Skip to content

Commit dc6bad9

Browse files
w0rk3rtradebot-elastic
authored andcommitted
[Rule Tuning] Windows High Severity - 1 (#5092)
* [Rule Tuning] Windows High Severity - 1 * Update command_and_control_headless_browser.toml * Update defense_evasion_execution_suspicious_explorer_winword.toml * Update command_and_control_outlook_home_page.toml (cherry picked from commit 7910f46)
1 parent c54f211 commit dc6bad9

5 files changed

+53
-44
lines changed

rules/windows/command_and_control_headless_browser.toml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/10"
33
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -73,12 +73,17 @@ type = "eql"
7373

7474
query = '''
7575
process where host.os.type == "windows" and event.type == "start" and
76-
process.name : ("chrome.exe", "msedge.exe", "brave.exe", "browser.exe", "dragon.exe", "vivaldi.exe") and
77-
(process.args : "--headless*" or process.args : "data:text/html;base64,*") and
76+
process.name : ("chrome.exe", "msedge.exe", "brave.exe", "browser.exe", "dragon.exe", "vivaldi.exe") and
77+
process.args : "--headless*" and
78+
process.args : ("--disable-gpu", "--dump-dom", "*http*", "data:text/html;base64,*") and
7879
process.parent.name :
7980
("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe", "mshta.exe", "conhost.exe", "msiexec.exe",
8081
"explorer.exe", "rundll32.exe", "winword.exe", "excel.exe", "onenote.exe", "hh.exe", "powerpnt.exe", "forfiles.exe",
81-
"pcalua.exe", "wmiprvse.exe")
82+
"pcalua.exe", "wmiprvse.exe") and
83+
not process.executable : (
84+
"?:\\inetpub\\wwwroot\\*\\ext\\modules\\html2pdf\\bin\\chrome\\*\\chrome-win64\\chrome.exe",
85+
"\\Device\\HarddiskVolume*\\inetpub\\wwwroot\\*\\ext\\modules\\html2pdf\\bin\\chrome\\*\\chrome-win64\\chrome.exe"
86+
)
8287
'''
8388

8489

rules/windows/command_and_control_outlook_home_page.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/08/01"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -86,7 +86,7 @@ registry where host.os.type == "windows" and event.action != "deletion" and regi
8686
registry.path : (
8787
"*\\SOFTWARE\\Microsoft\\Office\\*\\Outlook\\Webview\\*",
8888
"*\\SOFTWARE\\Microsoft\\Office\\*\\Outlook\\Today\\*"
89-
) and registry.data.strings : ("*://*", "*http*")
89+
) and registry.data.strings : ("*://*", "*:\\*")
9090
'''
9191

9292

rules/windows/credential_access_cmdline_dump_tool.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/24"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "system"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -97,7 +97,7 @@ process where host.os.type == "windows" and event.type == "start" and
9797
) or
9898
(
9999
(?process.pe.original_file_name : "RUNDLL32.EXE" or process.name : "RUNDLL32.exe") and
100-
(process.args : "MiniDump*" or process.command_line : "*comsvcs.dll*#24*")
100+
(process.args : "*MiniDump*" or process.command_line : "*comsvcs*#*24*")
101101
) or
102102
(
103103
(?process.pe.original_file_name : "RdrLeakDiag.exe" or process.name : "RdrLeakDiag.exe") and
@@ -111,7 +111,7 @@ process where host.os.type == "windows" and event.type == "start" and
111111
process.args : "-dumpFull" and process.args : "-attach") or
112112
(
113113
(?process.pe.original_file_name : "ntdsutil.exe" or process.name : "ntdsutil.exe") and
114-
process.args : "create*full*") or
114+
process.args : "cr*fu*") or
115115
(
116116
(?process.pe.original_file_name : "diskshadow.exe" or process.name : "diskshadow.exe") and process.args : "/s")
117117
)

rules/windows/credential_access_mod_wdigest_security_provider.toml

Lines changed: 5 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/01/19"
33
integration = ["endpoint", "windows", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -74,14 +74,6 @@ references = [
7474
]
7575
risk_score = 73
7676
rule_id = "d703a5af-d5b0-43bd-8ddb-7a5d500b7da5"
77-
setup = """## Setup
78-
79-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
80-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
81-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
82-
`event.ingested` to @timestamp.
83-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
84-
"""
8577
severity = "high"
8678
tags = [
8779
"Domain: Endpoint",
@@ -98,11 +90,10 @@ timestamp_override = "event.ingested"
9890
type = "eql"
9991

10092
query = '''
101-
registry where host.os.type == "windows" and event.type == "creation" and
102-
registry.path : (
103-
"HKLM\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential",
104-
"\\REGISTRY\\MACHINE\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential"
105-
) and registry.data.strings : ("1", "0x00000001") and
93+
registry where host.os.type == "windows" and event.type in ("creation", "change") and
94+
registry.value : "UseLogonCredential" and
95+
registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential" and
96+
registry.data.strings : ("1", "0x00000001") and
10697
not (process.executable : "?:\\Windows\\System32\\svchost.exe" and user.id : "S-1-5-18")
10798
'''
10899

rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml

Lines changed: 34 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"]
3+
integration = ["endpoint", "windows", "m365_defender", "crowdstrike", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/09/01"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -19,6 +19,7 @@ index = [
1919
"endgame-*",
2020
"logs-m365_defender.event-*",
2121
"logs-crowdstrike.fdr*",
22+
"logs-sentinel_one_cloud_funnel.*",
2223
]
2324
language = "eql"
2425
license = "Elastic License v2"
@@ -58,9 +59,9 @@ DLL side-loading exploits the DLL search order to load malicious code into trust
5859
- Update and patch all software on the affected system, focusing on the trusted Microsoft programs identified in the alert, to mitigate vulnerabilities exploited by DLL side-loading.
5960
- Monitor the network for any signs of lateral movement or additional compromised systems, using the indicators of compromise identified during the investigation.
6061
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional systems or data have been affected."""
61-
risk_score = 73
62+
risk_score = 47
6263
rule_id = "1160dcdb-0a0a-4a79-91d8-9b84616edebd"
63-
severity = "high"
64+
severity = "medium"
6465
tags = [
6566
"Domain: Endpoint",
6667
"OS: Windows",
@@ -73,35 +74,47 @@ tags = [
7374
"Data Source: Microsoft Defender for Endpoint",
7475
"Resources: Investigation Guide",
7576
"Data Source: Crowdstrike",
77+
"Data Source: SentinelOne",
7678
]
7779
timestamp_override = "event.ingested"
7880
type = "eql"
7981

8082
query = '''
8183
process where host.os.type == "windows" and event.type == "start" and
82-
process.pe.original_file_name in ("WinWord.exe", "EXPLORER.EXE", "w3wp.exe", "DISM.EXE") and
83-
not process.executable : ("?:\\Windows\\explorer.exe",
84-
"?:\\Windows\\SysWOW64\\explorer.exe",
85-
"?:\\Program Files\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
86-
"?:\\Program Files (x86)\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
87-
"?:\\Windows\\System32\\Dism.exe",
88-
"?:\\Windows\\SysWOW64\\Dism.exe",
89-
"?:\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\amd64\\DISM\\dism.exe",
90-
"?:\\Windows\\System32\\inetsrv\\w3wp.exe",
91-
"?:\\Windows\\SysWOW64\\inetsrv\\w3wp.exe") and
84+
(
85+
process.name : ("WinWord.exe", "EXPLORER.EXE", "w3wp.exe", "DISM.EXE") or
86+
?process.pe.original_file_name : ("WinWord.exe", "EXPLORER.EXE", "w3wp.exe", "DISM.EXE")
87+
) and
88+
not process.executable : (
89+
"\\\\?\\Volume{????????-????-????-????-????????????}\\Windows\\System32\\inetsrv\\w3wp.exe",
90+
"?:\\PROGRA~?\\MICROS~?\\Office??\\winword.exe",
91+
"?:\\Program Files\\Microsoft Office\\*\\winword.exe",
92+
"?:\\Program Files\\Microsoft Office ??\\*\\winword.exe",
93+
"?:\\Program Files\\WindowsApps\\Microsoft.Office.Desktop.*\\Office??\\winword.exe",
94+
"?:\\Program Files (x86)\\Microsoft Office\\*\\winword.exe",
95+
"?:\\Program Files (x86)\\Windows Kits\\*Assessment and Deployment Kit\\Deployment Tools\\amd64\\DISM\\dism.exe",
96+
"?:\\Windows\\explorer.exe",
97+
"?:\\Windows\\System32\\Dism.exe",
98+
"?:\\Windows\\System32\\inetsrv\\w3wp.exe",
99+
"?:\\Windows\\SysWOW64\\Dism.exe",
100+
"?:\\Windows\\SysWOW64\\explorer.exe",
101+
"?:\\Windows\\SysWOW64\\inetsrv\\w3wp.exe"
102+
) and
92103
/* Crowdstrike specific exclusion as it uses NT Object paths */
93104
not
94105
(
95106
data_stream.dataset == "crowdstrike.fdr" and
96107
process.executable : (
97-
"\\Device\\HarddiskVolume*\\Windows\\explorer.exe",
98-
"\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\explorer.exe",
99-
"\\Device\\HarddiskVolume*\\Program Files\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
100-
"\\Device\\HarddiskVolume*\\Program Files (x86)\\Microsoft Office\\root\\Office*\\WINWORD.EXE",
101-
"\\Device\\HarddiskVolume*\\Windows\\System32\\Dism.exe",
102-
"\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\Dism.exe",
108+
"\\Device\\HarddiskVolume*\\Program Files\\Microsoft Office\\*\\winword.exe",
109+
"\\Device\\HarddiskVolume*\\Program Files\\Microsoft Office ??\\*\\winword.exe",
110+
"\\Device\\HarddiskVolume*\\Program Files\\WindowsApps\\Microsoft.Office.Desktop.*\\Office??\\winword.exe",
111+
"\\Device\\HarddiskVolume*\\Program Files (x86)\\Microsoft Office\\*\\winword.exe",
103112
"\\Device\\HarddiskVolume*\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\amd64\\DISM\\dism.exe",
104-
"\\Device\\HarddiskVolume*\\Windows\\System32\\inetsrv\\w3wp.exe",
113+
"\\Device\\HarddiskVolume*\\Windows\\explorer.exe",
114+
"\\Device\\HarddiskVolume*\\Windows\\System32\\Dism.exe",
115+
"\\Device\\HarddiskVolume*\\Windows\\System32\\inetsrv\\w3wp.exe",
116+
"\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\Dism.exe",
117+
"\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\explorer.exe",
105118
"\\Device\\HarddiskVolume*\\Windows\\SysWOW64\\inetsrv\\w3wp.exe"
106119
)
107120
)

0 commit comments

Comments
 (0)