Skip to content

Commit 6851943

Browse files
Merge PR SigmaHQ#5804 from @swachchhanda000 - enhance rules related with file download from file sharing websites
update: Suspicious Remote AppX Package Locations - add github.com update: BITS Transfer Job Download From File Sharing Domains - add github.com update: Suspicious File Download From File Sharing Websites - File Stream - add github.com update: Unusual File Download From File Sharing Websites - File Stream - add github.com update: Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder - add github.com update: Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location - add github.com update: Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE - add github.com update: Suspicious File Download From File Sharing Domain Via Curl.EXE - add github.com update: Suspicious File Download From File Sharing Domain Via Wget.EXE - add github.com
1 parent c5b8810 commit 6851943

10 files changed

+27
-10
lines changed

rules/windows/builtin/appxdeployment_server/win_appxdeployment_server_susp_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ references:
1010
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
1111
author: Nasreddine Bencherchali (Nextron Systems)
1212
date: 2023-01-11
13-
modified: 2024-08-22
13+
modified: 2025-12-10
1414
tags:
1515
- attack.defense-evasion
1616
logsource:
@@ -26,6 +26,7 @@ detection:
2626
- 'ddns.net'
2727
- 'dl.dropboxusercontent.com'
2828
- 'ghostbin.co'
29+
- 'github.com'
2930
- 'glitch.me'
3031
- 'gofile.io'
3132
- 'hastebin.com'

rules/windows/builtin/bits_client/win_bits_client_new_transfer_via_file_sharing_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
1010
author: Florian Roth (Nextron Systems)
1111
date: 2022-06-28
12-
modified: 2024-10-21
12+
modified: 2025-12-10
1313
tags:
1414
- attack.defense-evasion
1515
- attack.persistence
@@ -27,6 +27,7 @@ detection:
2727
- 'ddns.net'
2828
- 'dl.dropboxusercontent.com'
2929
- 'ghostbin.co'
30+
- 'github.com'
3031
- 'glitch.me'
3132
- 'gofile.io'
3233
- 'hastebin.com'

rules/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_susp_extension.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ references:
1212
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
1313
author: Florian Roth (Nextron Systems)
1414
date: 2022-08-24
15-
modified: 2024-10-21
15+
modified: 2025-12-10
1616
tags:
1717
- attack.defense-evasion
1818
- attack.s0139
@@ -29,6 +29,7 @@ detection:
2929
- 'ddns.net'
3030
- 'dl.dropboxusercontent.com'
3131
- 'ghostbin.co'
32+
- 'github.com'
3233
- 'glitch.me'
3334
- 'gofile.io'
3435
- 'hastebin.com'

rules/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_unusual_extension.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ references:
1111
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
1212
author: Florian Roth (Nextron Systems)
1313
date: 2022-08-24
14-
modified: 2024-10-21
14+
modified: 2025-12-10
1515
tags:
1616
- attack.defense-evasion
1717
- attack.s0139
@@ -28,6 +28,7 @@ detection:
2828
- 'ddns.net'
2929
- 'dl.dropboxusercontent.com'
3030
- 'ghostbin.co'
31+
- 'github.com'
3132
- 'glitch.me'
3233
- 'gofile.io'
3334
- 'hastebin.com'

rules/windows/network_connection/net_connection_win_susp_file_sharing_domains_susp_folders.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ references:
1313
- https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1
1414
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
1515
date: 2018-08-30
16-
modified: 2024-10-21
16+
modified: 2025-12-10
1717
tags:
1818
- attack.command-and-control
1919
- attack.t1105
@@ -45,6 +45,7 @@ detection:
4545
- 'ddns.net'
4646
- 'dl.dropboxusercontent.com'
4747
- 'ghostbin.co'
48+
- 'github.com'
4849
- 'glitch.me'
4950
- 'gofile.io'
5051
- 'hastebin.com'

