Skip to content

Commit 0328ab7

Browse files
committed
chore(rules): Address rule validator warnings
1 parent c68df65 commit 0328ab7

7 files changed

Lines changed: 14 additions & 9 deletions

rules/credential_access_lsass_access_from_unsigned_executable.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
name: LSASS access from unsigned executable
22
id: 348bf896-2201-444f-b1c9-e957a1f063bf
3-
version: 1.0.2
3+
version: 1.0.3
44
description: |
55
Detects attempts by an unsigned process to access the Local Security Authority Subsystem Service (LSASS).
66
Adversaries may try to dump credential information stored in the process memory of LSASS.
77
labels:
88
tactic.id: TA0006
99
tactic.name: Credential Access
1010
tactic.ref: https://attack.mitre.org/tactics/TA0006/
11+
technique.id: T1003
1112
technique.name: OS Credential Dumping
1213
technique.ref: https://attack.mitre.org/techniques/T1003/
1314
subtechnique.id: T1003.001

rules/credential_access_lsass_handle_leak_via_seclogon.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: LSASS handle leak via Seclogon
22
id: 5d55c938-875e-49e1-ae53-fa196d4445eb
3-
version: 1.0.2
3+
version: 1.0.3
44
description: |
55
Identifies suspicious access to LSASS process from a callstack pointing to seclogon.dll that
66
may indicate an attempt to leak an LSASS handle via abusing the Secondary Logon service in
@@ -9,6 +9,7 @@ labels:
99
tactic.id: TA0006
1010
tactic.name: Credential Access
1111
tactic.ref: https://attack.mitre.org/tactics/TA0006/
12+
technique.id: T1003
1213
technique.name: OS Credential Dumping
1314
technique.ref: https://attack.mitre.org/techniques/T1003/
1415
subtechnique.id: T1003.001

rules/defense_evasion_dll_loaded_via_apc_queue.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: DLL loaded via APC queue
22
id: e1ee3912-ad7c-4acb-80f4-84db87e54d5e
3-
version: 1.0.4
3+
version: 1.0.5
44
description: |
55
Identifies loading of a DLL with a callstack originating from the thread
66
alertable state that led to the execution of an APC routine. This may be
@@ -9,9 +9,9 @@ labels:
99
tactic.id: TA0005
1010
tactic.name: Defense Evasion
1111
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1055
1213
technique.name: Process Injection
1314
technique.ref: https://attack.mitre.org/techniques/T1055/
14-
subtechnique.id: T1055.003
1515
references:
1616
- https://github.com/Idov31/Cronos
1717

rules/defense_evasion_dll_loaded_via_ldrpkernel32_overwrite.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
name: DLL loaded via LdrpKernel32 overwrite
22
id: 56739eda-210f-4a30-a114-d55ca60976df
3-
version: 1.0.4
3+
version: 1.0.5
44
description: |
55
Detects attempts to bypass the standard NTDLL bootstrap process by loading a malicious DLL early through hijacking.
66
The malicious DLL, containing attacker-controlled code, is loaded in place of the legitimate kernel32 DLL.
77
labels:
88
tactic.id: TA0005
99
tactic.name: Defense Evasion
1010
tactic.ref: https://attack.mitre.org/tactics/TA0005/
11+
technique.id: T1574
1112
technique.name: Hijack Execution Flow
1213
technique.ref: https://attack.mitre.org/techniques/T1574/
1314
subtechnique.id: T1574.001

rules/defense_evasion_dll_sideloading_via_copied_binary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: DLL Side-Loading via a copied binary
22
id: 80798e2c-6c37-472b-936c-1d2d6b95ff3c
3-
version: 1.0.7
3+
version: 1.0.8
44
description: |
55
Identifies when a binary is copied to a directory and shortly followed
66
by the loading of an unsigned DLL from the same directory. Adversaries may
@@ -26,7 +26,7 @@ condition: >
2626
(file.extension ~= '.exe' or file.is_exec)
2727
| by file.path
2828
|(load_dll) and
29-
dir(image.path) ~= dir(ps.exe) and
29+
dir(dll.path) ~= dir(ps.exe) and
3030
ps.signature.subject icontains 'Microsoft' and ps.signature.trusted and
3131
(dll.signature.exists = false or dll.signature.trusted = false)
3232
| by ps.exe

rules/persistence_potential_mandatory_profile_registry_persistence.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Potential mandatory profile registry persistence
22
id: e9c9fa57-5088-4d40-8a5e-2aa70ec6e189
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies suspicious creation of the NTUSER.MAN file within user profile
66
directories, a lesser-known persistence technique that abuses mandatory
@@ -11,6 +11,7 @@ labels:
1111
tactic.id: TA0003
1212
tactic.name: Persistence
1313
tactic.ref: https://attack.mitre.org/tactics/TA0003/
14+
technique.id: T1547
1415
technique.name: Boot or Logon Autostart Execution
1516
technique.ref: https://attack.mitre.org/techniques/T1547/
1617
subtechnique.id: T1547.001

rules/persistence_potential_port_monitor_or_print_processor_persistence_via_registry_modification.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
name: Potential port monitor or print processor persistence via registry modification
22
id: de04ae6b-8141-41af-9baa-15630b5954cc
3-
version: 1.0.2
3+
version: 1.0.3
44
description: |
55
Identifies port monitor or print process registry modifications that would allow
66
adversaries to run malicious DLLs during system boot.
77
labels:
88
tactic.id: TA0003
99
tactic.name: Persistence
1010
tactic.ref: https://attack.mitre.org/tactics/TA0003/
11+
technique.id: T1547
1112
technique.name: Boot or Logon Autostart Execution
1213
technique.ref: https://attack.mitre.org/techniques/T1547/
1314
subtechnique.id: T1547.010

0 commit comments

Comments
 (0)