-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added new rules for Malware abusing grimresource and rtlo techniques #5183
base: master
Are you sure you want to change the base?
Added new rules for Malware abusing grimresource and rtlo techniques #5183
Conversation
HI, |
2893bee
to
40f475d
Compare
@frack113 , Thank you for reminding me about this pre-existing rule which I overlooked. I have made the changes in these rules as you suggested. |
rules/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_schtasks_curl_and_powershell_combo.yml
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seen good to me
Summary of the Pull Request
Added new rules for Malware abusing grimresource and rtlo techniques
Changelog
new: MMC Loading Script Engines Dlls
new: Potentially Suspicious Child Processes Spawned by ConHost
new: Scheduled Task Creation Masquerading as System Processes
new: Schtasks Curl Download and Powershell Execution Combination
new: MMC Executing Files with Reversed Extensions Using RTLO Abuse
update: Potential Defense Evasion Via Right-to-Left Override
update: Potential File Extension Spoofing Using Right-to-Left Override
Example Log Event
The rules are based on the process tree observed for a malware variant from triage sandbox.
reference link: https://tria.ge/241015-l98snsyeje/behavioral2
Fixed Issues
SigmaHQ Rule Creation Conventions