Skip to content

Commit 8ed29f9

Browse files
Merge branch 'main' into terrancedejesus/issue5189
2 parents 8b84aa1 + ebb7bb5 commit 8ed29f9

File tree

6 files changed

+12
-11
lines changed

6 files changed

+12
-11
lines changed

detection_rules/etc/packages.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ package:
77
registry_data:
88
categories:
99
- security
10+
# Added siem category as these rules are used by the Elastic Security detection engine for security monitoring
11+
- siem
1012
conditions:
1113
elastic:
1214
capabilities:
1315
- security
14-
# Added siem category as these rules are used by the Elastic Security detection engine for security monitoring
15-
- siem
1616
subscription: basic
1717
kibana.version: ^9.2.0
1818
description: Prebuilt detection rules for Elastic Security

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.4.10"
3+
version = "1.4.11"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/windows/defense_evasion_lsass_ppl_disabled_registry.toml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/27"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -81,7 +81,8 @@ type = "eql"
8181

8282
query = '''
8383
registry where host.os.type == "windows" and event.type == "change" and
84-
registry.value : "RunAsPPL" and registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL" and
84+
registry.data.strings != null and registry.value : "RunAsPPL" and
85+
registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL" and
8586
not registry.data.strings : ("1", "0x00000001", "2", "0x00000002")
8687
'''
8788

rules/windows/defense_evasion_reg_disable_enableglobalqueryblocklist.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -84,7 +84,7 @@ timestamp_override = "event.ingested"
8484
type = "eql"
8585

8686
query = '''
87-
registry where host.os.type == "windows" and event.type == "change" and
87+
registry where host.os.type == "windows" and event.type == "change" and registry.data.strings != null and
8888
(
8989
(registry.value : "EnableGlobalQueryBlockList" and registry.data.strings : ("0", "0x00000000")) or
9090
(registry.value : "GlobalQueryBlockList" and not registry.data.strings : "wpad")

rules/windows/persistence_services_registry.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/18"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/08/18"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -79,7 +79,7 @@ type = "eql"
7979

8080
query = '''
8181
registry where host.os.type == "windows" and event.type == "change" and
82-
registry.value : ("ServiceDLL", "ImagePath") and
82+
registry.data.strings != null and registry.value : ("ServiceDLL", "ImagePath") and
8383
registry.path : (
8484
"HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
8585
"HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath",

rules/windows/privilege_escalation_reg_service_imagepath_mod.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/05"
33
integration = ["endpoint", "windows", "crowdstrike", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/10/07"
66

77
[rule]
88
author = ["Elastic"]
@@ -82,7 +82,7 @@ type = "eql"
8282

8383
query = '''
8484
registry where host.os.type == "windows" and event.type == "change" and process.executable != null and
85-
registry.value == "ImagePath" and
85+
registry.data.strings != null and registry.value == "ImagePath" and
8686
registry.key : (
8787
"*\\ADWS", "*\\AppHostSvc", "*\\AppReadiness", "*\\AudioEndpointBuilder", "*\\AxInstSV", "*\\camsvc", "*\\CertSvc",
8888
"*\\COMSysApp", "*\\CscService", "*\\defragsvc", "*\\DeviceAssociationService", "*\\DeviceInstall", "*\\DevQueryBroker",

0 commit comments

Comments
 (0)