Skip to content

Commit de011b1

Browse files
authored
Merge pull request #3667 from splunk/backwards
Updates to SQL Content
2 parents 8a3d8a5 + c2c32cf commit de011b1

File tree

3 files changed

+14
-14
lines changed

3 files changed

+14
-14
lines changed

detections/endpoint/windows_sql_server_configuration_option_hunt.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server Configuration Option Hunt
22
id: 8dc9efd5-805a-460e-889e-bc79e5477af9
3-
version: 2
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 3
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: Hunting
88
description: This detection helps hunt for changes to SQL Server configuration options that could indicate malicious activity. It monitors for modifications to any SQL Server configuration settings, allowing analysts to identify potentially suspicious changes that may be part of an attack, such as enabling dangerous features or modifying security-relevant settings.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| rename host as dest
1414
| eval change_type=case(
1515
old_value="0" AND new_value="1", "enabled",

detections/endpoint/windows_sql_server_critical_procedures_enabled.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server Critical Procedures Enabled
22
id: d0434864-b043-41e3-8c08-30e53605e9cb
3-
version: 2
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 3
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: TTP
88
description: This detection identifies when critical SQL Server configuration options are modified, including "Ad Hoc Distributed Queries", "external scripts enabled", "Ole Automation Procedures", "clr enabled", and "clr strict security". These features can be abused by attackers for various malicious purposes - Ad Hoc Distributed Queries enables Active Directory reconnaissance through ADSI provider, external scripts and Ole Automation allow execution of arbitrary code, and CLR features can be used to run custom assemblies. Enabling these features could indicate attempts to gain code execution or perform reconnaissance through SQL Server.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| where config_name IN ("Ad Hoc Distributed Queries", "external scripts enabled", "Ole Automation Procedures", "clr enabled", "clr strict security")
1414
| rename host as dest
1515
| eval change_type=case(

detections/endpoint/windows_sql_server_xp_cmdshell_config_change.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows SQL Server xp_cmdshell Config Change
22
id: 5eb76fe2-a869-4865-8c4c-8cff424b18b1
3-
version: 4
4-
date: '2025-05-02'
5-
author: Michael Haag, Splunk
3+
version: 5
4+
date: '2025-08-27'
5+
author: Michael Haag, Splunk, sidoyle from Splunk Community
66
status: production
77
type: TTP
88
description: This detection identifies when the xp_cmdshell configuration is modified in SQL Server. The xp_cmdshell extended stored procedure allows execution of operating system commands and programs from SQL Server, making it a high-risk feature commonly abused by attackers for privilege escalation and lateral movement.
99
data_source:
1010
- Windows Event Log Application 15457
1111
search: '`wineventlog_application` EventCode=15457
12-
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>"
12+
| rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>"
1313
| rename host as dest
1414
| where config_name="xp_cmdshell"
1515
| eval change_type=case(
@@ -48,7 +48,7 @@ drilldown_searches:
4848
earliest_offset: $info_min_time$
4949
latest_offset: $info_max_time$
5050
- name: View all SQL Server configuration changes on this host in the last 7 days
51-
search: '`wineventlog_application` EventCode=15457 host="$dest$" | rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data>" | stats count values(config_name) as "Changed Settings" values(new_value) as "New Values" by _time dest'
51+
search: '`wineventlog_application` EventCode=15457 host="$dest$" | rex field=EventData_Xml "<Data>(?<config_name>[^<]+)</Data><Data>(?<old_value>[^<]+)</Data><Data>(?<new_value>[^<]+)</Data>" | stats count values(config_name) as "Changed Settings" values(new_value) as "New Values" by _time dest'
5252
earliest_offset: -7d
5353
latest_offset: now
5454
rba:
@@ -79,4 +79,4 @@ tests:
7979
attack_data:
8080
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1505.001/simulation/windows-application.log
8181
source: XmlWinEventLog:Application
82-
sourcetype: XmlWinEventLog
82+
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)