Skip to content

Commit 9428a91

Browse files
authored
Merge branch 'develop' into 8_million_requests
2 parents 36f3b6e + 808a674 commit 9428a91

5 files changed

+199
-202
lines changed

detections/application/cisco_secure_application_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ tags:
7979
- Splunk Enterprise Security
8080
- Splunk Cloud
8181
security_domain: threat
82-
# manual_test: We are dynamically creating the risk_score field based on the severity of the alert in the SPL and that supersedes the risk score set in the detection. Setting these to manual test since otherwise we fail integration testing. The detection is also failing on unit-testing as some of the fields set in the observables are empty.
82+
manual_test: We are dynamically creating the risk_score field based on the severity of the alert in the SPL and that supersedes the risk score set in the detection. Setting these to manual test since otherwise we fail integration testing. The detection is also failing on unit-testing as some of the fields set in the observables are empty.
8383
tests:
8484
- name: True Positive Test
8585
attack_data:

detections/endpoint/windows_process_execution_in_temp_dir.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ data_source:
1414
- CrowdStrike ProcessRollup2
1515
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes
1616
where Processes.process_path IN("*\\temp\\*")
17-
by Processes.parent_process_name Processes.parent_process Processes.process_path Processes.dest Processes.user
17+
by Processes.parent_process_name Processes.process_name Processes.parent_process Processes.process_path Processes.dest Processes.user
1818
| `drop_dm_object_name(Processes)`
1919
| `security_content_ctime(firstTime)`
2020
| `security_content_ctime(lastTime)`

detections/endpoint/windows_security_and_backup_services_stop.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ drilldown_searches:
4747
earliest_offset: $info_min_time$
4848
latest_offset: $info_max_time$
4949
rba:
50-
message: Known services $param1$ terminated by a potential ransomware on $dest$
50+
message: Known services $display_name$ terminated by a potential ransomware on $dest$
5151
risk_objects:
5252
- field: dest
5353
type: system

detections/endpoint/windows_service_created_with_suspicious_service_name.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ date: '2025-02-07'
55
author: Steven Dick
66
status: production
77
type: Anomaly
8-
description: The following analytic detects the creation of a Windows Service with a known suspicious or malicious name using Windows Event ID 7045. It leverages logs from the `wineventlog_system` to identify these services installations. This activity is significant as adversaries, including those deploying Clop ransomware, often create malicious services for lateral movement, remote code execution, persistence, and execution. If confirmed malicious, this could allow attackers to maintain persistence, execute arbitrary code, and potentially escalate privileges, posing a severe threat to the environment.
8+
description: The following analytic detects the creation of a Windows Service with a known suspicious or malicious name using Windows Event ID 7045. It leverages logs from the `wineventlog_system` to identify these services installations. This activity is significant as adversaries, including those deploying Clop ransomware, often create malicious services for lateral movement, remote code execution, persistence, and execution. If confirmed malicious, this could allow attackers to maintain persistence, execute arbitrary code, and potentially escalate privileges, posing a severe threat to the environment.
99
data_source:
1010
- Windows Event Log System 7045
1111
search: |-
1212
`wineventlog_system` EventCode=7045
13-
| stats values(user) as user, values(ImagePath) as process, count, min(_time) as firstTime, max(_time) as lastTime values(EventCode) as signature by Computer, ServiceName, StartType, ServiceType, UserID
13+
| stats values(ImagePath) as process, count, min(_time) as firstTime, max(_time) as lastTime values(EventCode) as signature by Computer, ServiceName, StartType, ServiceType, UserID
1414
| eval process_name = mvindex(split(process,"\\"),-1)
15-
| rename Computer as dest, ServiceName as object_name, ServiceType as object_type
15+
| rename Computer as dest, ServiceName as object_name, ServiceType as object_type, UserID as user_id
1616
| lookup windows_suspicious_services service_name as object_name
1717
| where isnotnull(tool_name)
1818
| `security_content_ctime(firstTime)`
@@ -44,9 +44,6 @@ rba:
4444
- field: dest
4545
type: system
4646
score: 75
47-
- field: user
48-
type: user
49-
score: 75
5047
threat_objects:
5148
- field: process
5249
type: process

0 commit comments

Comments
 (0)