Skip to content

Commit ad772ee

Browse files
committed
More stragglers
1 parent 6f3c999 commit ad772ee

File tree

2 files changed

+28
-32
lines changed

2 files changed

+28
-32
lines changed

detections/endpoint/windows_detect_network_scanner_behavior.yml

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Detect Network Scanner Behavior
22
id: 78e678d2-bf64-4fe6-aa52-2f7b11dddee7
3-
version: 1
4-
date: '2024-12-26'
3+
version: 2
4+
date: '2025-01-09'
55
author: Steven Dick
66
status: production
77
type: Anomaly
@@ -29,31 +29,29 @@ drilldown_searches:
2929
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
3030
earliest_offset: $info_min_time$
3131
latest_offset: $info_max_time$
32+
rba:
33+
message: A process exhibiting network scanning behavior [$process_name$] was detected on $src$
34+
risk_objects:
35+
- field: src
36+
type: system
37+
score: 25
38+
- field: user
39+
type: user
40+
score: 25
41+
threat_objects:
42+
- field: process_name
43+
type: process_name
3244
tags:
3345
analytic_story:
3446
- Network Discovery
3547
- Windows Discovery Techniques
3648
asset_type: Endpoint
3749
confidence: 50
3850
impact: 50
39-
message: A process exhibiting network scanning behavior [$process_name$] was detected on $src$
4051
mitre_attack_id:
4152
- T1595
4253
- T1595.001
4354
- T1595.002
44-
observable:
45-
- name: src
46-
type: IP Address
47-
role:
48-
- Victim
49-
- name: user
50-
type: User
51-
role:
52-
- Victim
53-
- name: process_name
54-
type: Process
55-
role:
56-
- Attacker
5755
product:
5856
- Splunk Enterprise
5957
- Splunk Enterprise Security

detections/endpoint/windows_process_with_netexec_command_line_parameters.yml

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Process With NetExec Command Line Parameters
22
id: adbff89c-c1f2-4a2e-88a4-b5e645856510
3-
version: 1
4-
date: '2024-12-19'
3+
version: 2
4+
date: '2025-01-09'
55
author: Steven Dick, Github Community
66
status: production
77
type: TTP
@@ -34,33 +34,31 @@ drilldown_searches:
3434
search: '| from datamodel:Endpoint.Processes | search dest=$dest$ process_name = $process_name$'
3535
earliest_offset: $info_min_time$
3636
latest_offset: $info_max_time$
37+
rba:
38+
message: NetExec command line parameters were used on $dest$ by $user$
39+
risk_objects:
40+
- field: user
41+
type: user
42+
score: 64
43+
- field: dest
44+
type: system
45+
score: 64
46+
threat_objects:
47+
- field: parent_process_name
48+
type: parent_process_name
3749
tags:
3850
analytic_story:
3951
- Active Directory Kerberos Attacks
4052
- Active Directory Privilege Escalation
4153
asset_type: Endpoint
4254
confidence: 80
4355
impact: 80
44-
message: NetExec command line parameters were used on $dest$ by $user$
4556
mitre_attack_id:
4657
- T1550
4758
- T1550.003
4859
- T1558
4960
- T1558.003
5061
- T1558.004
51-
observable:
52-
- name: user
53-
type: User
54-
role:
55-
- Victim
56-
- name: dest
57-
type: Hostname
58-
role:
59-
- Victim
60-
- name: parent_process_name
61-
type: Process
62-
role:
63-
- Attacker
6462
product:
6563
- Splunk Enterprise
6664
- Splunk Enterprise Security

0 commit comments

Comments
 (0)