Skip to content

Commit 9c3fd5d

Browse files
authored
Merge pull request #3314 from splunk/headless_bee
headless_bee
2 parents 5e5d72a + e21fe10 commit 9c3fd5d

26 files changed

+634
-123
lines changed

detections/endpoint/detect_rare_executables.yml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Rare Executables
22
id: 44fddcb2-8d3b-454c-874e-7c6de5a4f7ac
3-
version: 7
4-
date: '2024-11-13'
3+
version: '8'
4+
date: '2025-02-07'
55
author: Bhavin Patel, Splunk
66
status: production
77
type: Anomaly
@@ -58,9 +58,12 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61-
- Unusual Processes
61+
- SnappyBee
6262
- Rhysida Ransomware
63+
- China-Nexus Threat Activity
6364
- Crypto Stealer
65+
- Earth Estries
66+
- Unusual Processes
6467
asset_type: Endpoint
6568
mitre_attack_id:
6669
- T1204
@@ -72,7 +75,6 @@ tags:
7275
tests:
7376
- name: True Positive Test
7477
attack_data:
75-
- data:
76-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1204/rare_executables/windows-sysmon.log
78+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1204/rare_executables/windows-sysmon.log
7779
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
7880
sourcetype: XmlWinEventLog

detections/endpoint/executables_or_script_creation_in_suspicious_path.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,14 @@ description: The following analytic identifies the creation of executables or sc
1515
a significant security threat.
1616
data_source:
1717
- Sysmon EventID 11
18-
search: '| tstats `security_content_summariesonly` values(Filesystem.file_path) as
19-
file_path count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem
20-
where Filesystem.file_name IN ("*.exe", "*.dll", "*.sys", "*.com", "*.vbs", "*.vbe",
21-
"*.js", "*.ps1", "*.bat", "*.cmd", "*.pif") AND Filesystem.file_path IN ("*\\windows\\fonts\\*",
22-
"*\\windows\\temp\\*", "*\\users\\public\\*", "*\\windows\\debug\\*", "*\\Users\\Administrator\\Music\\*",
23-
"*\\Windows\\servicing\\*", "*\\Users\\Default\\*", "*Recycle.bin*", "*\\Windows\\Media\\*",
24-
"*\\Windows\\repair\\*", "*\\AppData\\Local\\Temp*", "*\\PerfLogs\\*", "*:\\temp\\*")
18+
search: '| tstats `security_content_summariesonly` values(Filesystem.file_path) as file_path count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem
19+
where Filesystem.file_name IN ("*.exe", "*.dll", "*.sys", "*.com", "*.vbs", "*.vbe", "*.js", "*.ps1", "*.bat", "*.cmd", "*.pif")
20+
AND Filesystem.file_path IN ("*\\windows\\fonts\\*", "*\\users\\public\\*", "*\\windows\\debug\\*", "*\\Users\\Administrator\\Music\\*", "*\\Windows\\servicing\\*", "*\\Users\\Default\\*", "*Recycle.bin*", "*\\Windows\\Media\\*",
21+
"*\\Windows\\repair\\*", "*\\PerfLogs\\*") AND NOT(Filesystem.file_path IN("*\\temp\\*"))
2522
by Filesystem.file_create_time Filesystem.process_id Filesystem.file_name Filesystem.user
26-
| `drop_dm_object_name(Filesystem)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
23+
| `drop_dm_object_name(Filesystem)`
24+
| `security_content_ctime(firstTime)`
25+
| `security_content_ctime(lastTime)`
2726
| `executables_or_script_creation_in_suspicious_path_filter`'
2827
how_to_implement: To successfully implement this search you need to be ingesting information
2928
on process that include the name of the Filesystem responsible for the changes from
@@ -100,6 +99,7 @@ tags:
10099
- Azorult
101100
- Data Destruction
102101
- Amadey
102+
- SnappyBee
103103
- WhisperGate
104104
asset_type: Endpoint
105105
mitre_attack_id:
@@ -112,6 +112,6 @@ tags:
112112
tests:
113113
- name: True Positive Test
114114
attack_data:
115-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/xmrig_miner/windows-sysmon.log
115+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1036/executables_suspicious_file_path/exec_susp_path2.log
116116
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
117117
sourcetype: XmlWinEventLog
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
name: Executables Or Script Creation In Temp Path
2+
id: e0422b71-2c05-4f32-8754-01fb415f49c9
3+
version: 11
4+
date: '2025-02-11'
5+
author: Teoderick Contreras, Splunk
6+
status: production
7+
type: Anomaly
8+
description: The following analytic identifies the creation of executables or scripts
9+
in suspicious file paths on Windows systems. It leverages the Endpoint.Filesystem
10+
data model to detect files with specific extensions (e.g., .exe, .dll, .ps1) created
11+
in uncommon directories (e.g., \windows\fonts\, \users\public\). This activity is
12+
significant as adversaries often use these paths to evade detection and maintain
13+
