txt + nefilim-decrypt.txt + qwer2.html + qwer.html + readdecryptfileshere.txt + read if you want your files back.html + readme10.txt + readme1.txt + readme2.txt + readme3.txt + readme4.txt + readme5.txt + readme6.txt + readme7.txt + readme8.txt + readme9.txt + readme.txt + readthisnow!!!.txt + read.txt + recovery_files.txt + recovery_file.txt + recovery_key.txt + restore_files_.txt + ryukreadme.html + _secret_code.txt + secretidhere.key + secret.key + unblockfiles.vbs + your_files_are_encrypted.html + your_files.html + your_files.url + + cpyt + crypt + darkness + decipher + enc + exx + @gmail_com_ + help_restore + help_your_files + how_to_recover + .hydracrypt_id_ + @india.com + install_tor + keemail.me + qq_com + restore_fi + ukr.net + .unbrecrypt_id_ + want your files back + .0x0 + .1999 + .1cbu1 + .1txt + .73i87a + .777 + .7h9r + .8lock8 + .a5zfn + .aaa + .abc + .adk + .adr + .aes256 + aes256 + .aesir + .afd + .aga + ._airacropencrypted + .alcatraz + .amba + .angelamerkel + .angleware + .antihacker2017 + .areyoulovemyransfile + .areyoulovemyrans + .asier + .atlas + .axx + .barrax + .bart + .bart.zip + .better_call_saul + .bin + .bitstak + .bleep + .bleepyourfiles + .blocatto + .bloc + .braincrypt + .breaking_bad + .breeding123 + .bript + .btcbtcbtc + .btc-help-you + .btc + .canihelpyou + .cbf + .cccrrrppp + .ccc + .cerber2 + .cerber3 + .cerber + .checkdiskenced + .chifrator@qq_com + .cifgksaffsfyghd + .clf + .coded + .code + .comrade + .conficker + .confirmation.key + .country82000 + .coverton + .crab + .crashed + .crime + .crinf + .criptiko + .criptokod + .criptoko + .cripttt + .crjocker + .crjoker + .crptrgr + .crrrt + .cryeye + .cryp1 + .crypt38 + .crypted + .crypte + .cryptolocker + .crypto + crypto + .cryptotorlocker2015! + .cryptowall + ._crypt + .crypt + .cryptz + .crypz + .crysis + .cry + cry + .ctb2 + .ctbl2 + .ctbl + .czvxce + .d4nk + .dale + .damage + .darkness + .da_vinci_code + .dcrypt + .decrypt2017 + .ded + .dexter + .dharma + .disposed2017 + .dll + .domino + .dxxd + .dyatel@qq_com + .ecc + .edgel + .encedrsa + .enc_files.txt + .enciphered + .encmywork + .encoderpass + .encr + .encryptedaes + .encryptedrsa + .encrypted + .encrypted + .encryptedyourfiles + .encrypt + .enc + .enigma + .epic + .evillock + .exotic + .exx + .ezz + .fantom + .file0locked + .filegofprencrp + .fileiscryptedhard + .filock + .frtrss + .fucked + .fuck + .fucku + .fuckyourdata + .fun + .gefickt + .globe + .goforhelp + .good + .grt + .gruzin@qq_com + .gws + .h3ll + .ha3 + .happenencedfiles + .hb15 + .helpdecrypt@ukr.net + .helpmeencedfiles + .herbst + .hnumkhotep + .howcanihelpusir + .hush + .iaufkakfhsaraf + .ifuckedyou + .iloveworld + .infected + .info + -instruction.html + .isis + .iwanthelpuuu + .iwishiyou + .justbtcwillhelpyou + kb15 + .kernel_complete + .kernel_pid + .kernel_time + .keybtc@inbox_com + .keyh0les + .keyz + .kimcilware + .kkk + .korrektor + .kostya + .kraken + kraken + .kratos + .kyra + .last_chance.txt + .lcked + .lechiffre + .legion + .lesli + .letmetrydecfiles + .lock93 + .locked + locked + .locklock + .lock + .locky + .loli + .lol! + .loveransisgood + .lovewindows + .madebyadam + .magic + .maya + .mention9823 + .merry + .message.txt + .micro + .mole + .moments2900 + .mp3 + .mrcr1 + .myransext2017 + .nalog@qq_com + .nefilim + .nochance + nochance + .noproblemwedecfiles + .notfoundrans + .nuclear55 + .odcodc + .odin + .omg! + .onion + .only-we_can-help_you + .oops + .oor + .oplata@qq_com + .oshit + oshit + .osiris + .otherinformation + .p5tkjw + .padcrypt + .paybtcs + .paymrss + .payms + .paymst + .paym + .paymts + .payransom + .payrms + .pays + .pdcr + .pec + .pegs1 + .perl + .pizda@qq_com + .poar2w + .porno + .poshkoder + .potato + .powerfulldecryp + .powerfulldecrypt + .prosperous666 + .pubg + .purge + .pzdc + .r16m01d05 + .r4a + .r5a + .radamant + .rad + .raid10 + .rare1 + .razy + .rdm + .realfs0ciety@sigaint.org.fs0ciety + .recovery_file.txt + .recovery_key.txt + .rekt + .relock@qq_com + .remind + .rip + .rmcm1 + .rmd + .rnsmwr + .rokku + .rrk + .rsnslocked + .rsplited + .ruby + .ryk + ._ryp + .sage + .sanctioned + .sanction + .scl + .securecrypted + .serpent + .serp + .sexy + .shino + .shit + .silent + .skjdthghh + .spora + .sport + .stn + .stubbin + .supercrypt + .supported2017 + .suppose665 + .suppose666 + .surprise + .szf + .theworldisyours + .thor + .toxcrypt + .troyancoder@qq_com + .trun + .ttt + .tzu + .unavailable + .vault.hta + .vault.key + .vault + .vault.txt + .vbransom + .vekanhelpu + .venusf + .venusp + .vforvendetta + .vindows + .vscrypt + .vvv + .vxlock + .wallet + .wcry + .weapologize + .weareyourfriends + .weencedufiles + .wflx + .whereisyourfiles + .where_my_files.txt + .windows10 + .wncry + .wncryt + .wnry + .wowreadfordecryp + .wowwhereismyfiles + .xcri + .xort + .xrnt + .xrtn + .xtbl + .xxx + .xyz + .ytbl + .z81928819 + .zc3791 + .zcrypt + .zepto + .zorro + .zyklon + .zzz + .zzzzz @@ -1156,4 +1635,4 @@ - \ No newline at end of file +