Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG-Japanese.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
- `search`コマンドに`--timeline-start/--timeline-end`オプションを追加した。 (#1543) (@fukuseket)
- チャンネルフィルタリングで `logon-summary` コマンドの速度を大幅に改善した。 (#1544) (@fukusuket)
- `extract-base64`コマンドが`PowerShell Classic EID 400`イベントも対象するようになった。 (#1549) (@fukusuket)
- `extract-base64`コマンドがPowerShell Coreログにも対応した。 (#1558) (@fukusuket)

**バグ修正:**

Expand Down
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
- Added `--timeline-start/--timeline-end` options to the `search` command. (#1543) (@fukuseket)
- Significantly improved the speed of the `logon-summary` command with channel filtering. (#1544) (@fukusuket)
- The `extract-base64` command now also works on `PowerShell Classic EID 400` events. (#1549) (@fukusuket)
- The `extract-base64` command now also scans PowerShell Core logs as well. (#1558) (@fukusuket)

**Bug Fixes:**

Expand Down
2 changes: 1 addition & 1 deletion rules
Submodule rules updated 73 files
+1 −1 .github/workflows/supported_modifier.yaml
+3 −1 config/target_event_IDs.txt
+2 −2 doc/SupportedSigmaFieldModifiers.md
+69 −0 hayabusa/builtin/Security/AccountManagement/UserAccountManagement/Sec_4723_Med_AcctPassword_OwnChanged.yml
+71 −0 hayabusa/builtin/Security/AccountManagement/UserAccountManagement/Sec_4724_Med_AcctPassword_OtherChanged.yml
+1 −1 hayabusa/builtin/Security/LogonLogoff/Logon/Sec_4624_Med_Logon-Type9-NewInteractive_SuspProc.yml
+1 −1 hayabusa/builtin/System/Sys_7045_High_ServiceInstalled_SuspiciousServiceName.yml
+1 −1 sigma/builtin/emerging-threats/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern.yml
+1 −1 ...a/builtin/emerging-threats/2024/Exploits/CVE-2024-1708/win_security_exploit_cve_2024_1708_screenconnect.yml
+1 −1 ...2024/Exploits/CVE-2024-1709/win_security_exploit_cve_2024_1709_user_database_modification_screenconnect.yml
+36 −0 ...erging-threats/2024/Exploits/CVE-2024-49113/win_application_error_exploit_cve_2024_49113_ldap_nightmare.yml
+1 −1 ...ts/2024/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection.yml
+3 −3 sigma/builtin/emerging-threats/2024/TA/Forest-Blizzard/proc_creation_win_apt_forest_blizzard_activity.yml
+1 −1 sigma/builtin/powershell/powershell_module/posh_pm_hktl_evil_winrm_execution.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_certutil_encode_susp_extensions.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_certutil_encode_susp_location.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_cmd_ping_copy_combined_execution.yml
+5 −5 sigma/builtin/process_creation/proc_creation_win_dctask64_arbitrary_command_and_dll_execution.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_diskshadow_script_mode_susp_ext.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_findstr_download.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_findstr_subfolder_search.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_lodctr_performance_counter_tampering.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_odbcconf_response_file.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_powershell_invoke_webrequest_download.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_remote_access_tools_anydesk_revoked_cert.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_remote_access_tools_screenconnect_remote_execution.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_remote_access_tools_screenconnect_webshell.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_remote_access_tools_simple_help.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_sc_query_interesting_services.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_ssh_port_forward.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_wget_download_susp_locations.yml
+1 −1 sigma/builtin/process_creation/proc_creation_win_whoami_all_execution.yml
+1 −1 sigma/builtin/registry/registry_set/registry_set_sentinelone_shell_context_tampering.yml
+1 −1 sigma/builtin/system/microsoft_windows_certification_authority/win_system_adcs_enrollment_request_denied.yml
+1 −1 ...crosoft_windows_kerberos_key_distribution_center/win_system_kdcsvc_tgs_no_suitable_encryption_key_found.yml
+1 −1 .../builtin/threat-hunting/process_creation/proc_creation_win_remote_access_tools_screenconnect_child_proc.yml
+1 −1 sigma/builtin/threat-hunting/registry/registry_set/registry_set_shell_context_menu_tampering.yml
+1 −1 sigma/sysmon/dns_query/dns_query_win_onelaunch_update_service.yml
+2 −1 ...mon/emerging-threats/2023/Exploits/CVE-2023-36874/file_event_win_exploit_cve_2023_36874_wermgr_creation.yml
+1 −1 sigma/sysmon/emerging-threats/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern.yml
+1 −1 .../sysmon/emerging-threats/2024/Exploits/CVE-2024-1708/file_event_win_exploit_cve_2024_1708_screenconnect.yml
+1 −1 ...24/Exploits/CVE-2024-1709/file_event_win_exploit_cve_2024_1709_user_database_modification_screenconnect.yml
+1 −1 ...ts/2024/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection.yml
+1 −1 sigma/sysmon/emerging-threats/2024/TA/DPRK/dns_query_win_apt_dprk_malicious_domains.yml
+3 −3 sigma/sysmon/emerging-threats/2024/TA/Forest-Blizzard/proc_creation_win_apt_forest_blizzard_activity.yml
+1 −1 ...ng-threats/2024/TA/SlashAndGrab-Exploitation-In-Wild/file_event_win_apt_unknown_exploitation_indicators.yml
+6 −5 sigma/sysmon/image_load/image_load_dll_vsstrace_susp_load.yml
+1 −1 sigma/sysmon/image_load/image_load_susp_unsigned_dll.yml
+1 −1 sigma/sysmon/process_access/proc_access_win_lsass_memdump.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_certutil_encode_susp_extensions.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_certutil_encode_susp_location.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_chcp_codepage_lookup.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_cmd_ping_copy_combined_execution.yml
+5 −5 sigma/sysmon/process_creation/proc_creation_win_dctask64_arbitrary_command_and_dll_execution.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_diskshadow_script_mode_susp_ext.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_findstr_download.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_findstr_subfolder_search.yml
+2 −2 sigma/sysmon/process_creation/proc_creation_win_hktl_dumpert.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_lodctr_performance_counter_tampering.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_odbcconf_response_file.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_powershell_invoke_webrequest_download.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_remote_access_tools_anydesk_revoked_cert.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_remote_access_tools_screenconnect_remote_execution.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_remote_access_tools_screenconnect_webshell.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_remote_access_tools_simple_help.yml
+5 −5 sigma/sysmon/process_creation/proc_creation_win_renamed_dctask64.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_sc_query_interesting_services.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_ssh_port_forward.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_wget_download_susp_locations.yml
+1 −1 sigma/sysmon/process_creation/proc_creation_win_whoami_all_execution.yml
+1 −1 sigma/sysmon/registry/registry_set/registry_set_sentinelone_shell_context_tampering.yml
+1 −1 ...a/sysmon/threat-hunting/process_creation/proc_creation_win_remote_access_tools_screenconnect_child_proc.yml
+1 −1 sigma/sysmon/threat-hunting/registry/registry_set/registry_set_shell_context_menu_tampering.yml
2 changes: 1 addition & 1 deletion src/detections/configs.rs
Original file line number Diff line number Diff line change
Expand Up @@ -1882,7 +1882,7 @@ pub struct ExtractBase64Option {
#[clap(flatten)]
pub input_args: InputOption,