persistence. If confirmed malicious, this behavior could allow attackers to execute
14+
unauthorized code, escalate privileges, or persist within the environment, posing
15+
a significant security threat.
16+
data_source:
17+
- Sysmon EventID 11
18+
search: '| tstats `security_content_summariesonly` values(Filesystem.file_path) as file_path count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem
19+
where Filesystem.file_name IN ("*.exe", "*.dll", "*.sys", "*.com", "*.vbs", "*.vbe", "*.js", "*.ps1", "*.bat", "*.cmd", "*.pif")
20+
AND Filesystem.file_path IN ("*\\AppData\\Local\\Temp\\*", "*:\\Windows\\Temp\\*", "*:\\Temp*")
21+
by Filesystem.file_create_time Filesystem.process_id Filesystem.file_name Filesystem.user
22+
| `drop_dm_object_name(Filesystem)`
23+
| `security_content_ctime(firstTime)`
24+
| `security_content_ctime(lastTime)`
25+
| `executables_or_script_creation_in_temp_path_filter`'
26+
how_to_implement: To successfully implement this search you need to be ingesting information
27+
on process that include the name of the Filesystem responsible for the changes from
28+
your endpoints into the `Endpoint` datamodel in the `Filesystem` node.
29+
known_false_positives: Administrators may allow creation of script or exe in the paths
30+
specified. Filter as needed.
31+
references:
32+
- https://thedfirreport.com/2020/04/20/sqlserver-or-the-miner-in-the-basement/
33+
- https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
34+
- https://twitter.com/pr0xylife/status/1590394227758104576
35+
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
36+
drilldown_searches:
37+
- name: View the detection results for - "$user$"
38+
search: '%original_detection_search% | search user = "$user$"'
39+
earliest_offset: $info_min_time$
40+
latest_offset: $info_max_time$
41+
- name: View risk events for the last 7 days for - "$user$"
42+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$user$")
43+
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
44+
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
45+
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
46+
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
47+
| `security_content_ctime(lastTime)`'
48+
earliest_offset: $info_min_time$
49+
latest_offset: $info_max_time$
50+
rba:
51+
message: Potentially suspicious executable or script with file name $file_name$, $file_path$
52+
and process_id $process_id$ was created in temporary folder by $user$
53+
risk_objects:
54+
- field: user
55+
type: user
56+
score: 20
57+
threat_objects:
58+
- field: file_name
59+
type: file_name
60+
tags:
61+
analytic_story:
62+
- Chaos Ransomware
63+
- Trickbot
64+
- Snake Keylogger
65+
- CISA AA23-347A
66+
- Industroyer2
67+
- WinDealer RAT
68+
- Qakbot
69+
- Warzone RAT
70+
- IcedID
71+
- ValleyRAT
72+
- Azorult
73+
- Handala Wiper
74+
- LockBit Ransomware
75+
- Meduza Stealer
76+
- Brute Ratel C4
77+
- AsyncRAT
78+
- AcidPour
79+
- Derusbi
80+
- DarkGate Malware
81+
- Graceful Wipe Out Attack
82+
- NjRAT
83+
- WhisperGate
84+
- Data Destruction
85+
- BlackByte Ransomware
86+
- AgentTesla
87+
- Swift Slicer
88+
- Crypto Stealer
89+
- Hermetic Wiper
90+
- MoonPeak
91+
- Double Zero Destructor
92+
- XMRig
93+
- PlugX
94+
- Amadey
95+
- DarkCrystal RAT
96+
- Remcos
97+
- China-Nexus Threat Activity
98+
- Earth Estries
99+
- Rhysida Ransomware
100+
- RedLine Stealer
101+
- Volt Typhoon
102+
- SnappyBee
103+
asset_type: Endpoint
104+
mitre_attack_id:
105+
- T1036
106+
product:
107+
- Splunk Enterprise
108+
- Splunk Enterprise Security
109+
- Splunk Cloud
110+
security_domain: endpoint
111+
tests:
112+
- name: True Positive Test
113+
attack_data:
114+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/xmrig_miner/windows-sysmon.log
115+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
116+
sourcetype: XmlWinEventLog

detections/endpoint/linux_auditd_file_permission_modification_via_chmod.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,12 +58,12 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61-
- Linux Privilege Escalation
62-
- Linux Living Off The Land
63-
- Compromised Linux Host
61+
- China-Nexus Threat Activity
6462
- Linux Persistence Techniques
6563
- XorDDos
66-
- China-Nexus Threat Activity
64+
- Linux Privilege Escalation
65+
- Compromised Linux Host
66+
- Linux Living Off The Land
6767
- Earth Estries
6868
asset_type: Endpoint
6969
mitre_attack_id:
@@ -80,3 +80,4 @@ tests:
8080
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1222.002/linux_auditd_chmod_exec_attrib/auditd_proctitle_chmod.log
8181
source: auditd
8282
sourcetype: auditd
83+

