Skip to content

Commit 3a034dd

Browse files
authored
Merge pull request #3296 from splunk/updated_nexus_activity
updated_nexus_activity
2 parents 8b0413c + 8835efd commit 3a034dd

File tree

44 files changed

+524
-326
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+524
-326
lines changed

detections/endpoint/any_powershell_downloadfile.yml

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Any Powershell DownloadFile
22
id: 1a93b7ea-7af7-11eb-adb5-acde48001122
3-
version: 8
4-
date: '2024-11-13'
3+
version: 9
4+
date: '2025-01-27'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -71,16 +71,18 @@ rba:
7171
type: process_name
7272
tags:
7373
analytic_story:
74-
- Hermetic Wiper
75-
- Log4Shell CVE-2021-44228
76-
- Phemedrone Stealer
7774
- Data Destruction
78-
- PXA Stealer
7975
- Ingress Tool Transfer
80-
- Malicious PowerShell
8176
- DarkCrystal RAT
82-
- Crypto Stealer
77+
- PXA Stealer
8378
- Braodo Stealer
79+
- Phemedrone Stealer
80+
- Log4Shell CVE-2021-44228
81+
- Malicious PowerShell
82+
- Hermetic Wiper
83+
- Crypto Stealer
84+
- Nexus APT Threat Activity
85+
- Earth Estries
8486
asset_type: Endpoint
8587
cve:
8688
- CVE-2021-44228
@@ -96,7 +98,6 @@ tags:
9698
tests:
9799
- name: True Positive Test
98100
attack_data:
99-
- data:
100-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
101+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
101102
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
102103
sourcetype: XmlWinEventLog

detections/endpoint/detect_renamed_psexec.yml

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed PSExec
22
id: 683e6196-b8e8-11eb-9a79-acde48001122
3-
version: 9
4-
date: '2024-11-13'
3+
version: 10
4+
date: '2025-01-27'
55
author: Michael Haag, Splunk, Alex Oberkircher, Github Community
66
status: production
77
type: Hunting
@@ -39,15 +39,17 @@ references:
3939
- https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/
4040
tags:
4141
analytic_story:
42-
- SamSam Ransomware
42+
- BlackByte Ransomware
4343
- DHS Report TA18-074A
44-
- HAFNIUM Group
4544
- DarkSide Ransomware
46-
- Active Directory Lateral Movement
45+
- SamSam Ransomware
4746
- CISA AA22-320A
47+
- HAFNIUM Group
4848
- Sandworm Tools
49-
- BlackByte Ransomware
49+
- Active Directory Lateral Movement
50+
- Nexus APT Threat Activity
5051
- DarkGate Malware
52+
- Earth Estries
5153
- Rhysida Ransomware
5254
asset_type: Endpoint
5355
mitre_attack_id:
@@ -61,7 +63,6 @@ tags:
6163
tests:
6264
- name: True Positive Test
6365
attack_data:
64-
- data:
65-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
66+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
6667
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
6768
sourcetype: XmlWinEventLog

detections/endpoint/detect_renamed_winrar.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed WinRAR
22
id: 1b7bfb2c-b8e6-11eb-99ac-acde48001122
3-
version: 7
4-
date: '2024-11-13'
3+
version: 8
4+
date: '2025-01-27'
55
author: Michael Haag, Splunk
66
status: production
77
type: Hunting
@@ -39,6 +39,8 @@ references:
3939
tags:
4040
analytic_story:
4141
- Collection and Staging
42+
- Earth Estries
43+
- Nexus APT Threat Activity
4244
- CISA AA22-277A
4345
asset_type: Endpoint
4446
mitre_attack_id:
@@ -52,7 +54,6 @@ tags:
5254
tests:
5355
- name: True Positive Test
5456
attack_data:
55-
- data:
56-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
57+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
5758
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
5859
sourcetype: XmlWinEventLog

