Skip to content

Commit 1dedea7

Browse files
authored
[Rule Tuning] Component Object Model Hijacking (#5065)
1 parent aa97487 commit 1dedea7

File tree

1 file changed

+40
-31
lines changed

1 file changed

+40
-31
lines changed

rules/windows/persistence_suspicious_com_hijack_registry.toml

Lines changed: 40 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/18"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2024/08/05"
5+
updated_date = "2024/09/05"
66

77
[rule]
88
author = ["Elastic"]
@@ -59,17 +59,9 @@ Adversaries can insert malicious code that can be executed in place of legitimat
5959
references = [
6060
"https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/",
6161
]
62-
risk_score = 47
62+
risk_score = 21
6363
rule_id = "16a52c14-7883-47af-8745-9357803f0d4c"
64-
setup = """## Setup
65-
66-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
67-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
68-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
69-
`event.ingested` to @timestamp.
70-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
71-
"""
72-
severity = "medium"
64+
severity = "low"
7365
tags = [
7466
"Domain: Endpoint",
7567
"OS: Windows",
@@ -78,7 +70,6 @@ tags = [
7870
"Tactic: Defense Evasion",
7971
"Tactic: Privilege Escalation",
8072
"Resources: Investigation Guide",
81-
"Data Source: Elastic Endgame",
8273
"Data Source: Elastic Defend",
8374
]
8475
timestamp_override = "event.ingested"
@@ -108,34 +99,52 @@ registry where host.os.type == "windows" and event.type == "change" and
10899
"HKEY_USERS\\*\\DelegateExecute",
109100
"HKEY_USERS\\*\\TreatAs\\",
110101
"HKEY_USERS\\*\\ScriptletURL*"
111-
)
102+
) and
103+
not registry.data.strings : (
104+
/* COM related to Windows Spotlight feature */
105+
"{4813071a-41ad-44a2-9835-886d2f63ca30}",
106+
107+
/* AppX/MSIX DelegateExecute handlers: execute, protocol, file */
108+
"{A56A841F-E974-45C1-8001-7E3F8A085917}",
109+
"{4ED3A719-CEA8-4BD9-910D-E252F997AFC2}",
110+
"{BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78}"
111+
)
112+
)
113+
) and
114+
115+
not (
116+
process.code_signature.trusted == true and
117+
process.code_signature.subject_name in (
118+
"Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.", "Adobe Inc.",
119+
"Citrix Systems, Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.", "Oracle America, Inc.",
120+
"Brave Software, Inc.", "DeepL SE", "Opera Norway AS"
112121
)
113122
) and
114-
115-
not (
116-
process.code_signature.trusted == true and
117-
process.code_signature.subject_name in
118-
("Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.",
119-
"Citrix Systems, Inc.", "Adobe Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.",
120-
"Oracle America, Inc.")
121-
) and
122123
123124
/* excludes Microsoft signed noisy processes */
124125
not
125126
(
126-
process.name : ("OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe", "MicrosoftEdgeUpdateComRegisterShell64.exe") and
127+
process.name : (
128+
"OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe",
129+
"MicrosoftEdgeUpdateComRegisterShell64.exe", "setup.exe"
130+
) and
127131
process.code_signature.trusted == true and process.code_signature.subject_name in ("Microsoft Windows", "Microsoft Corporation")
128132
) and
129133
130-
not process.executable :
131-
("?:\\Program Files (x86)\\*.exe",
132-
"?:\\Program Files\\*.exe",
133-
"?:\\Windows\\System32\\svchost.exe",
134-
"?:\\Windows\\System32\\msiexec.exe",
135-
"?:\\Windows\\SysWOW64\\regsvr32.exe",
136-
"?:\\Windows\\System32\\regsvr32.exe",
137-
"?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
138-
"?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe")
134+
not process.executable : (
135+
"?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe",
136+
"?:\\Program Files (x86)\\*.exe",
137+
"?:\\Program Files\\*.exe",
138+
"?:\\ProgramData\\4Team\\4Team-Updater\\4Team-Updater-Helper.exe",
139+
"?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe",
140+
"?:\\Users\\*\\AppData\\Local\\Wondershare\\Wondershare NativePush\\WsToastNotification.exe",
141+
"?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
142+
"?:\\Windows\\System32\\msiexec.exe",
143+
"?:\\Windows\\System32\\svchost.exe",
144+
"?:\\Windows\\SysWOW64\\regsvr32.exe",
145+
"?:\\Windows\\System32\\regsvr32.exe",
146+
"\\Device\\Mup\\*\\Kufer\\KuferSQL\\BasysSQL.exe"
147+
)
139148
'''
140149

141150

0 commit comments

Comments
 (0)