detections/endpoint/linux_auditd_nopasswd_entry_in_sudoers_file.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,10 +57,10 @@ rba:
5757
threat_objects: []
5858
tags:
5959
analytic_story:
60+
- China-Nexus Threat Activity
61+
- Linux Persistence Techniques
6062
- Linux Privilege Escalation
6163
- Compromised Linux Host
62-
- Linux Persistence Techniques
63-
- China-Nexus Threat Activity
6464
- Earth Estries
6565
asset_type: Endpoint
6666
mitre_attack_id:
@@ -77,3 +77,4 @@ tests:
7777
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_nopasswd/linux_auditd_nopasswd2.log
7878
source: auditd
7979
sourcetype: auditd
80+

detections/endpoint/linux_auditd_possible_access_to_credential_files.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,10 +57,10 @@ rba:
5757
threat_objects: []
5858
tags:
5959
analytic_story:
60+
- China-Nexus Threat Activity
61+
- Linux Persistence Techniques
6062
- Linux Privilege Escalation
6163
- Compromised Linux Host
62-
- Linux Persistence Techniques
63-
- China-Nexus Threat Activity
6464
- Earth Estries
6565
asset_type: Endpoint
6666
mitre_attack_id:
@@ -76,3 +76,4 @@ tests:
7676
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/linux_auditd_access_credential/auditd_proctitle_access_cred.log
7777
source: auditd
7878
sourcetype: auditd
79+

detections/endpoint/linux_auditd_possible_access_to_sudoers_file.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,10 +56,10 @@ rba:
5656
threat_objects: []
5757
tags:
5858
analytic_story:
59+
- China-Nexus Threat Activity
60+
- Linux Persistence Techniques
5961
- Linux Privilege Escalation
6062
- Compromised Linux Host
61-
- Linux Persistence Techniques
62-
- China-Nexus Threat Activity
6363
- Earth Estries
6464
asset_type: Endpoint
6565
mitre_attack_id:
@@ -76,3 +76,4 @@ tests:
7676
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_sudoers_access/linux_auditd_sudoers_access.log
7777
source: auditd
7878
sourcetype: auditd
79+

detections/endpoint/linux_auditd_preload_hijack_library_calls.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ rba:
5959
threat_objects: []
6060
tags:
6161
analytic_story:
62+
- China-Nexus Threat Activity
63+
- Linux Persistence Techniques
6264
- Linux Privilege Escalation
6365
- Compromised Linux Host
64-
- Linux Persistence Techniques
65-
- China-Nexus Threat Activity
6666
- Earth Estries
6767
asset_type: Endpoint
6868
mitre_attack_id:
@@ -79,3 +79,4 @@ tests:
7979
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1574.006/linux_auditd_ldpreload/auditd_execve_ldpreload.log
8080
source: auditd
8181
sourcetype: auditd
82+

detections/endpoint/non_chrome_process_accessing_chrome_default_dir.yml

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -49,19 +49,20 @@ rba:
4949
threat_objects: []
5050
tags:
5151
analytic_story:
52-
- Warzone RAT
53-
- NjRAT
54-
- China-Nexus Threat Activity
55-
- FIN7
52+
- SnappyBee
53+
- Phemedrone Stealer
5654
- Snake Keylogger
57-
- 3CX Supply Chain Attack
55+
- NjRAT
5856
- CISA AA23-347A
59-
- AgentTesla
60-
- Phemedrone Stealer
57+
- 3CX Supply Chain Attack
58+
- FIN7
59+
- Earth Estries
60+
- Warzone RAT
61+
- China-Nexus Threat Activity
6162
- DarkGate Malware
62-
- RedLine Stealer
6363
- Remcos
64-
- Earth Estries
64+
- RedLine Stealer
65+
- AgentTesla
6566
asset_type: Endpoint
6667
mitre_attack_id:
6768
- T1555.003

detections/endpoint/non_firefox_process_access_firefox_profile_dir.yml

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Non Firefox Process Access Firefox Profile Dir
22
id: e6fc13b0-1609-11ec-b533-acde48001122
3-
version: 6
4-
date: '2025-02-10'
3+
version: '7'
4+
date: '2025-02-13'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -48,18 +48,21 @@ rba:
4848
threat_objects: []
4949
tags:
5050
analytic_story:
51-
- Azorult
52-
- Remcos
51+
- SnappyBee
52+
- Phemedrone Stealer
53+
- Snake Keylogger
5354
- NjRAT
54-
- Warzone RAT
55+
- CISA AA23-347A
5556
- 3CX Supply Chain Attack
57+
- Azorult
58+
- China-Nexus Threat Activity
59+
- Warzone RAT
60+
- AgentTesla
5661
- RedLine Stealer
57-
- FIN7
5862
- DarkGate Malware
59-
- AgentTesla
60-
- CISA AA23-347A
61-
- Phemedrone Stealer
62-
- Snake Keylogger
63+
- Remcos
64+
- Earth Estries
65+
- FIN7
6366
asset_type: Endpoint
6467
mitre_attack_id:
6568
- T1555.003
@@ -71,7 +74,6 @@ tags:
7174
tests:
7275
- name: True Positive Test
7376
attack_data:
74-
- data:
75-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1555/non_chrome_process_accessing_chrome_default_dir/windows-xml.log
77+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1555/non_chrome_process_accessing_chrome_default_dir/windows-xml.log
7678
source: XmlWinEventLog:Security
7779
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)