detections/endpoint/executables_or_script_creation_in_suspicious_path.yml

Lines changed: 33 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Executables Or Script Creation In Suspicious Path
22
id: a7e3f0f0-ae42-11eb-b245-acde48001122
3-
version: 6
4-
date: '2024-12-10'
3+
version: 10
4+
date: '2025-01-27'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -61,42 +61,46 @@ rba:
6161
type: file_name
6262
tags:
6363
analytic_story:
64-
- Volt Typhoon
65-
- LockBit Ransomware
66-
- Data Destruction
67-
- Snake Keylogger
68-
- XMRig
69-
- DarkGate Malware
7064
- Chaos Ransomware
71-
- Double Zero Destructor
72-
- Hermetic Wiper
65+
- Trickbot
66+
- Snake Keylogger
67+
- CISA AA23-347A
68+
- Industroyer2
69+
- WinDealer RAT
70+
- Qakbot
7371
- Warzone RAT
74-
- AcidPour
75-
- Graceful Wipe Out Attack
76-
- BlackByte Ransomware
7772
- IcedID
78-
- NjRAT
73+
- ValleyRAT
74+
- Azorult
7975
- Handala Wiper
76+
- LockBit Ransomware
8077
- Meduza Stealer
81-
- CISA AA23-347A
78+
- Brute Ratel C4
8279
- AsyncRAT
80+
- AcidPour
81+
- Derusbi
82+
- DarkGate Malware
83+
- Graceful Wipe Out Attack
84+
- NjRAT
85+
- WhisperGate
86+
- Data Destruction
87+
- BlackByte Ransomware
88+
- AgentTesla
89+
- Swift Slicer
90+
- Crypto Stealer
91+
- Hermetic Wiper
92+
- MoonPeak
93+
- Double Zero Destructor
94+
- XMRig
95+
- PlugX
8396
- Amadey
84-
- Industroyer2
85-
- ValleyRAT
86-
- Rhysida Ransomware
8797
- DarkCrystal RAT
88-
- Crypto Stealer
89-
- Azorult
90-
- Swift Slicer
91-
- AgentTesla
92-
- Qakbot
9398
- Remcos
94-
- Trickbot
95-
- Brute Ratel C4
99+
- Nexus APT Threat Activity
100+
- Earth Estries
101+
- Rhysida Ransomware
96102
- RedLine Stealer
97-
- PlugX
98-
- MoonPeak
99-
- WhisperGate
103+
- Volt Typhoon
100104
asset_type: Endpoint
101105
mitre_attack_id:
102106
- T1036
@@ -108,7 +112,6 @@ tags:
108112
tests:
109113
- name: True Positive Test
110114
attack_data:
111-
- data:
112-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/xmrig_miner/windows-sysmon.log
115+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/xmrig_miner/windows-sysmon.log
113116
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
114117
sourcetype: XmlWinEventLog

detections/endpoint/linux_auditd_file_permission_modification_via_chmod.yml

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Linux Auditd File Permission Modification Via Chmod
22
id: 5f1d2ea7-eec0-4790-8b24-6875312ad492
3-
version: 5
4-
date: '2024-12-19'
5-
author: Teoderick Contreras, Splunk, Ivar Nygård
3+
version: 6
4+
date: '2025-01-27'
5+
author: "Teoderick Contreras, Splunk, Ivar Nyg\xE5rd"
66
status: production
77
type: Anomaly
88
description: The following analytic detects suspicious file permission modifications
@@ -22,9 +22,9 @@ search: '`linux_auditd` `linux_auditd_normalized_proctitle_process` | rename hos
2222
max(_time) as lastTime by process_exec proctitle dest | `security_content_ctime(firstTime)`
2323
| `security_content_ctime(lastTime)`| `linux_auditd_file_permission_modification_via_chmod_filter`'
2424
how_to_implement: To implement this detection, the process begins by ingesting auditd
25-
data, that consists of SYSCALL, TYPE, EXECVE and PROCTITLE events, which captures command-line
26-
executions and process details on Unix/Linux systems. These logs should be ingested
27-
and processed using Splunk Add-on for Unix and Linux (https://splunkbase.splunk.com/app/833),
25+
data, that consists of SYSCALL, TYPE, EXECVE and PROCTITLE events, which captures
26+
command-line executions and process details on Unix/Linux systems. These logs should
27+
be ingested and processed using Splunk Add-on for Unix and Linux (https://splunkbase.splunk.com/app/833),
2828
which is essential for correctly parsing and categorizing the data. The next step
2929
involves normalizing the field names to match the field names set by the Splunk
3030
Common Information Model (CIM) to ensure consistency across different data sources
@@ -58,11 +58,13 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61-
- XorDDos
61+
- Linux Privilege Escalation
6262
- Linux Living Off The Land
6363
- Compromised Linux Host
64-
- Linux Privilege Escalation
6564
- Linux Persistence Techniques
65+
- XorDDos
66+
- Nexus APT Threat Activity
67+
- Earth Estries
6668
asset_type: Endpoint
6769
mitre_attack_id:
6870
- T1222.002
@@ -75,7 +77,6 @@ tags:
7577
tests:
7678
- name: True Positive Test
7779
attack_data:
78-
- data:
79-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1222.002/linux_auditd_chmod_exec_attrib/linux_auditd_chmod_exec_attrib.log
80+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1222.002/linux_auditd_chmod_exec_attrib/linux_auditd_chmod_exec_attrib.log
8081
source: /var/log/audit/audit.log
8182
sourcetype: linux:audit

