Skip to content

Commit 273650d

Browse files
authored
[Rule Tuning] Potential RemoteMonologue Attack (#4967)
* [Rule Tuning] Potential RemoteMonologue Attack * Update defense_evasion_regmod_remotemonologue.toml
1 parent c28b6d8 commit 273650d

File tree

1 file changed

+47
-5
lines changed

1 file changed

+47
-5
lines changed

rules/windows/defense_evasion_regmod_remotemonologue.toml

Lines changed: 47 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/14"
33
integration = ["endpoint", "m365_defender", "sentinel_one_cloud_funnel", "windows"]
44
maturity = "production"
5-
updated_date = "2025/07/02"
5+
updated_date = "2025/08/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -33,11 +33,11 @@ note = """## Triage and analysis
3333
- Check for any recent remote authentication attempts or sessions on the affected host to determine if this activity is associated with lateral movement or not.
3434
- Investigate the timeline of the registry change to correlate with any other suspicious activities or alerts on the host, such as the execution of unusual processes or network connections.
3535
36-
3736
### False positive analysis
3837
3938
- Software updates or installations that modify COM settings.
4039
- Automated scripts or management tools that adjust COM configurations.
40+
4141
### Response and remediation
4242
4343
- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the adversary.
@@ -51,9 +51,9 @@ references = [
5151
"https://www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions#1",
5252
"https://github.com/xforcered/RemoteMonologue",
5353
]
54-
risk_score = 73
54+
risk_score = 47
5555
rule_id = "c18975f5-676c-4091-b626-81e8938aa2ee"
56-
severity = "high"
56+
severity = "medium"
5757
tags = [
5858
"Domain: Endpoint",
5959
"OS: Windows",
@@ -70,7 +70,49 @@ timestamp_override = "event.ingested"
7070
type = "eql"
7171

7272
query = '''
73-
registry where host.os.type == "windows" and event.action != "deletion" and registry.value == "RunAs" and registry.data.strings : "Interactive User"
73+
registry where host.os.type == "windows" and event.action != "deletion" and
74+
registry.value == "RunAs" and registry.data.strings : "Interactive User" and
75+
76+
not
77+
(
78+
(
79+
process.executable : (
80+
"C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.*\\MsMpEng.exe",
81+
"C:\\Program Files\\Windows Defender\\MsMpEng.exe"
82+
) and
83+
registry.path : "*\\SOFTWARE\\Classes\\AppID\\{1111A26D-EF95-4A45-9F55-21E52ADF9887}\\RunAs"
84+
) or
85+
(
86+
process.executable : (
87+
"C:\\Program Files\\TeamViewer\\TeamViewer.exe",
88+
"C:\\Program Files (x86)\\TeamViewer\\TeamViewer.exe"
89+
) and
90+
registry.path : "*\\SOFTWARE\\Classes\\AppID\\{850A928D-5456-4865-BBE5-42635F1EBCA1}\\RunAs"
91+
) or
92+
(
93+
process.executable : "C:\\Windows\\System32\\svchost.exe" and
94+
registry.path : "*\\S-1-*Classes\\AppID\\{D3E34B21-9D75-101A-8C3D-00AA001A1652}\\RunAs"
95+
) or
96+
(
97+
process.executable : "C:\\Windows\\System32\\SecurityHealthService.exe" and
98+
registry.path : (
99+
"*\\SOFTWARE\\Classes\\AppID\\{1D278EEF-5C38-4F2A-8C7D-D5C13B662567}\\RunAs",
100+
"*\\SOFTWARE\\Classes\\AppID\\{7E55A26D-EF95-4A45-9F55-21E52ADF9878}\\RunAs"
101+
)
102+
) or
103+
(
104+
process.executable : "C:\\Windows\\System32\\SecurityHealthService.exe" and
105+
registry.path : (
106+
"*\\SOFTWARE\\Classes\\AppID\\{1D278EEF-5C38-4F2A-8C7D-D5C13B662567}\\RunAs",
107+
"*\\SOFTWARE\\Classes\\AppID\\{7E55A26D-EF95-4A45-9F55-21E52ADF9878}\\RunAs"
108+
)
109+
) or
110+
registry.path : (
111+
"HKLM\\SOFTWARE\\Microsoft\\Office\\ClickToRun\\VREGISTRY_*",
112+
"\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Office\\ClickToRun\\VREGISTRY_*"
113+
) or
114+
(process.executable : "C:\\windows\\System32\\msiexec.exe" and user.id : "S-1-5-18")
115+
)
74116
'''
75117

76118

0 commit comments

Comments
 (0)