Skip to content

Commit 3a00645

Browse files
authored
Merge branch 'develop' into objectivity_stealer
2 parents 897986e + 1384d69 commit 3a00645

File tree

3 files changed

+62
-53
lines changed

3 files changed

+62
-53
lines changed

detections/endpoint/disabling_windows_local_security_authority_defences_via_registry.yml

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Disabling Windows Local Security Authority Defences via Registry
22
id: 45cd08f8-a2c9-4f4e-baab-e1a0c624b0ab
3-
version: 7
4-
date: '2025-05-02'
5-
author: Dean Luxton
3+
version: 8
4+
date: '2025-08-20'
5+
author: Dean Luxton,Teoderick Contreras Splunk
66
status: production
77
type: TTP
88
data_source:
@@ -16,13 +16,15 @@ description: The following analytic identifies the deletion of registry keys tha
1616
If confirmed malicious, this action could allow attackers to bypass critical security
1717
mechanisms, leading to potential system compromise and persistent access.
1818
search: '| tstats `security_content_summariesonly` min(_time) as _time from datamodel=Endpoint.Registry
19-
where Registry.registry_path IN ("*\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\LsaCfgFlags",
20-
"*\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\*", "*\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\RunAsPPL")
21-
Registry.action IN (deleted, unknown) by Registry.action Registry.dest Registry.process_guid
19+
where Registry.registry_path IN ("*\\Lsa\\LsaCfgFlags", "*\\Lsa\\RunAsPPL", "*\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\*")
20+
AND ((Registry.action = deleted)
21+
OR (Registry.action = modified AND Registry.registry_value_data IN(0x00000000, 0)))
22+
by Registry.action Registry.dest Registry.process_guid
2223
Registry.process_id Registry.registry_hive Registry.registry_path Registry.registry_key_name
2324
Registry.registry_value_data Registry.registry_value_name Registry.registry_value_type
2425
Registry.status Registry.user Registry.vendor_product | `drop_dm_object_name(Registry)`
25-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `disabling_windows_local_security_authority_defences_via_registry_filter`'
26+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
27+
| `disabling_windows_local_security_authority_defences_via_registry_filter`'
2628
how_to_implement: The detection is based on data that originates from Endpoint Detection
2729
and Response (EDR) agents. These agents are designed to provide security-related
2830
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -77,6 +79,6 @@ tags:
7779
tests:
7880
- name: True Positive Test
7981
attack_data:
80-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1556/disable_lsa_protection/windows-sysmon.log
82+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1556/disable_lsa_protection_new/lsa_reg_deletion_modification.log
8183
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
8284
sourcetype: XmlWinEventLog
Lines changed: 42 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,23 @@
11
name: Windows Rundll32 Load DLL in Temp Dir
22
id: 520da6fa-7d5d-4a3b-9c61-1087517b8d0f
3-
version: 1
4-
date: '2025-07-29'
3+
version: 2
4+
date: '2025-08-22'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
8-
description: This detection identifies instances where rundll32.exe is used to load a DLL from a temporary directory, such as C:\Users\<User>\AppData\Local\Temp\ or C:\Windows\Temp\. While rundll32.exe is a legitimate Windows utility used to execute functions exported from DLLs, its use to load libraries from temporary locations is highly suspicious. These directories are commonly used by malware and red team tools to stage payloads or execute code in-memory without writing it to more persistent locations. This behavior often indicates defense evasion, initial access, or privilege escalation, especially when the DLL is unsigned, recently written, or executed shortly after download. In normal user workflows, DLLs are not typically loaded from Temp paths, making this a high-fidelity indicator of potentially malicious activity. Monitoring this pattern is essential for detecting threats that attempt to blend in with native system processes while bypassing traditional application controls.
8+
description: This detection identifies instances where rundll32.exe is used to load a DLL from a temporary directory, such as C:\Users\<User>\AppData\Local\Temp\ or C:\Windows\Temp\. While rundll32.exe is a legitimate Windows utility used to execute functions exported from DLLs, its use to load libraries from temporary locations is highly suspicious. These directories are commonly used by malware and red team tools to stage payloads or execute code in-memory without writing it to more persistent locations. This behavior often indicates defense evasion, initial access, or privilege escalation, especially when the DLL is unsigned, recently written, or executed shortly after download. In normal user workflows, DLLs are not typically loaded from Temp paths, making this a high-fidelity indicator of potentially malicious activity. Monitoring this pattern is essential for detecting threats that attempt to blend in with native system processes while bypassing traditional application controls.
99
data_source:
10-
- Sysmon EventID 1
11-
search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
10+
- Sysmon EventID 1
11+
search:
12+
'| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
1213
where `process_rundll32` AND Processes.process IN ("*temp\\*", "*\\tmp\\*")
13-
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path Processes.user Processes.user_id Processes.vendor_product
14-
| `drop_dm_object_name(Processes)`
15-
| `security_content_ctime(firstTime)`
16-
| `security_content_ctime(lastTime)`
17-
| `rundll_loading_dll_by_ordinal_filter`
14+
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path Processes.user Processes.user_id Processes.vendor_product
15+
| `drop_dm_object_name(Processes)`
16+
| `security_content_ctime(firstTime)`
17+
| `security_content_ctime(lastTime)`
1818
| `windows_rundll32_load_dll_in_temp_dir_filter`'
19-
how_to_implement: The detection is based on data that originates from Endpoint Detection
19+
how_to_implement:
20+
The detection is based on data that originates from Endpoint Detection
2021
and Response (EDR) agents. These agents are designed to provide security-related
2122
telemetry from the endpoints where the agent is installed. To implement this search,
2223
you must ingest logs that contain the process GUID, process name, and parent process.
@@ -27,44 +28,45 @@ how_to_implement: The detection is based on data that originates from Endpoint D
2728
names and speed up the data modeling process.
2829
known_false_positives: unknown
2930
references:
30-
- https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/
31+
- https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/
3132
drilldown_searches:
32-
- name: View the detection results for - "$dest$"
33-
search: '%original_detection_search% | search dest = "$dest$"'
34-
earliest_offset: $info_min_time$
35-
latest_offset: $info_max_time$
36-
- name: View risk events for the last 7 days for - "$dest$"
37-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
38-
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
39-
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
40-
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
41-
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
42-
| `security_content_ctime(lastTime)`'
43-
earliest_offset: $info_min_time$
44-
latest_offset: $info_max_time$
33+
- name: View the detection results for - "$dest$"
34+
search: '%original_detection_search% | search dest = "$dest$"'
35+
earliest_offset: $info_min_time$
36+
latest_offset: $info_max_time$
37+
- name: View risk events for the last 7 days for - "$dest$"
38+
search:
39+
'| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
40+
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
41+
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
42+
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
43+
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
44+
| `security_content_ctime(lastTime)`'
45+
earliest_offset: $info_min_time$
46+
latest_offset: $info_max_time$
4547
rba:
4648
message: Risk Message goes here
4749
risk_objects:
48-
- field: dest
49-
type: system
50-
score: 50
50+
- field: dest
51+
type: system
52+
score: 50
5153
threat_objects:
52-
- field: parent_process_name
53-
type: parent_process_name
54+
- field: parent_process_name
55+
type: parent_process_name
5456
tags:
5557
analytic_story:
56-
- Interlock Rat
58+
- Interlock Rat
5759
asset_type: Endpoint
5860
mitre_attack_id:
59-
- T1218.011
61+
- T1218.011
6062
product:
61-
- Splunk Enterprise
62-
- Splunk Enterprise Security
63-
- Splunk Cloud
63+
- Splunk Enterprise
64+
- Splunk Enterprise Security
65+
- Splunk Cloud
6466
security_domain: endpoint
6567
tests:
66-
- name: True Positive Test
67-
attack_data:
68-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1218.011/rundll32_dll_in_temp/rundll32_tmp.log
69-
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
70-
sourcetype: XmlWinEventLog
68+
- name: True Positive Test
69+
attack_data:
70+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1218.011/rundll32_dll_in_temp/rundll32_tmp.log
71+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
72+
sourcetype: XmlWinEventLog

