Skip to content

Commit ab2ea08

Browse files
authored
Merge pull request #3231 from splunk/enhancements-batch2
Content Enhancements - Second Batch
2 parents 050e23f + 6c271cc commit ab2ea08

File tree

59 files changed

+391
-174
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+391
-174
lines changed

detections/endpoint/active_setup_registry_autostart.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Active Setup Registry Autostart
22
id: f64579c0-203f-11ec-abcc-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Steven Dick, Teoderick Contreras, Splunk
66
status: production
77
type: TTP
@@ -17,7 +17,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1717
| `security_content_ctime(lastTime)`| `active_setup_registry_autostart_filter`'
1818
how_to_implement: To successfully implement this search, you need to be ingesting
1919
logs with the registry value name, registry path, and registry value data from your
20-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
20+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2121
Sysmon TA. https://splunkbase.splunk.com/app/5709
2222
known_false_positives: Active setup installer may add or modify this registry.
2323
references:

detections/endpoint/add_defaultuser_and_password_in_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Add DefaultUser And Password In Registry
22
id: d4a3eb62-0f1e-11ec-a971-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: Anomaly
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `add_defaultuser_and_password_in_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: unknown
2424
references:

detections/endpoint/allow_inbound_traffic_by_firewall_rule_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Allow Inbound Traffic By Firewall Rule Registry
22
id: 0a46537c-be02-11eb-92ca-acde48001122
3-
version: 8
4-
date: '2024-11-14'
3+
version: 9
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `allow_inbound_traffic_by_firewall_rule_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: network admin may add/remove/modify public inbound firewall
2424
rule that may cause this rule to be triggered.

detections/endpoint/allow_operation_with_consent_admin.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Allow Operation with Consent Admin
22
id: 7de17d7a-c9d8-11eb-a812-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(lastTime)` | `allow_operation_with_consent_admin_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: unknown
2424
references:

detections/endpoint/auto_admin_logon_registry_entry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Auto Admin Logon Registry Entry
22
id: 1379d2b8-0f18-11ec-8ca3-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `auto_admin_logon_registry_entry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: unknown
2424
references:

detections/endpoint/creation_of_shadow_copy_with_wmic_and_powershell.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Creation of Shadow Copy with wmic and powershell
22
id: 2ed8b538-d284-449a-be1d-82ad1dbd186b
3-
version: '6'
4-
date: '2024-11-28'
3+
version: 7
4+
date: '2024-12-08'
55
author: Patrick Bareiss, Splunk
66
status: production
77
type: TTP
88
description: The following analytic detects the creation of shadow copies using "wmic"
99
or "Powershell" commands. It leverages the Endpoint.Processes data model in Splunk
1010
to identify processes where the command includes "shadowcopy" and "create". This
1111
activity is significant because it may indicate an attacker attempting to manipulate
12-
or access data unauthorizedly, potentially leading to data theft or manipulation.
12+
or access data in an unauthorized manner, potentially leading to data theft or manipulation.
1313
If confirmed malicious, this behavior could allow attackers to backup and exfiltrate
1414
sensitive data or hide their tracks by restoring files to a previous state after
1515
an attack.
@@ -32,7 +32,7 @@ how_to_implement: The detection is based on data that originates from Endpoint D
3232
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
3333
data model. Use the Splunk Common Information Model (CIM) to normalize the field
3434
names and speed up the data modeling process.
35-
known_false_positives: Legtimate administrator usage of wmic to create a shadow copy.
35+
known_false_positives: Legitimate administrator usage of wmic to create a shadow copy.
3636
references:
3737
- https://2017.zeronights.org/wp-content/uploads/materials/ZN17_Kheirkhabarov_Hunting_for_Credentials_Dumping_in_Windows_Environment.pdf
3838
- https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF

detections/endpoint/disable_amsi_through_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Disable AMSI Through Registry
22
id: 9c27ec42-d338-11eb-9044-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `disable_amsi_through_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: network operator may disable this feature of windows but not
2424
so common.

detections/endpoint/disable_defender_antivirus_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Disable Defender AntiVirus Registry
22
id: aa4f695a-3024-11ec-9987-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(lastTime)` | `disable_defender_antivirus_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: admin or user may choose to disable windows defender product
2424
references:

detections/endpoint/disable_defender_blockatfirstseen_feature.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Disable Defender BlockAtFirstSeen Feature
22
id: 2dd719ac-3021-11ec-97b4-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -25,7 +25,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
2525
| `disable_defender_blockatfirstseen_feature_filter`'
2626
how_to_implement: To successfully implement this search, you need to be ingesting
2727
logs with the registry value name, registry path, and registry value data from your
28-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
28+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2929
Sysmon TA. https://splunkbase.splunk.com/app/5709
3030
known_false_positives: admin or user may choose to disable windows defender product
3131
references:

detections/endpoint/disable_defender_mpengine_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Disable Defender MpEngine Registry
22
id: cc391750-3024-11ec-955a-acde48001122
3-
version: 7
4-
date: '2024-10-04'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(lastTime)` | `disable_defender_mpengine_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: admin or user may choose to disable windows defender product
2424
references:

0 commit comments

Comments
 (0)