detections/endpoint/linux_auditd_nopasswd_entry_in_sudoers_file.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Nopasswd Entry In Sudoers File
22
id: 651df959-ad17-4b73-a323-90cb96d5fa1b
3-
version: 3
4-
date: '2024-11-13'
3+
version: 4
4+
date: '2025-01-27'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -58,8 +58,10 @@ rba:
5858
tags:
5959
analytic_story:
6060
- Linux Privilege Escalation
61-
- Linux Persistence Techniques
6261
- Compromised Linux Host
62+
- Linux Persistence Techniques
63+
- Nexus APT Threat Activity
64+
- Earth Estries
6365
asset_type: Endpoint
6466
mitre_attack_id:
6567
- T1548.003
@@ -72,7 +74,6 @@ tags:
7274
tests:
7375
- name: True Positive Test
7476
attack_data:
75-
- data:
76-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_nopasswd/linux_auditd_nopasswd.log
77+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_nopasswd/linux_auditd_nopasswd.log
7778
source: /var/log/audit/audit.log
7879
sourcetype: linux:audit

detections/endpoint/linux_auditd_possible_access_to_credential_files.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Possible Access To Credential Files
22
id: 0419cb7a-57ea-467b-974f-77c303dfe2a3
3-
version: 3
4-
date: '2024-11-13'
3+
version: 4
4+
date: '2025-01-27'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -60,8 +60,10 @@ rba:
6060
tags:
6161
analytic_story:
6262
- Linux Privilege Escalation
63-
- Linux Persistence Techniques
6463
- Compromised Linux Host
64+
- Linux Persistence Techniques
65+
- Nexus APT Threat Activity
66+
- Earth Estries
6567
asset_type: Endpoint
6668
mitre_attack_id:
6769
- T1003.008
@@ -74,7 +76,6 @@ tags:
7476
tests:
7577
- name: True Positive Test
7678
attack_data:
77-
- data:
78-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/linux_auditd_access_credential/linux_auditd_access_credential.log
79+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/linux_auditd_access_credential/linux_auditd_access_credential.log
7980
source: /var/log/audit/audit.log
8081
sourcetype: linux:audit

detections/endpoint/linux_auditd_possible_access_to_sudoers_file.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Possible Access To Sudoers File
22
id: 8be88f46-f7e8-4ae6-b15e-cf1b13392834
3-
version: 3
4-
date: '2024-11-13'
3+
version: 4
4+
date: '2025-01-27'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -57,8 +57,10 @@ rba:
5757
tags:
5858
analytic_story:
5959
- Linux Privilege Escalation
60-
- Linux Persistence Techniques
6160
- Compromised Linux Host
61+
- Linux Persistence Techniques
62+
- Nexus APT Threat Activity
63+
- Earth Estries
6264
asset_type: Endpoint
6365
mitre_attack_id:
6466
- T1548.003
@@ -71,7 +73,6 @@ tags:
7173
tests:
7274
- name: True Positive Test
7375
attack_data:
74-
- data:
75-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_sudoers_access/linux_auditd_sudoers_access.log
76+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_sudoers_access/linux_auditd_sudoers_access.log
7677
source: /var/log/audit/audit.log
7778
sourcetype: linux:audit

0 commit comments

Comments
 (0)