-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sigma Rule Update (2024-02-09 20:12:22) (#603)
Co-authored-by: hach1yon <hach1yon@users.noreply.github.com>
- Loading branch information
1 parent
c1309e6
commit a6a1fcd
Showing
2 changed files
with
79 additions
and
0 deletions.
There are no files selected for viewing
39 changes: 39 additions & 0 deletions
39
sigma/builtin/process_creation/proc_creation_win_wmic_recon_volume.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
title: System Disk And Volume Reconnaissance Via Wmic.EXE | ||
id: c79da740-5030-45ec-a2e0-479e824a562c | ||
related: | ||
- id: d85ecdd7-b855-4e6e-af59-d9c78b5b861e | ||
type: similar | ||
status: experimental | ||
description: | | ||
An adversary might use WMI to discover information about the system, such as the volume name, size, | ||
free space, and other disk information. This can be done using the `wmic` command-line utility and has been | ||
observed being used by threat actors such as Volt Typhoon. | ||
references: | ||
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a | ||
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic | ||
author: Stephen Lincoln `@slincoln-aiq`(AttackIQ) | ||
date: 2024/02/02 | ||
tags: | ||
- attack.execution | ||
- attack.discovery | ||
- attack.t1047 | ||
- attack.t1082 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 4688 | ||
Channel: Security | ||
selection_img: | ||
- NewProcessName|endswith: \WMIC.exe | ||
- OriginalFileName: wmic.exe | ||
selection_cli: | ||
CommandLine|contains: | ||
- volume | ||
- path win32_logicaldisk | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |
40 changes: 40 additions & 0 deletions
40
sigma/sysmon/process_creation/proc_creation_win_wmic_recon_volume.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
title: System Disk And Volume Reconnaissance Via Wmic.EXE | ||
id: c79da740-5030-45ec-a2e0-479e824a562c | ||
related: | ||
- id: d85ecdd7-b855-4e6e-af59-d9c78b5b861e | ||
type: similar | ||
status: experimental | ||
description: | | ||
An adversary might use WMI to discover information about the system, such as the volume name, size, | ||
free space, and other disk information. This can be done using the `wmic` command-line utility and has been | ||
observed being used by threat actors such as Volt Typhoon. | ||
references: | ||
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a | ||
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic | ||
author: Stephen Lincoln `@slincoln-aiq`(AttackIQ) | ||
date: 2024/02/02 | ||
tags: | ||
- attack.execution | ||
- attack.discovery | ||
- attack.t1047 | ||
- attack.t1082 | ||
- sysmon | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
process_creation: | ||
EventID: 1 | ||
Channel: Microsoft-Windows-Sysmon/Operational | ||
selection_img: | ||
- Image|endswith: \WMIC.exe | ||
- OriginalFileName: wmic.exe | ||
selection_cli: | ||
CommandLine|contains: | ||
- volume | ||
- path win32_logicaldisk | ||
condition: process_creation and (all of selection_*) | ||
falsepositives: | ||
- Unknown | ||
level: medium | ||
ruletype: Sigma |