Skip to content

Commit 7986635

Browse files
authored
Merge pull request #3529 from splunk/fix-issues-0525
Fix Reported Issues
2 parents 7cd1729 + 6f6843a commit 7986635

File tree

4 files changed

+28
-15
lines changed

4 files changed

+28
-15
lines changed

detections/endpoint/ping_sleep_batch_command.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
name: Ping Sleep Batch Command
22
id: ce058d6c-79f2-11ec-b476-acde48001122
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-05-19'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
8-
description: The following analytic identifies the execution of ping sleep batch commands.
8+
description: |
9+
The following analytic identifies the execution of ping sleep batch commands.
910
It leverages data from Endpoint Detection and Response (EDR) agents, focusing on
1011
process and parent process command-line details. This activity is significant as
1112
it indicates an attempt to delay malicious code execution, potentially evading detection
@@ -17,9 +18,21 @@ data_source:
1718
- Sysmon EventID 1
1819
- CrowdStrike ProcessRollup2
1920
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20-
as lastTime from datamodel=Endpoint.Processes where `process_ping` (Processes.parent_process
21-
= "*ping*" Processes.parent_process = *-n* Processes.parent_process="* Nul*"Processes.parent_process="*>*")
22-
OR (Processes.process = "*ping*" Processes.process = *-n* Processes.process="* Nul*"Processes.process="*>*")
21+
as lastTime from datamodel=Endpoint.Processes where
22+
(
23+
Processes.parent_process= "*ping*"
24+
Processes.parent_process = *-n*
25+
Processes.parent_process="* Nul*"
26+
Processes.parent_process IN ("*>*", "*>*")
27+
Processes.parent_process IN ("*&*", "*& *")
28+
)
29+
OR (
30+
Processes.process = "*ping*"
31+
Processes.process = *-n*
32+
Processes.process="* Nul*"
33+
Processes.process IN ("*>*", "*>*")
34+
Processes.process IN ("*&*", "*& *")
35+
)
2336
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process
2437
Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id
2538
Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec

detections/endpoint/schtasks_scheduling_job_on_remote_system.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Schtasks scheduling job on remote system
22
id: 1297fb80-f42a-4b4a-9c8a-88c066237cf6
3-
version: 14
4-
date: '2025-05-02'
3+
version: 15
4+
date: '2025-05-19'
55
author: David Dorsey, Mauricio Velazco, Splunk
66
status: production
77
type: TTP
@@ -20,7 +20,7 @@ data_source:
2020
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2121
as lastTime from datamodel=Endpoint.Processes where (Processes.process_name = schtasks.exe
2222
OR Processes.original_file_name=schtasks.exe) (Processes.process="*/create*" AND
23-
Processes.process="*/s*") by Processes.action Processes.dest Processes.original_file_name
23+
Processes.process="*/s *") by Processes.action Processes.dest Processes.original_file_name
2424
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2525
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2626
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash

detections/endpoint/windows_msiexec_dllregisterserver.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows MSIExec DLLRegisterServer
22
id: fdb59aef-d88f-4909-8369-ec2afbd2c398
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-05-19'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -21,7 +21,7 @@ data_source:
2121
search:
2222
'| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2323
as lastTime from datamodel=Endpoint.Processes where `process_msiexec` Processes.process
24-
IN ("*/y*", "*-y*") by Processes.action Processes.dest Processes.original_file_name
24+
IN ("* /y*", "* -y*") by Processes.action Processes.dest Processes.original_file_name
2525
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2626
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2727
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash

detections/endpoint/windows_process_commandline_discovery.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Process Commandline Discovery
22
id: 67d2a52e-a7e2-4a5d-ae44-a21212048bc2
3-
version: 6
4-
date: '2025-05-02'
3+
version: 7
4+
date: '2025-05-19'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Hunting
@@ -20,7 +20,7 @@ description: The following analytic detects the use of Windows Management Instru
2020
further exploitation or lateral movement.
2121
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2222
as lastTime from datamodel=Endpoint.Processes where `process_wmic` Processes.process=
23-
"* process *" Processes.process= "* get commandline *" by Processes.action Processes.dest
23+
"* process *" Processes.process= "* get *" Processes.process= "*CommandLine*" by Processes.action Processes.dest
2424
Processes.original_file_name Processes.parent_process Processes.parent_process_exec
2525
Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name
2626
Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid

0 commit comments

Comments
 (0)