2
2
creation_date = " 2020/11/18"
3
3
integration = [" endpoint" ]
4
4
maturity = " production"
5
- updated_date = " 2024/08 /05"
5
+ updated_date = " 2024/09 /05"
6
6
7
7
[rule ]
8
8
author = [" Elastic" ]
@@ -59,17 +59,9 @@ Adversaries can insert malicious code that can be executed in place of legitimat
59
59
references = [
60
60
" https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/" ,
61
61
]
62
- risk_score = 47
62
+ risk_score = 21
63
63
rule_id = " 16a52c14-7883-47af-8745-9357803f0d4c"
64
- setup = """ ## Setup
65
-
66
- If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
67
- events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
68
- Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
69
- `event.ingested` to @timestamp.
70
- For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
71
- """
72
- severity = " medium"
64
+ severity = " low"
73
65
tags = [
74
66
" Domain: Endpoint" ,
75
67
" OS: Windows" ,
@@ -78,7 +70,6 @@ tags = [
78
70
" Tactic: Defense Evasion" ,
79
71
" Tactic: Privilege Escalation" ,
80
72
" Resources: Investigation Guide" ,
81
- " Data Source: Elastic Endgame" ,
82
73
" Data Source: Elastic Defend" ,
83
74
]
84
75
timestamp_override = " event.ingested"
@@ -108,34 +99,52 @@ registry where host.os.type == "windows" and event.type == "change" and
108
99
"HKEY_USERS\\*\\DelegateExecute",
109
100
"HKEY_USERS\\*\\TreatAs\\",
110
101
"HKEY_USERS\\*\\ScriptletURL*"
111
- )
102
+ ) and
103
+ not registry.data.strings : (
104
+ /* COM related to Windows Spotlight feature */
105
+ "{4813071a-41ad-44a2-9835-886d2f63ca30}",
106
+
107
+ /* AppX/MSIX DelegateExecute handlers: execute, protocol, file */
108
+ "{A56A841F-E974-45C1-8001-7E3F8A085917}",
109
+ "{4ED3A719-CEA8-4BD9-910D-E252F997AFC2}",
110
+ "{BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78}"
111
+ )
112
+ )
113
+ ) and
114
+
115
+ not (
116
+ process.code_signature.trusted == true and
117
+ process.code_signature.subject_name in (
118
+ "Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.", "Adobe Inc.",
119
+ "Citrix Systems, Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.", "Oracle America, Inc.",
120
+ "Brave Software, Inc.", "DeepL SE", "Opera Norway AS"
112
121
)
113
122
) and
114
-
115
- not (
116
- process.code_signature.trusted == true and
117
- process.code_signature.subject_name in
118
- ("Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.",
119
- "Citrix Systems, Inc.", "Adobe Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.",
120
- "Oracle America, Inc.")
121
- ) and
122
123
123
124
/* excludes Microsoft signed noisy processes */
124
125
not
125
126
(
126
- process.name : ("OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe", "MicrosoftEdgeUpdateComRegisterShell64.exe") and
127
+ process.name : (
128
+ "OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe",
129
+ "MicrosoftEdgeUpdateComRegisterShell64.exe", "setup.exe"
130
+ ) and
127
131
process.code_signature.trusted == true and process.code_signature.subject_name in ("Microsoft Windows", "Microsoft Corporation")
128
132
) and
129
133
130
- not process.executable :
131
- ("?:\\Program Files (x86)\\*.exe",
132
- "?:\\Program Files\\*.exe",
133
- "?:\\Windows\\System32\\svchost.exe",
134
- "?:\\Windows\\System32\\msiexec.exe",
135
- "?:\\Windows\\SysWOW64\\regsvr32.exe",
136
- "?:\\Windows\\System32\\regsvr32.exe",
137
- "?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
138
- "?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe")
134
+ not process.executable : (
135
+ "?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe",
136
+ "?:\\Program Files (x86)\\*.exe",
137
+ "?:\\Program Files\\*.exe",
138
+ "?:\\ProgramData\\4Team\\4Team-Updater\\4Team-Updater-Helper.exe",
139
+ "?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe",
140
+ "?:\\Users\\*\\AppData\\Local\\Wondershare\\Wondershare NativePush\\WsToastNotification.exe",
141
+ "?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
142
+ "?:\\Windows\\System32\\msiexec.exe",
143
+ "?:\\Windows\\System32\\svchost.exe",
144
+ "?:\\Windows\\SysWOW64\\regsvr32.exe",
145
+ "?:\\Windows\\System32\\regsvr32.exe",
146
+ "\\Device\\Mup\\*\\Kufer\\KuferSQL\\BasysSQL.exe"
147
+ )
139
148
'''
140
149
141
150
0 commit comments