detections/endpoint/windows_wmi_process_and_service_list.yml

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows WMI Process And Service List
22
id: ef3c5ef2-3f6d-4087-aa75-49bf746dc907
3-
version: 6
4-
date: '2025-05-02'
3+
version: 7
4+
date: '2025-08-25'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -18,14 +18,19 @@ data_source:
1818
- Windows Event Log Security 4688
1919
- CrowdStrike ProcessRollup2
2020
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
21-
as lastTime from datamodel=Endpoint.Processes where `process_wmic` Processes.process
22-
IN ("*process list*", "*service list*") by Processes.action Processes.dest Processes.original_file_name
21+
as lastTime from datamodel=Endpoint.Processes where
22+
`process_wmic`
23+
Processes.process IN ("*process*", "*service*")
24+
Processes.process = "*list*"
25+
by Processes.action Processes.dest Processes.original_file_name
2326
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2427
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2528
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
2629
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
2730
Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)`
28-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_wmi_process_and_service_list_filter`'
31+
| `security_content_ctime(firstTime)`
32+
| `security_content_ctime(lastTime)`
33+
| `windows_wmi_process_and_service_list_filter`'
2934
how_to_implement: The detection is based on data that originates from Endpoint Detection
3035
and Response (EDR) agents. These agents are designed to provide security-related
3136
telemetry from the endpoints where the agent is installed. To implement this search,

0 commit comments

Comments
 (0)