Threat Detection. Advent of cyber-2022 day 18 | by Fallen sky | Feb, 2023

Threat Detection. Advent of cyber-2022 day 18 | by Fallen sky | Feb, 2023
Run this command on the exploited machine to check versions of software installed and then find the vulnerabilities.
Skeletal view of sigma rule
title: Suspicous Local Account Creation
id: 0f06a3a5-6a09-413f-8743-e6cf35561297
status: experimental
description: Detects the creation of local user account on a computer.
logsource:
product: windows
service: security
detection:
selection:
EventID: #This shows the search identifier value
- 4720 #this shows the search list value
condition: selection
falsepositives :
- unkonwn
level : low
tags :
- attack.persistence #points to MITRE TACTIC
- attack.T1136.001 #Point to the MITRE technique
detection: 
selection:
Image|endswith:
- '\svchost.exe'
CommandLine|contains|all:
- bash.exe
-'-c '
condition: selection
#Software Discovery: Category, EventID, Image, CommandLine.

title:
id: # UUID
status: # experimental, test, stable, deprecated, unsupported.
description:
author:
date:
modified:

logsource:
product: windows
service: sysmon
category: process_creation
detection:
selection:
EventID:
- 1
Image|endswith:
- reg.exe
CommandLine|contains|all:
- reg
- query
- /v
- svcVersion

condition: selection # Action to be taken. Can use condition operators such as OR, AND, NOT when using multiple search identifiers.

falsepositives: # Legitimate services or use.

level: # informational, low, medium, high or critical.

tags: # Associated TTPs from MITRE ATT&CK
- {attack.tactic} # MITRE Tactic
- {attack.technique} # MITRE Technique

#Scheduled Jobs: Category, EventID, Image, CommandLine.

title:
id: # UUID
status: # experimental, test, stable, deprecated, unsupported.
description:
author:
date:
modified:

logsource:
product: windows
service: sysmon
category: process_creation
detection:
selection:
EventID:
- 1
Image|endswith:
- schtasks.exe
CommandLine|contains|all:
- schtasks
- /create

condition: selection # Action to be taken. Can use condition operators such as OR, AND, NOT when using multiple search identifiers.

falsepositives: # Legitimate services or use.

level: # informational, low, medium, high or critical.

tags: # Associated TTPs from MITRE ATT&CK
- {attack.tactic} # MITRE Tactic
- {attack.technique} # MITRE Technique

administrator

Leave a Reply

Your email address will not be published. Required fields are marked *

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!