Azure-Sentinel/Detections/SecurityEvent/MidnightBlizzard_Suspicious...

84 строки
3.0 KiB
YAML
Исходник Обычный вид История

2021-03-03 20:56:18 +03:00
id: d82e1987-4356-4a7b-bc5e-064f29b143c0
2023-05-08 16:22:09 +03:00
name: Midnight Blizzard - suspicious rundll32.exe execution of vbscript
2021-03-03 20:56:18 +03:00
description: |
2021-03-04 19:46:58 +03:00
'This query idenifies when rundll32.exe executes a specific set of inline VBScript commands
References: https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/'
2021-03-03 20:56:18 +03:00
severity: Medium
requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
2021-05-27 12:49:22 +03:00
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
2022-02-07 19:03:01 +03:00
- connectorId: WindowsSecurityEvents
dataTypes:
2023-12-09 00:46:31 +03:00
- SecurityEvents
2022-03-10 18:00:42 +03:00
- connectorId: WindowsForwardedEvents
dataTypes:
- WindowsEvent
2021-03-03 20:56:18 +03:00
queryFrequency: 1d
queryPeriod: 1d
triggerOperator: gt
triggerThreshold: 0
tactics:
2021-03-03 20:59:01 +03:00
- Persistence
2021-03-03 20:56:18 +03:00
relevantTechniques:
2021-03-03 20:59:01 +03:00
- T1547
2021-03-04 19:46:58 +03:00
tags:
2023-05-08 16:22:09 +03:00
- Midnight Blizzard
2021-03-03 20:56:18 +03:00
query: |
2022-02-02 17:32:12 +03:00
(union isfuzzy=true
2022-02-01 15:40:32 +03:00
(SecurityEvent
2021-03-03 20:56:18 +03:00
| where EventID == 4688
| where Process =~ 'rundll32.exe'
| where CommandLine has_all ('Execute','RegRead','window.close')
2023-12-09 00:46:31 +03:00
| project TimeGenerated, Computer, SubjectAccount = Account, SubjectUserName, SubjectDomainName, SubjectUserSid, Process, ProcessId, NewProcessName, CommandLine, ParentProcessName, _ResourceId
2022-02-01 15:40:32 +03:00
),
(WindowsEvent
| where EventID == 4688 and EventData has 'rundll32.exe' and EventData has_any ('Execute','RegRead','window.close')
| extend NewProcessName = tostring(EventData.NewProcessName)
| extend Process=tostring(split(NewProcessName, '\\')[-1])
| where Process =~ 'rundll32.exe'
| extend CommandLine = tostring(EventData.CommandLine)
| where CommandLine has_all ('Execute','RegRead','window.close')
2023-12-09 00:46:31 +03:00
| extend SubjectAccount = strcat(EventData.SubjectDomainName,"\\", EventData.SubjectUserName)
2022-02-01 15:40:32 +03:00
| extend ParentProcessName = tostring(EventData.ParentProcessName)
2023-12-09 00:46:31 +03:00
| project TimeGenerated, Computer, SubjectAccount, SubjectUserName = EventData.SubjectUserName, SubjectDomainName = EventData.SubjectDomainName, SubjectUserSid = EventData.SubjectUserSid, Process, NewProcessName, CommandLine, ParentProcessName, _ResourceId
)
)
| extend HostName = tostring(split(Computer, ".")[0]), DomainIndex = toint(indexof(Computer, '.'))
| extend HostNameDomain = iff(DomainIndex != -1, substring(Computer, DomainIndex + 1), Computer)
| project-away DomainIndex
2021-03-03 20:56:18 +03:00
entityMappings:
- entityType: Account
fieldMappings:
2023-12-15 07:47:06 +03:00
- identifier: FullName
columnName: SubjectAccount
2023-12-09 00:46:31 +03:00
- identifier: Name
columnName: SubjectUserName
- identifier: NTDomain
columnName: SubjectDomainName
- entityType: Account
fieldMappings:
2023-12-09 00:46:31 +03:00
- identifier: Sid
columnName: SubjectUserSid
2021-03-03 20:56:18 +03:00
- entityType: Host
fieldMappings:
2023-12-15 07:47:06 +03:00
- identifier: FullName
columnName: Computer
2023-12-09 00:46:31 +03:00
- identifier: HostName
columnName: HostName
- identifier: DnsDomain
columnName: HostNameDomain
2023-12-15 07:47:06 +03:00
version: 1.1.5
kind: Scheduled
metadata:
source:
kind: Community
author:
2023-12-09 00:46:31 +03:00
name: Microsoft Security Research
support:
tier: Community
categories:
domains: [ "Security - Threat Intelligence" ]