-
Notifications
You must be signed in to change notification settings - Fork 603
[Rule Tuning] Windows High Severity - 1 #5092
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
⛔️ Test failed Results
|
( | ||
(?process.pe.original_file_name : "RUNDLL32.EXE" or process.name : "RUNDLL32.exe") and | ||
(process.args : "MiniDump*" or process.command_line : "*comsvcs.dll*#24*") | ||
(process.args : "*MiniDump*" or process.command_line : "*comsvcs*#*24*") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
( | ||
(?process.pe.original_file_name : "ntdsutil.exe" or process.name : "ntdsutil.exe") and | ||
process.args : "create*full*") or | ||
process.args : "cr*fu*") or |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"HKLM\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential", | ||
"\\REGISTRY\\MACHINE\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential" | ||
) and registry.data.strings : ("1", "0x00000001") and | ||
registry where host.os.type == "windows" and event.type in ("creation", "change") and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In a previous tuning, I've set the event.type to creation, so it wasn't matching the registry modification events. I can remove the creation
, but I've kept it there to cover for some dataset that may set it to creation in 3rd party EDRs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we have other rules with same change ? (event.action set to creation for registry events)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have it in my backlog to review ruleset looking for other occurrences today with another logic error I saw
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just checked, this was the only occurrence.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wasn't fully excluding legitimate paths for winword.exe
"HKLM\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential", | ||
"\\REGISTRY\\MACHINE\\SYSTEM\\*ControlSet*\\Control\\SecurityProviders\\WDigest\\UseLogonCredential" | ||
) and registry.data.strings : ("1", "0x00000001") and | ||
registry where host.os.type == "windows" and event.type in ("creation", "change") and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we have other rules with same change ? (event.action set to creation for registry events)
rules/windows/defense_evasion_execution_suspicious_explorer_winword.toml
Outdated
Show resolved
Hide resolved
⛔️ Test failed Results
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
Issues
Part of https://github.com/elastic/ia-trade-team/issues/678
Summary
Logic adjusts to exclude FPs or cover FNs.