Skip to content

Commit 265cd83

Browse files
committed
headless_bee
1 parent 1eb8731 commit 265cd83

5 files changed

+8
-13
lines changed

detections/endpoint/executables_or_script_creation_in_suspicious_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ data_source:
1818
search: '| tstats `security_content_summariesonly` values(Filesystem.file_path) as file_path count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem
1919
where Filesystem.file_name IN ("*.exe", "*.dll", "*.sys", "*.com", "*.vbs", "*.vbe", "*.js", "*.ps1", "*.bat", "*.cmd", "*.pif")
2020
AND Filesystem.file_path IN ("*\\windows\\fonts\\*", "*\\users\\public\\*", "*\\windows\\debug\\*", "*\\Users\\Administrator\\Music\\*", "*\\Windows\\servicing\\*", "*\\Users\\Default\\*", "*Recycle.bin*", "*\\Windows\\Media\\*",
21-
"*\\Windows\\repair\\*", "*\\PerfLogs\\*", "*\\programdata\\*") AND NOT(Filesystem.file_path IN("*\\temp\\*"))
21+
"*\\Windows\\repair\\*", "*\\PerfLogs\\*") AND NOT(Filesystem.file_path IN("*\\temp\\*"))
2222
by Filesystem.file_create_time Filesystem.process_id Filesystem.file_name Filesystem.user
2323
| `drop_dm_object_name(Filesystem)`
2424
| `security_content_ctime(firstTime)`

detections/endpoint/executables_or_script_creation_in_temp_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ data_source:
1717
- Sysmon EventID 11
1818
search: '| tstats `security_content_summariesonly` values(Filesystem.file_path) as file_path count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem
1919
where Filesystem.file_name IN ("*.exe", "*.dll", "*.sys", "*.com", "*.vbs", "*.vbe", "*.js", "*.ps1", "*.bat", "*.cmd", "*.pif")
20-
AND Filesystem.file_path IN ("*\\temp\\*")
20+
AND Filesystem.file_path IN ("*\\AppData\\Local\\Temp\\*", "*:\\Windows\\Temp\\*", "*:\\Temp*")
2121
by Filesystem.file_create_time Filesystem.process_id Filesystem.file_name Filesystem.user
2222
| `drop_dm_object_name(Filesystem)`
2323
| `security_content_ctime(firstTime)`

detections/endpoint/windows_anonymous_pipe_activity.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,6 @@ drilldown_searches:
3434
| `security_content_ctime(lastTime)`'
3535
earliest_offset: $info_min_time$
3636
latest_offset: $info_max_time$
37-
rba:
38-
message: An anonymous Pipe Channel activity on [$dest$].
39-
risk_objects:
40-
- field: dest
41-
type: system
42-
score: 30
43-
threat_objects: []
4437
tags:
4538
analytic_story:
4639
- SnappyBee

detections/endpoint/windows_create_test_registry.yml renamed to detections/endpoint/windows_snappybee_create_test_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
name: Windows Create Test Registry
1+
name: Windows SnappyBee Create Test Registry
22
id: 80402396-d78a-4c6e-ade5-7697ea670adf
33
version: 1
44
date: '2025-02-11'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: TTP
8-
description: The following analytic detects modifications to the Windows registry under `SOFTWARE\Microsoft\Test`, a location rarely used by legitimate applications in a production environment. Monitoring this key is crucial, as adversaries may create or alter values here for persistence, privilege escalation, or system manipulation. The detection leverages **Sysmon Event ID 13** (Registry Value Set) to identify unauthorized changes. Analysts should investigate processes associated with these modifications, particularly unsigned executables or suspicious command-line activity, as they may indicate malware or unauthorized software behavior.
8+
description: The following analytic detects modifications to the Windows registry under `SOFTWARE\Microsoft\Test`, a location rarely used by legitimate applications in a production environment. Monitoring this key is crucial, as adversaries may create or alter values here for monitoring update of itself file path, updated configuration file, or system mark compromised. The detection leverages **Sysmon Event ID 13** (Registry Value Set) to identify unauthorized changes. Analysts should investigate processes associated with these modifications, particularly unsigned executables or suspicious command-line activity, as they may indicate malware or unauthorized software behavior.
99
data_source:
1010
- Sysmon EventID 13
1111
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Registry
@@ -14,7 +14,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1414
| `drop_dm_object_name(Registry)`
1515
| `security_content_ctime(firstTime)`
1616
| `security_content_ctime(lastTime)`
17-
| `windows_create_test_registry_filter`'
17+
| `windows_snappybee_create_test_registry_filter`'
1818
how_to_implement: To successfully implement this search you need to be ingesting information
1919
on process that include the name of the process responsible for the changes from
2020
your endpoints into the `Endpoint` datamodel in the `Registry` node. Also make sure

detections/endpoint/windows_svchost_exe_parent_process_anomaly.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,9 @@ data_source:
1010
- Sysmon EventID 1
1111
- Windows Event Log Security 4688
1212
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
13-
where Processes.parent_process_name != "services.exe" AND Processes.process_name = "svchost.exe" AND Processes.process != unknown
13+
where Processes.parent_process_name != "services.exe" AND Processes.process_name = "svchost.exe" AND Processes.process != unknown
14+
AND Processes.parent_process_path != "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe"
15+
AND Processes.parent_process_path != "C:\\Program Files\\Windows Defender\\MsMpEng.exe"
1416
by Processes.parent_process_name Processes.parent_process_path Processes.parent_process Processes.process_path Processes.process Processes.original_file_name Processes.dest Processes.user
1517
| `drop_dm_object_name(Processes)`
1618
| `security_content_ctime(firstTime)`

0 commit comments

Comments
 (0)