/// Extract Base64 strings.
/// Save results to a CSV file
#[arg(help_heading = Some("Output"), short = 'o', long, value_name = "FILE", display_order = 410)]
pub output: Option<PathBuf>,

Expand Down
10 changes: 8 additions & 2 deletions src/timeline/extract_base64.rs
Original file line number Diff line number Diff line change
Expand Up @@ -226,10 +226,16 @@ fn extract_payload(data: &Value) -> Vec<(Value, Event)> {
values.push((v, Event::Sysmon1));
let v = data["Event"]["EventData"]["ParentCommandLine"].clone();
values.push((v, Event::Sysmon1));
} else if ch == "Microsoft-Windows-PowerShell/Operational" && id == 4104 {
} else if (ch == "Microsoft-Windows-PowerShell/Operational"
|| ch == "PowerShellCore/Operational")
&& id == 4104
{
let v = data["Event"]["EventData"]["ScriptBlockText"].clone();
values.push((v, Event::PwSh4104));
} else if ch == "Microsoft-Windows-PowerShell/Operational" && id == 4103 {
} else if (ch == "Microsoft-Windows-PowerShell/Operational"
|| ch == "PowerShellCore/Operational")
&& id == 4103
{
let v = data["Event"]["EventData"]["Payload"].clone();
values.push((v, Event::PwSh4103));
} else if ch == "Windows PowerShell" && id == 400 {
Expand Down