Skip to content

Commit 0799c5e

Browse files
committed
refactor(rules): Adapt rules to *.path filter fields
All rules referencing file.name/image.name/registry.key.name are adapted to use the new *.path fields. This effectively leads to a breaking change, that's why all affected rules minimum engine version is bumped.
1 parent 0677c5e commit 0799c5e

File tree

35 files changed

+114
-114
lines changed

35 files changed

+114
-114
lines changed

rules/credentail_access_file_access_to_sam_database.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: File access to SAM database
22
id: e3dace20-4962-4381-884e-40dcdde66626
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies access to the Security Account Manager on-disk database.
66
labels:
@@ -17,7 +17,7 @@ labels:
1717
condition: >
1818
open_file
1919
and
20-
file.name imatches
20+
file.path imatches
2121
(
2222
'?:\\WINDOWS\\SYSTEM32\\CONFIG\\SAM',
2323
'\\Device\\HarddiskVolumeShadowCopy*\\WINDOWS\\SYSTEM32\\CONFIG\\SAM',
@@ -32,4 +32,4 @@ condition: >
3232
'?:\\Windows\\System32\\lsass.exe'
3333
)
3434
35-
min-engine-version: 2.0.0
35+
min-engine-version: 2.4.0

rules/credential_access_lsass_memory_dump_preparation_via_silent_process_exit.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: LSASS memory dump preparation via SilentProcessExit
22
id: d325e426-f89a-4f7c-b655-3874dad07986
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Adversaries may exploit the SilentProcessExit debugging technique to conduct
66
LSASS memory dump via WerFault.exe (Windows Error Reporting) binary by creating
@@ -27,8 +27,8 @@ references:
2727
condition: >
2828
modify_registry
2929
and
30-
registry.key.name
30+
registry.path
3131
imatches
3232
'HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\lsass*'
3333
34-
min-engine-version: 2.0.0
34+
min-engine-version: 2.4.0

rules/credential_access_lsass_memory_dump_via_wer.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: LSASS memory dump via Windows Error Reporting
22
id: 7b4a74e2-c7a7-4c1f-b2ce-0e0273c3add7
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Adversaries may abuse Windows Error Reporting service to dump LSASS memory.
66
The ALPC protocol can send a message to report an exception on LSASS and
@@ -22,6 +22,6 @@ condition: >
2222
sequence
2323
maxspan 2m
2424
|spawn_process and ps.child.name in ('WerFault.exe', 'WerFaultSecure.exe')| by ps.child.uuid
25-
|write_minidump_file and file.name icontains 'lsass'| by ps.uuid
25+
|write_minidump_file and file.path icontains 'lsass'| by ps.uuid
2626
27-
min-engine-version: 2.0.0
27+
min-engine-version: 2.4.0

rules/credential_access_lsass_memory_dumping.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: LSASS memory dumping via legitimate or offensive tools
22
id: 335795af-246b-483e-8657-09a30c102e63
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Detects an attempt to dump the LSAAS memory to the disk by employing legitimate
66
tools such as procdump, Task Manager, Process Explorer or built-in Windows tools
@@ -39,7 +39,7 @@ condition: >
3939
output: >
4040
Detected an attempt by `%1.ps.name` process to access and read
4141
the memory of the **Local Security And Authority Subsystem Service**
42-
and subsequently write the `%2.file.name` dump file to the disk device
42+
and subsequently write the `%2.file.path` dump file to the disk device
4343
severity: critical
4444

45-
min-engine-version: 2.0.0
45+
min-engine-version: 2.4.0

rules/credential_access_potential_sam_hive_dumping.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Potential SAM hive dumping
22
id: 2f326557-0291-4eb1-a87a-7a17b7d941cb
3-
version: 1.0.0
3+
version: 1.0.1
44
description:
55
Identifies access to the Security Account Manager registry hives.
66
labels:
@@ -30,10 +30,10 @@ condition: >
3030
| by ps.child.uuid
3131
|open_registry
3232
and
33-
registry.key.name imatches 'HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\*'
33+
registry.path imatches 'HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\*'
3434
and
3535
not
36-
registry.key.name imatches
36+
registry.path imatches
3737
(
3838
'HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\Users',
3939
'HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\Users\\Names',
@@ -68,4 +68,4 @@ condition: >
6868
)
6969
| by ps.uuid
7070
71-
min-engine-version: 2.0.0
71+
min-engine-version: 2.4.0

