Skip to content

Commit 76c73f8

Browse files
authored
[Rule Tuning] Windows High Severity - 4 (#5095)
* [Rule Tuning] Windows High Severity - 4 * Update initial_access_execution_from_inetcache.toml
1 parent 8d9822e commit 76c73f8

5 files changed

+41
-20
lines changed

rules/windows/initial_access_execution_from_inetcache.toml

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/02/14"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/28"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -88,13 +88,25 @@ query = '''
8888
process where host.os.type == "windows" and event.type == "start" and
8989
process.parent.name : ("explorer.exe", "winrar.exe", "7zFM.exe", "Bandizip.exe") and
9090
(
91-
process.args : "?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*" or
91+
process.args : "*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*" or
9292
process.executable : (
9393
"?:\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*",
9494
95-
/* Crowdstrike specific exclusion as it uses NT Object paths */
95+
/* Crowdstrike specific condition as it uses NT Object paths */
9696
"\\Device\\HarddiskVolume*\\Users\\*\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\*"
9797
)
98+
) and
99+
not process.executable : (
100+
"?:\\Program Files\\*.exe",
101+
"?:\\Program Files (x86)\\*.exe",
102+
"?:\\Windows\\System32\\mspaint.exe",
103+
"?:\\Windows\\System32\\notepad.exe",
104+
105+
/* Crowdstrike specific exclusion as it uses NT Object paths */
106+
"\\Device\\HarddiskVolume*\\Program Files\\*.exe",
107+
"\\Device\\HarddiskVolume*\\Program Files (x86)\\*.exe",
108+
"\\Device\\HarddiskVolume*\\Windows\\System32\\mspaint.exe",
109+
"\\Device\\HarddiskVolume*\\Windows\\System32\\notepad.exe"
98110
)
99111
'''
100112

rules/windows/lateral_movement_evasion_rdp_shadowing.toml

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/04/12"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -59,7 +59,7 @@ Remote Desktop Shadowing allows administrators to view or control active RDP ses
5959
- Implement enhanced monitoring and logging for RDP activities across the network to detect and respond to similar threats more quickly in the future.
6060
- Review and update RDP access policies and configurations to ensure they align with best practices, such as enforcing multi-factor authentication and limiting RDP access to only necessary users and systems."""
6161
references = [
62-
"https://bitsadm.in/blog/spying-on-users-using-rdp-shadowing",
62+
"https://blog.bitsadmin.com/spying-on-users-using-rdp-shadowing",
6363
"https://swarm.ptsecurity.com/remote-desktop-services-shadowing/",
6464
]
6565
risk_score = 73
@@ -86,12 +86,13 @@ query = '''
8686
8787
any where host.os.type == "windows" and
8888
(
89-
(event.category == "registry" and
90-
registry.path : (
91-
"HKLM\\Software\\Policies\\Microsoft\\Windows NT\\Terminal Services\\Shadow",
92-
"\\REGISTRY\\MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Terminal Services\\Shadow",
93-
"MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\Terminal Services\\Shadow"
94-
)
89+
(event.category == "registry" and event.type == "change" and
90+
registry.value : "Shadow" and
91+
registry.path : (
92+
"*\\Software\\Policies\\Microsoft\\Windows NT\\Terminal Services\\Shadow"
93+
) and
94+
registry.data.strings : ("1", "0x00000001", "2", "0x00000002", "3", "0x00000003", "4", "0x00000004")
95+
9596
) or
9697
(event.category == "process" and event.type == "start" and
9798
(process.name : ("RdpSaUacHelper.exe", "RdpSaProxy.exe") and process.parent.name : "svchost.exe") or

rules/windows/lateral_movement_unusual_dns_service_children.toml

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/07/16"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -96,8 +96,16 @@ timestamp_override = "event.ingested"
9696
type = "eql"
9797

9898
query = '''
99-
process where host.os.type == "windows" and event.type == "start" and process.parent.name : "dns.exe" and
100-
not process.name : "conhost.exe"
99+
process where host.os.type == "windows" and event.type == "start" and
100+
process.parent.name : "dns.exe" and
101+
not process.executable : (
102+
"?:\\Windows\\System32\\conhost.exe",
103+
104+
/* Crowdstrike specific exclusion as it uses NT Object paths */
105+
"\\Device\\HarddiskVolume*\\Windows\\System32\\conhost.exe",
106+
"\\Device\\HarddiskVolume*\\Program Files\\ReasonLabs\\*"
107+
) and
108+
not ?process.parent.executable : "?:\\Program Files\\ReasonLabs\\DNS\\ui\\DNS.exe"
101109
'''
102110

103111

rules/windows/persistence_evasion_registry_startup_shell_folder_modified.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/03/15"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/09/11"
66

77
[transform]
88
[[transform.osquery]]
@@ -152,7 +152,9 @@ registry where host.os.type == "windows" and event.type == "change" and
152152
"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup",
153153
"%ProgramData%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup",
154154
"%USERPROFILE%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup",
155-
"C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"
155+
"%%USERPROFILE%%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup",
156+
"C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup",
157+
"\\\\*"
156158
)
157159
'''
158160

rules/windows/persistence_priv_escalation_via_accessibility_features.toml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/02/18"
33
integration = ["endpoint", "windows", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[transform]
88
[[transform.osquery]]
@@ -141,16 +141,14 @@ process where host.os.type == "windows" and event.type == "start" and
141141
"sethc.exe",
142142
"utilman2.exe",
143143
"DisplaySwitch.exe",
144+
"atbroker.exe",
144145
"ATBroker.exe",
145146
"ScreenMagnifier.exe",
146147
"SR.exe",
147148
"Narrator.exe",
148149
"magnify.exe",
149150
"MAGNIFY.EXE"
150151
)
151-
152-
/* uncomment once in winlogbeat to avoid bypass with rogue process with matching pe original file name */
153-
/* and process.code_signature.subject_name == "Microsoft Windows" and process.code_signature.status == "trusted" */
154152
'''
155153

156154

0 commit comments

Comments
 (0)