rules/windows/network_connection/net_connection_win_susp_initiated_uncommon_or_suspicious_locations.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
88
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
99
date: 2017-03-19
10-
modified: 2024-08-22
10+
modified: 2025-12-10
1111
tags:
1212
- attack.command-and-control
1313
- attack.t1105
@@ -22,11 +22,18 @@ detection:
2222
- ':\Perflogs\'
2323
- ':\Temp\'
2424
- ':\Users\Default\'
25+
- ':\Users\Public\'
2526
- ':\Windows\Fonts\'
2627
- ':\Windows\IME\'
2728
- ':\Windows\System32\Tasks\'
2829
- ':\Windows\Tasks\'
2930
- '\config\systemprofile\'
31+
- '\Contacts\'
32+
- '\Favorites\'
33+
- '\Favourites\'
34+
- '\Music\'
35+
- '\Pictures\'
36+
- '\Videos\'
3037
- '\Windows\addins\'
3138
filter_main_domains:
3239
# Note: We exclude these domains to avoid duplicate filtering from e0f8ab85-0ac9-423b-a73a-81b3c7b1aa97
@@ -37,6 +44,7 @@ detection:
3744
- 'ddns.net'
3845
- 'dl.dropboxusercontent.com'
3946
- 'ghostbin.co'
47+
- 'github.com'
4048
- 'glitch.me'
4149
- 'gofile.io'
4250
- 'hastebin.com'

rules/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ references:
1717
- https://www.hexacorn.com/blog/2020/08/23/certutil-one-more-gui-lolbin
1818
author: Nasreddine Bencherchali (Nextron Systems)
1919
date: 2023-02-15
20-
modified: 2025-12-01
20+
modified: 2025-12-10
2121
tags:
2222
- attack.defense-evasion
2323
- attack.t1027
@@ -43,6 +43,7 @@ detection:
4343
- 'ddns.net'
4444
- 'dl.dropboxusercontent.com'
4545
- 'ghostbin.co'
46+
- 'github.com'
4647
- 'glitch.me'
4748
- 'gofile.io'
4849
- 'hastebin.com'

rules/windows/process_creation/proc_creation_win_curl_download_susp_file_sharing_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://github.com/WithSecureLabs/iocs/blob/344203de742bb7e68bd56618f66d34be95a9f9fc/FIN7VEEAM/iocs.csv
88
author: Nasreddine Bencherchali (Nextron Systems)
99
date: 2023-05-05
10-
modified: 2024-10-21
10+
modified: 2025-12-10
1111
tags:
1212
- attack.execution
1313
logsource:
@@ -25,6 +25,7 @@ detection:
2525
- 'ddns.net'
2626
- 'dl.dropboxusercontent.com'
2727
- 'ghostbin.co'
28+
- 'github.com'
2829
- 'glitch.me'
2930
- 'gofile.io'
3031
- 'hastebin.com'

rules/windows/process_creation/proc_creation_win_powershell_download_susp_file_sharing_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708
1010
author: Nasreddine Bencherchali (Nextron Systems)
1111
date: 2024-02-23
12-
modified: 2024-10-21
12+
modified: 2024-12-10
1313
tags:
1414
- attack.execution
1515
logsource:
@@ -32,6 +32,7 @@ detection:
3232
- 'ddns.net'
3333
- 'dl.dropboxusercontent.com'
3434
- 'ghostbin.co'
35+
# - 'github.com' See note above
3536
- 'glitch.me'
3637
- 'gofile.io'
3738
- 'hastebin.com'

rules/windows/process_creation/proc_creation_win_wget_download_susp_file_sharing_domains.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ references:
88
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
99
author: Nasreddine Bencherchali (Nextron Systems)
1010
date: 2023-05-05
11-
modified: 2024-10-21
11+
modified: 2025-12-10
1212
tags:
1313
- attack.execution
1414
logsource:
@@ -26,6 +26,7 @@ detection:
2626
- 'ddns.net'
2727
- 'dl.dropboxusercontent.com'
2828
- 'ghostbin.co'
29+
- 'github.com'
2930
- 'glitch.me'
3031
- 'gofile.io'
3132
- 'hastebin.com'

0 commit comments

Comments
 (0)