Skip to content

Commit 6c271cc

Browse files
authored
Branch was auto-updated.
2 parents 31acf07 + 050e23f commit 6c271cc

File tree

5 files changed

+324
-311
lines changed

5 files changed

+324
-311
lines changed

detections/endpoint/common_ransomware_extensions.yml

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,32 @@
11
name: Common Ransomware Extensions
22
id: a9e5c5db-db11-43ca-86a8-c852d1b2c0ec
3-
version: 7
4-
date: '2024-10-17'
3+
version: 8
4+
date: '2024-12-12'
55
author: David Dorsey, Michael Haag, Splunk, Steven Dick
66
status: production
7-
type: Hunting
7+
type: TTP
88
description: The following analytic detects modifications to files with extensions commonly associated with ransomware. It leverages the Endpoint.Filesystem data model to identify changes in file extensions that match known ransomware patterns. This activity is significant because it suggests an attacker is attempting to encrypt or alter files, potentially leading to severe data loss and operational disruption. If confirmed malicious, this activity could result in the encryption of critical data, rendering it inaccessible and causing significant damage to the organization's data integrity and availability.
99
data_source:
1010
- Sysmon EventID 11
11-
search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime count latest(Filesystem.user) as user values(Filesystem.file_path) as file_path from datamodel=Endpoint.Filesystem by Filesystem.file_name Filesystem.dest _time span=1h | `drop_dm_object_name(Filesystem)` | rex field=file_name "(?<file_extension>\.[^\.]+)$" | rex field=file_path "(?<true_file_path>([^\\\]*\\\)*).*" | stats min(firstTime) as firstTime max(lastTime) as lastTime latest(user) as user dc(true_file_path) as path_count dc(file_name) as file_count latest(file_name) as file_name latest(true_file_path) as file_path by dest file_extension | `security_content_ctime(lastTime)` | `security_content_ctime(firstTime)` | `ransomware_extensions` | where path_count > 1 OR file_count > 20 | `common_ransomware_extensions_filter`'
11+
search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_time) as lastTime count latest(Filesystem.user) as user values(Filesystem.file_path) as file_path from datamodel=Endpoint.Filesystem by Filesystem.file_name Filesystem.dest _time span=1h
12+
| `drop_dm_object_name(Filesystem)`
13+
| rex field=file_name "(?<file_extension>\.[^\.]+)$"
14+
| rex field=file_path "(?<true_file_path>([^\\\]*\\\)*).*"
15+
| stats min(firstTime) as firstTime max(lastTime) as lastTime latest(user) as user dc(true_file_path) as path_count dc(file_name) as file_count latest(true_file_path) as file_path by dest file_name
16+
| `security_content_ctime(lastTime)` | `security_content_ctime(firstTime)` | `ransomware_extensions` | where path_count > 1 OR file_count > 20 | `common_ransomware_extensions_filter`'
1217
how_to_implement: 'You must be ingesting data that records the filesystem activity from your hosts to populate the Endpoint Filesystem data model node. To see the additional metadata, add the following fields, if not already present, please review the detailed documentation on how to create a new field within Incident Review may be found here: `https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Customizenotables#Add_a_field_to_the_notable_event_details`'
1318
known_false_positives: It is possible for a legitimate file with these extensions to be created. If this is a true ransomware attack, there will be a large number of files created with these extensions.
1419
references:
1520
- https://github.com/splunk/security_content/issues/2448
21+
drilldown_searches:
22+
- name: View the detection results for - "$dest$" and "$user$"
23+
search: '%original_detection_search% | search dest = "$dest$" user = "$user$"'
24+
earliest_offset: $info_min_time$
25+
latest_offset: $info_max_time$
26+
- name: View risk events for the last 7 days for - "$dest$" and "$user$"
27+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$","$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
28+
earliest_offset: $info_min_time$
29+
latest_offset: $info_max_time$
1630
tags:
1731
analytic_story:
1832
- SamSam Ransomware
@@ -25,7 +39,7 @@ tags:
2539
asset_type: Endpoint
2640
confidence: 100
2741
impact: 90
28-
message: The device $dest$ wrote $file_count$ files to $path_count$ path(s) with the $file_extension$ extension. This extension and behavior may indicate a $Name$ ransomware attack.
42+
message: The device $dest$ wrote $file_count$ files to $path_count$ path(s) with the $Extensions$ extension. This extension and behavior may indicate a $Name$ ransomware attack.
2943
mitre_attack_id:
3044
- T1485
3145
observable:

lookups/ransomware_extensions_20231219.csv

Lines changed: 0 additions & 303 deletions
This file was deleted.

0 commit comments

Comments
 (0)