Skip to content

Commit a3f20ac

Browse files
authored
Merge pull request #3355 from splunk/installutil_improvement
Updating search output!
2 parents de7f76d + b2581a9 commit a3f20ac

File tree

3 files changed

+39
-15
lines changed

3 files changed

+39
-15
lines changed

contentctl.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.0.0
6+
version: 5.1.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -30,11 +30,11 @@ splunk_api_username: null
3030
post_test_behavior: pause_on_failure
3131
apps:
3232
- uid: 1621
33-
title: Splunk Common Information Model (CIM)
33+
title: Splunk_SA_CIM
3434
appid: Splunk_SA_CIM
35-
version: 6.0.1
35+
version: 6.0.2
3636
description: description of app
37-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_601.tgz
37+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_602.tgz
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud

data_sources/splunk_cim.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
name: Splunk CIM
2+
id: d3dd8270-7e1c-4bcd-8f3a-e5ec4a0e740a
3+
version: 1
4+
date: '2025-01-14'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for Splunk CIM
7+
source: not_applicable
8+
sourcetype: not_applicable
9+
supported_TA:
10+
- name: Splunk_SA_CIM
11+
url: https://splunkbase.splunk.com/app/1621
12+
version: 6.0.2

detections/endpoint/windows_installutil_remote_network_connection.yml

Lines changed: 23 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows InstallUtil Remote Network Connection
22
id: 4fbf9270-43da-11ec-9486-acde48001122
3-
version: 10
4-
date: '2025-02-10'
3+
version: 11
4+
date: '2025-02-22'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -16,15 +16,25 @@ description: The following analytic detects the Windows InstallUtil.exe binary m
1616
of this activity.
1717
data_source:
1818
- Sysmon EventID 1 AND Sysmon EventID 3
19-
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
20-
where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
21-
Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
22-
Processes.original_file_name | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
23-
| `security_content_ctime(lastTime)` | join process_id [| tstats `security_content_summariesonly`
24-
count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
25-
0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port | `drop_dm_object_name(All_Traffic)`
26-
| rename dest as C2 ] | table _time user dest parent_process_name process_name process_path
27-
process process_id dest_port C2 | `windows_installutil_remote_network_connection_filter`'
19+
search: |-
20+
| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
21+
where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
22+
Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
23+
Processes.original_file_name
24+
| `drop_dm_object_name(Processes)`
25+
| `security_content_ctime(firstTime)`
26+
| `security_content_ctime(lastTime)`
27+
| join process_id dest
28+
[| tstats `security_content_summariesonly`
29+
count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
30+
0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port All_Traffic.src
31+
| `drop_dm_object_name(All_Traffic)`
32+
| rename dest as command_and_control
33+
| rename src as dest]
34+
| table _time user src dest parent_process_name process_name process_path process process_id dest_port command_and_control
35+
| stats count min(_time) as firstTime max(_time) as lastTime values(process) as process values(command_and_control) as command_and_control by user dest process_name process_id dest_port parent_process_name
36+
| `security_content_ctime(firstTime)`
37+
| `security_content_ctime(lastTime)`| `windows_installutil_remote_network_connection_filter`
2838
how_to_implement: The detection is based on data that originates from Endpoint Detection
2939
and Response (EDR) agents. These agents are designed to provide security-related
3040
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -68,6 +78,8 @@ rba:
6878
type: parent_process_name
6979
- field: process_name
7080
type: process_name
81+
- field: command_and_control
82+
type: ip_address
7183
tags:
7284
analytic_story:
7385
- Living Off The Land

0 commit comments

Comments
 (0)