Skip to content

Commit 010aa59

Browse files
Update windows rule from main
1 parent c836382 commit 010aa59

File tree

3 files changed

+32
-38
lines changed

3 files changed

+32
-38
lines changed

rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2020/11/24"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/02/21"
6-
min_stack_version = "8.14.0"
7-
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
5+
updated_date = "2025/03/20"
86

97
[transform]
108
[[transform.osquery]]

rules/windows/credential_access_iis_connectionstrings_dumping.toml

Lines changed: 30 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2020/08/18"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/02/21"
6-
min_stack_version = "8.14.0"
7-
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
5+
updated_date = "2025/03/20"
86

97
[rule]
108
author = ["Elastic"]
@@ -29,35 +27,6 @@ language = "eql"
2927
license = "Elastic License v2"
3028
max_signals = 33
3129
name = "Microsoft IIS Connection Strings Decryption"
32-
references = [
33-
"https://blog.netspi.com/decrypting-iis-passwords-to-break-out-of-the-dmz-part-1/",
34-
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia",
35-
]
36-
risk_score = 73
37-
rule_id = "c25e9c87-95e1-4368-bfab-9fd34cf867ec"
38-
severity = "high"
39-
tags = [
40-
"Domain: Endpoint",
41-
"OS: Windows",
42-
"Use Case: Threat Detection",
43-
"Tactic: Credential Access",
44-
"Data Source: Elastic Endgame",
45-
"Data Source: Elastic Defend",
46-
"Data Source: Windows Security Event Logs",
47-
"Data Source: Microsoft Defender for Endpoint",
48-
"Data Source: Sysmon",
49-
"Data Source: SentinelOne",
50-
"Data Source: Crowdstrike",
51-
"Resources: Investigation Guide",
52-
]
53-
timestamp_override = "event.ingested"
54-
type = "eql"
55-
56-
query = '''
57-
process where host.os.type == "windows" and event.type == "start" and
58-
(process.name : "aspnet_regiis.exe" or ?process.pe.original_file_name == "aspnet_regiis.exe") and
59-
process.args : "connectionStrings" and process.args : "-pdf"
60-
'''
6130
note = """## Triage and analysis
6231
6332
> **Disclaimer**:
@@ -93,6 +62,35 @@ Microsoft IIS often stores sensitive connection strings in encrypted form to sec
9362
- Restore the IIS server from a known good backup taken before the compromise, ensuring that any webshells or malicious scripts are removed.
9463
- Implement enhanced monitoring and alerting for any future unauthorized use of aspnet_regiis.exe, focusing on the specific arguments used in the detection query.
9564
- Escalate the incident to the security operations center (SOC) or relevant incident response team for further investigation and to assess the broader impact on the organization."""
65+
references = [
66+
"https://blog.netspi.com/decrypting-iis-passwords-to-break-out-of-the-dmz-part-1/",
67+
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia",
68+
]
69+
risk_score = 73
70+
rule_id = "c25e9c87-95e1-4368-bfab-9fd34cf867ec"
71+
severity = "high"
72+
tags = [
73+
"Domain: Endpoint",
74+
"OS: Windows",
75+
"Use Case: Threat Detection",
76+
"Tactic: Credential Access",
77+
"Data Source: Elastic Endgame",
78+
"Data Source: Elastic Defend",
79+
"Data Source: Windows Security Event Logs",
80+
"Data Source: Microsoft Defender for Endpoint",
81+
"Data Source: Sysmon",
82+
"Data Source: SentinelOne",
83+
"Data Source: Crowdstrike",
84+
"Resources: Investigation Guide",
85+
]
86+
timestamp_override = "event.ingested"
87+
type = "eql"
88+
89+
query = '''
90+
process where host.os.type == "windows" and event.type == "start" and
91+
(process.name : "aspnet_regiis.exe" or ?process.pe.original_file_name == "aspnet_regiis.exe") and
92+
process.args : "connectionStrings" and process.args : "-pdf"
93+
'''
9694

9795

9896
[[rule.threat]]

rules/windows/defense_evasion_iis_httplogging_disabled.toml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2020/04/14"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/02/21"
6-
min_stack_version = "8.14.0"
7-
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
5+
updated_date = "2025/03/20"
86

97
[rule]
108
author = ["Elastic"]

0 commit comments

Comments
 (0)