Skip to content

Commit 852944e

Browse files
w0rk3rtradebot-elastic
authored andcommitted
[Rule Tuning] Windows High Severity - 2 (#5093)
* [Rule Tuning] Windows High Severity - 2 * [Rule Tuning] Windows High Severity - 3 * Revert "[Rule Tuning] Windows High Severity - 3" This reverts commit 32c8348. (cherry picked from commit 567b82c)
1 parent c2f7049 commit 852944e

5 files changed

+39
-16
lines changed

rules/windows/defense_evasion_execution_windefend_unusual_path.toml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
creation_date = "2021/07/07"
33
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/09/01"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic", "Dennis Perto"]
99
description = """
10-
Identifies a Windows trusted program that is known to be vulnerable to DLL Search Order Hijacking starting after being
11-
renamed or from a non-standard path. This is uncommon behavior and may indicate an attempt to evade defenses via
12-
side-loading a malicious DLL within the memory space of one of those processes.
10+
Identifies suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or
11+
renamed instances. This may indicate an attempt to evade defenses through DLL side-loading or by masquerading as the
12+
antimalware process.
1313
"""
1414
false_positives = ["Microsoft Antimalware Service Executable installed on non default installation path."]
1515
from = "now-9m"
@@ -23,13 +23,13 @@ index = [
2323
]
2424
language = "eql"
2525
license = "Elastic License v2"
26-
name = "Potential DLL Side-Loading via Microsoft Antimalware Service Executable"
26+
name = "Suspicious Microsoft Antimalware Service Execution"
2727
note = """## Triage and analysis
2828
2929
> **Disclaimer**:
3030
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3131
32-
### Investigating Potential DLL Side-Loading via Microsoft Antimalware Service Executable
32+
### Investigating Suspicious Microsoft Antimalware Service Execution
3333
3434
The Microsoft Antimalware Service Executable, a core component of Windows Defender, is crucial for real-time protection against malware. Adversaries exploit its trust by renaming it or executing it from non-standard paths to load malicious DLLs, bypassing security measures. The detection rule identifies such anomalies by monitoring process names and paths, flagging deviations from expected behavior to uncover potential threats.
3535

rules/windows/defense_evasion_iis_httplogging_disabled.toml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/04/14"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,6 @@ index = [
2424
]
2525
language = "eql"
2626
license = "Elastic License v2"
27-
max_signals = 33
2827
name = "IIS HTTP Logging Disabled"
2928
note = """## Triage and analysis
3029

rules/windows/defense_evasion_proxy_execution_via_msdt.toml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2022/05/31"
33
integration = ["endpoint", "windows", "m365_defender", "crowdstrike", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -85,8 +85,7 @@ query = '''
8585
process where host.os.type == "windows" and event.type == "start" and
8686
(?process.pe.original_file_name == "msdt.exe" or process.name : "msdt.exe") and
8787
(
88-
process.args : ("IT_RebrowseForFile=*", "ms-msdt:/id", "ms-msdt:-id", "*FromBase64*") or
89-
88+
process.args : ("IT_RebrowseForFile=*", "*FromBase64*", "*/../../../*", "*PCWDiagnostic*") or
9089
(
9190
process.args : "-af" and process.args : "/skip" and
9291
process.parent.name : ("explorer.exe", "cmd.exe", "powershell.exe", "cscript.exe", "wscript.exe", "mshta.exe", "rundll32.exe", "regsvr32.exe") and

rules/windows/defense_evasion_unusual_system_vp_child_program.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/08/19"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -79,7 +79,7 @@ type = "eql"
7979
query = '''
8080
process where host.os.type == "windows" and event.type == "start" and
8181
process.parent.pid == 4 and process.executable : "?*" and
82-
not process.executable : ("Registry", "MemCompression", "?:\\Windows\\System32\\smss.exe")
82+
not process.executable : ("Registry", "MemCompression", "?:\\Windows\\System32\\smss.exe", "HotPatch")
8383
'''
8484

8585

rules/windows/execution_initial_access_via_msc_file.toml

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/12"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -68,8 +68,33 @@ type = "eql"
6868

6969
query = '''
7070
process where host.os.type == "windows" and event.type == "start" and
71-
process.parent.executable : "?:\\Windows\\System32\\mmc.exe" and endswith~(process.parent.args, ".msc") and
72-
not process.parent.args : ("?:\\Windows\\System32\\*.msc", "?:\\Windows\\SysWOW64\\*.msc", "?:\\Program files\\*.msc", "?:\\Program Files (x86)\\*.msc")
71+
process.parent.executable : "?:\\Windows\\System32\\mmc.exe" and endswith~(process.parent.args, ".msc") and
72+
not (
73+
process.parent.args : (
74+
"?:\\Windows\\System32\\*.msc",
75+
"?:\\Windows\\SysWOW64\\*.msc",
76+
"?:\\Program files\\*.msc",
77+
"?:\\Program Files (x86)\\*.msc"
78+
) or
79+
(
80+
process.executable : "?:\\Windows\\System32\\mmc.exe" and
81+
process.command_line : "\"C:\\WINDOWS\\system32\\mmc.exe\" \"C:\\Windows\\System32\\gpme.msc\" /s /gpobject:\"LDAP://*"
82+
) or
83+
(
84+
process.executable : (
85+
"?:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
86+
"?:\\Program Files\\Mozilla Firefox\\firefox.exe",
87+
"?:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
88+
"?:\\Program Files\\internet explorer\\iexplore.exe"
89+
) and
90+
process.args : "http*://go.microsoft.com/fwlink/*"
91+
) or
92+
process.executable : (
93+
"?:\\Windows\\System32\\vmconnect.exe",
94+
"?:\\Windows\\System32\\WerFault.exe",
95+
"?:\\Windows\\System32\\wermgr.exe"
96+
)
97+
)
7398
'''
7499

75100

0 commit comments

Comments
 (0)