rules/credential_access_suspicious_access_to_active_directory_domain_database.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious access to Active Directory domain database
22
id: a30c100e-28d0-4aa0-b98d-0d38025c2c29
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Detects suspicious access to the Active Directory domain database.
66
Adversaries may attempt to access or create a copy of the Active Directory
@@ -19,7 +19,7 @@ labels:
1919
condition: >
2020
open_file
2121
and
22-
file.name imatches
22+
file.path imatches
2323
(
2424
'\\Device\\HarddiskVolumeShadowCopy*\\WINDOWS\\NTDS\\ntds.dit',
2525
'?:\\WINDOWS\\NTDS\\ntds.dit'
@@ -32,4 +32,4 @@ condition: >
3232
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\MsMpEng.exe'
3333
)
3434
35-
min-engine-version: 2.0.0
35+
min-engine-version: 2.4.0

rules/credential_access_suspicious_access_to_unattended_panther_files.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious access to Unattended Panther files
22
id: d305fb15-6ad1-4d61-a84b-ada462f23a55
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies suspicious to access to unattend.xml files where credentials
66
are commonly stored within the Panther directory. Adversaries may search local
@@ -19,7 +19,7 @@ labels:
1919
condition: >
2020
open_file
2121
and
22-
file.name imatches
22+
file.path imatches
2323
(
2424
'?:\\Windows\\Panther\\Unattend\\Unattended.xml',
2525
'?:\\Windows\\Panther\\Unattend\\Unattend.xml',
@@ -35,4 +35,4 @@ condition: >
3535
'?:\\ProgramData\\Microsoft\\Windows Defender\\*\\MsMpEng.exe'
3636
)
3737
38-
min-engine-version: 2.0.0
38+
min-engine-version: 2.4.0

rules/credential_access_suspicious_access_to_windows_dpapi_master_keys.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious access to Windows DPAPI Master Keys
22
id: b1d5732a-5ad4-4cdd-8791-c22e34c591e5
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Detects suspicious processes accessing the Windows Data Protection API Master keys
66
which is a sign of potential credential stealing.
@@ -26,7 +26,7 @@ references:
2626
condition: >
2727
open_file
2828
and
29-
file.name imatches
29+
file.path imatches
3030
(
3131
'?:\\Windows\\System32\\Microsoft\\Protect\\S-1-5-18\\Users\\*',
3232
'?:\\Users\\*\\AppData\\*\\Microsoft\\Protect\\S-1-5-21*\\*',
@@ -42,4 +42,4 @@ condition: >
4242
'?:\\Windows\\SysWOW64\\*'
4343
)
4444
45-
min-engine-version: 2.0.0
45+
min-engine-version: 2.4.0

rules/credential_access_suspicious_access_to_windows_manager_files.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious access to Windows Credential Manager files
22
id: 4ab688f7-94e2-481b-9c7f-c49f3a79a379
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies suspicious processes trying to acquire credentials from the Windows Credential Manager.
66
labels:
@@ -17,7 +17,7 @@ labels:
1717
condition: >
1818
open_file
1919
and
20-
file.name imatches
20+
file.path imatches
2121
(
2222
'?:\\Users\\*\\AppData\\*\\Microsoft\\Credentials\\*',
2323
'?:\\Windows\\System32\\config\\systemprofile\\AppData\\*\\Microsoft\\Credentials\\*'
@@ -31,4 +31,4 @@ condition: >
3131
'?:\\Windows\\System32\\lsass.exe'
3232
)
3333
34-
min-engine-version: 2.0.0
34+
min-engine-version: 2.4.0

rules/credential_access_suspicious_access_to_windows_vault_files.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious access to Windows Vault files
22
id: 44400221-f98d-424a-9388-497c75b18924
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies attempts from adversaries to acquire credentials from Vault files.
66
labels:
@@ -17,7 +17,7 @@ labels:
1717
condition: >
1818
open_file
1919
and
20-
file.name imatches
20+
file.path imatches
2121
(
2222
'?:\\Users\\*\\AppData\\*\\Microsoft\\Vault\\*\\*',
2323
'?:\\ProgramData\\Microsoft\\Vault\\*'
@@ -34,4 +34,4 @@ condition: >
3434
'?:\\Windows\\System32\\svchost.exe'
3535
)
3636
37-
min-engine-version: 2.0.0
37+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)