Skip to content

Commit b0b5bf1

Browse files
committed
Updates to SQL Content
Resolving #3643 Thank you!
1 parent d6c886c commit b0b5bf1

File tree

3 files changed

+13
-15
lines changed

3 files changed

+13
-15
lines changed

detections/endpoint/windows_sql_server_configuration_option_hunt.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server Configuration Option Hunt
22
id: 8dc9efd5-805a-460e-889e-bc79e5477af9
3-
version: 2
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 3
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: Hunting
88
description: This detection helps hunt for changes to SQL Server configuration options that could indicate malicious activity. It monitors for modifications to any SQL Server configuration settings, allowing analysts to identify potentially suspicious changes that may be part of an attack, such as enabling dangerous features or modifying security-relevant settings.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| rename host as dest
1414
| eval change_type=case(
1515
old_value="0" AND new_value="1", "enabled",

detections/endpoint/windows_sql_server_critical_procedures_enabled.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server Critical Procedures Enabled
22
id: d0434864-b043-41e3-8c08-30e53605e9cb
3-
version: 2
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 3
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: TTP
88
description: This detection identifies when critical SQL Server configuration options are modified, including "Ad Hoc Distributed Queries", "external scripts enabled", "Ole Automation Procedures", "clr enabled", and "clr strict security". These features can be abused by attackers for various malicious purposes - Ad Hoc Distributed Queries enables Active Directory reconnaissance through ADSI provider, external scripts and Ole Automation allow execution of arbitrary code, and CLR features can be used to run custom assemblies. Enabling these features could indicate attempts to gain code execution or perform reconnaissance through SQL Server.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| where config_name IN ("Ad Hoc Distributed Queries", "external scripts enabled", "Ole Automation Procedures", "clr enabled", "clr strict security")
1414
| rename host as dest
1515
| eval change_type=case(
@@ -71,7 +71,6 @@ tags:
7171
- Splunk Enterprise Security
7272
- Splunk Cloud
7373
security_domain: endpoint
74-
manual_test: The risk message is dynamically generated in the SPL and it needs to be manually tested for integration testing.
7574
tests:
7675
- name: True Positive Test
7776
attack_data:

detections/endpoint/windows_sql_server_xp_cmdshell_config_change.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server xp_cmdshell Config Change
22
id: 5eb76fe2-a869-4865-8c4c-8cff424b18b1
3-
version: 4
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 5
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: TTP
88
description: This detection identifies when the xp_cmdshell configuration is modified in SQL Server. The xp_cmdshell extended stored procedure allows execution of operating system commands and programs from SQL Server, making it a high-risk feature commonly abused by attackers for privilege escalation and lateral movement.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| rename host as dest
1414
| where config_name="xp_cmdshell"
1515
| eval change_type=case(
@@ -48,7 +48,7 @@ drilldown_searches:
4848
earliest_offset: $info_min_time$
4949
latest_offset: $info_max_time$
5050
- name: View all SQL Server configuration changes on this host in the last 7 days
51-
search: '`wineventlog_application` EventCode=15457 host="$dest$" | rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>" | stats count values(config_name) as "Changed Settings" values(new_value) as "New Values" by _time dest'
51+
search: '`wineventlog_application` EventCode=15457 host="$dest$" | rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>" | stats count values(config_name) as "Changed Settings" values(new_value) as "New Values" by _time dest'
5252
earliest_offset: -7d
5353
latest_offset: now
5454
rba:
@@ -73,7 +73,6 @@ tags:
7373
- Splunk Enterprise Security
7474
- Splunk Cloud
7575
security_domain: endpoint
76-
manual_test: The risk message is dynamically generated in the SPL and it needs to be manually tested for integration testing.
7776
tests:
7877
- name: True Positive Test
7978
attack_data:

0 commit comments

Comments
 (0)