22creation_date = " 2020/11/18"
33integration = [" endpoint" ]
44maturity = " production"
5- updated_date = " 2024/08 /05"
5+ updated_date = " 2024/09 /05"
66
77[rule ]
88author = [" Elastic" ]
@@ -59,17 +59,9 @@ Adversaries can insert malicious code that can be executed in place of legitimat
5959references = [
6060 " https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/" ,
6161]
62- risk_score = 47
62+ risk_score = 21
6363rule_id = " 16a52c14-7883-47af-8745-9357803f0d4c"
64- setup = """ ## Setup
65-
66- If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
67- events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
68- Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
69- `event.ingested` to @timestamp.
70- For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
71- """
72- severity = " medium"
64+ severity = " low"
7365tags = [
7466 " Domain: Endpoint" ,
7567 " OS: Windows" ,
@@ -78,7 +70,6 @@ tags = [
7870 " Tactic: Defense Evasion" ,
7971 " Tactic: Privilege Escalation" ,
8072 " Resources: Investigation Guide" ,
81- " Data Source: Elastic Endgame" ,
8273 " Data Source: Elastic Defend" ,
8374]
8475timestamp_override = " event.ingested"
@@ -108,34 +99,52 @@ registry where host.os.type == "windows" and event.type == "change" and
10899 "HKEY_USERS\\*\\DelegateExecute",
109100 "HKEY_USERS\\*\\TreatAs\\",
110101 "HKEY_USERS\\*\\ScriptletURL*"
111- )
102+ ) and
103+ not registry.data.strings : (
104+ /* COM related to Windows Spotlight feature */
105+ "{4813071a-41ad-44a2-9835-886d2f63ca30}",
106+
107+ /* AppX/MSIX DelegateExecute handlers: execute, protocol, file */
108+ "{A56A841F-E974-45C1-8001-7E3F8A085917}",
109+ "{4ED3A719-CEA8-4BD9-910D-E252F997AFC2}",
110+ "{BFEC0C93-0B7D-4F2C-B09C-AFFFC4BDAE78}"
111+ )
112+ )
113+ ) and
114+
115+ not (
116+ process.code_signature.trusted == true and
117+ process.code_signature.subject_name in (
118+ "Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.", "Adobe Inc.",
119+ "Citrix Systems, Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.", "Oracle America, Inc.",
120+ "Brave Software, Inc.", "DeepL SE", "Opera Norway AS"
112121 )
113122 ) and
114-
115- not (
116- process.code_signature.trusted == true and
117- process.code_signature.subject_name in
118- ("Island Technology Inc.", "Google LLC", "Grammarly, Inc.", "Dropbox, Inc", "REFINITIV US LLC", "HP Inc.",
119- "Citrix Systems, Inc.", "Adobe Inc.", "Veeam Software Group GmbH", "Zhuhai Kingsoft Office Software Co., Ltd.",
120- "Oracle America, Inc.")
121- ) and
122123
123124 /* excludes Microsoft signed noisy processes */
124125 not
125126 (
126- process.name : ("OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe", "MicrosoftEdgeUpdateComRegisterShell64.exe") and
127+ process.name : (
128+ "OneDrive.exe", "OneDriveSetup.exe", "FileSyncConfig.exe", "Teams.exe", "MicrosoftEdgeUpdate.exe", "msrdcw.exe",
129+ "MicrosoftEdgeUpdateComRegisterShell64.exe", "setup.exe"
130+ ) and
127131 process.code_signature.trusted == true and process.code_signature.subject_name in ("Microsoft Windows", "Microsoft Corporation")
128132 ) and
129133
130- not process.executable :
131- ("?:\\Program Files (x86)\\*.exe",
132- "?:\\Program Files\\*.exe",
133- "?:\\Windows\\System32\\svchost.exe",
134- "?:\\Windows\\System32\\msiexec.exe",
135- "?:\\Windows\\SysWOW64\\regsvr32.exe",
136- "?:\\Windows\\System32\\regsvr32.exe",
137- "?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
138- "?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe")
134+ not process.executable : (
135+ "?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe",
136+ "?:\\Program Files (x86)\\*.exe",
137+ "?:\\Program Files\\*.exe",
138+ "?:\\ProgramData\\4Team\\4Team-Updater\\4Team-Updater-Helper.exe",
139+ "?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe",
140+ "?:\\Users\\*\\AppData\\Local\\Wondershare\\Wondershare NativePush\\WsToastNotification.exe",
141+ "?:\\Windows\\System32\\DriverStore\\FileRepository\\*.exe",
142+ "?:\\Windows\\System32\\msiexec.exe",
143+ "?:\\Windows\\System32\\svchost.exe",
144+ "?:\\Windows\\SysWOW64\\regsvr32.exe",
145+ "?:\\Windows\\System32\\regsvr32.exe",
146+ "\\Device\\Mup\\*\\Kufer\\KuferSQL\\BasysSQL.exe"
147+ )
139148'''
140149
141150
0 commit comments