Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 4 additions & 3 deletions pkg/filter/ql/parser_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,12 +20,13 @@ package ql

import (
"errors"
"testing"
"time"

"github.com/rabbitstack/fibratus/pkg/config"
"github.com/rabbitstack/fibratus/pkg/filter/fields"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"testing"
"time"
)

func TestParser(t *testing.T) {
Expand Down Expand Up @@ -353,7 +354,7 @@ func TestParseSequence(t *testing.T) {

`by ps.uuid
maxspan 2m
|evt.name = 'CreateProcess'| by ps.child.uuid
|evt.name = 'CreateProcess'| by ps.uuid
|evt.name = 'CreateFile'| by ps.uuid
`,
errors.New("sequence mixes global and per-expression 'by' statements"),
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential injection via .NET debugging
id: 193ebf2f-e365-4f57-a639-275b7cdf0319
version: 1.0.5
version: 1.0.6
description: |
Identifies creation of a process on behalf of the CLR debugging facility which may
be indicative of code injection. The CLR interface utilizes the OpenVirtualProcess
Expand Down Expand Up @@ -30,7 +30,7 @@ condition: >
ps.parent.exe not imatches '?:\\Program Files (x86)\\Microsoft Visual Studio\\*.exe'

output: >
Process %ps.exe attached the .NET debugger to process %ps.child.exe for potential code injection
Process %ps.parent.exe attached the .NET debugger to process %ps.exe for potential code injection
severity: high

min-engine-version: 3.0.0
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential process creation via shellcode
id: 7a918532-12d1-4aa2-8c46-8769c67cac07
version: 1.0.2
version: 1.0.3
description: |
Identifies the creation of a process with stack frames originating from floating memory area while
invoking commonly used Windows API functions like WinExec. This behavior is a typical indicator of
Expand All @@ -21,7 +21,7 @@ condition: >
thread.callstack.symbols imatches ('kernel32.dll!WinExec*')

output: >
Process %ps.child.exe created via potential shellcode injection by process %ps.exe
Process %ps.exe created via potential shellcode injection by process %ps.parent.exe
severity: high

min-engine-version: 3.0.0
4 changes: 2 additions & 2 deletions rules/defense_evasion_suspicious_access_to_the_hosts_file.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Suspicious access to the hosts file
id: f7b2c9d3-99e7-41d5-bb4a-6ea1a5f7f9e2
version: 1.0.5
version: 1.0.6
description: >
Identifies suspicious process accessing the Windows hosts file for potential tampering.
Adversaries can hijack the hosts files to block traffic to download/update servers or redirect the
Expand Down Expand Up @@ -34,7 +34,7 @@ action:
- name: kill

output: >
Suspicious process %1.ps.child.exe accessed the hosts file for potential tampering
Suspicious process %1.ps.exe accessed the hosts file for potential tampering
severity: medium

min-engine-version: 3.0.0
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Suspicious HTML Application script execution
id: 4ec64ac2-851d-41b4-b7d2-910c21de334d
version: 1.0.5
version: 1.0.6
description: |
Identifies the execution of scripts via Microsoft HTML Application Host interpreter. Adversaries
can proxy the execution of arbitrary script code through a trusted, signed utility to evade defenses.
Expand Down Expand Up @@ -54,7 +54,7 @@ action:
- name: kill

output: >
Suspicious HTML Application script execution by mshta process with command line arguments %ps.child.cmdline
Suspicious HTML Application script execution by mshta process with command line arguments %ps.cmdline
severity: high

min-engine-version: 3.0.0
4 changes: 2 additions & 2 deletions rules/defense_evasion_suspicious_xsl_script_execution.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Suspicious XSL script execution
id: 65136b30-14ae-46dd-b8e5-9dfa99690d74
version: 1.0.4
version: 1.0.5
description: |
Identifies a suspicious execution of XSL script via Windows Management Instrumentation command line tool or XSL
transformation utility. Adversaries may bypass application control and obscure the execution of code by embedding
Expand Down Expand Up @@ -42,7 +42,7 @@ condition: >
|load_dll and image.name iin ('scrobj.dll', 'vbscript.dll', 'jscript.dll', 'jscript9.dll')|

output: >
Suspicious XSL script executed by process %1.ps.child.name with command line arguments %1.ps.child.args
Suspicious XSL script executed by process %1.ps.name with command line arguments %1.ps.args
severity: high

min-engine-version: 3.0.0
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Microsoft Office file execution via WMI
id: 50f6efa2-4d7b-4fb7-b1a9-65c3a24d9152
version: 1.0.3
version: 1.0.4
description: |
Identifies the execution via Windows Management Instrumentation (WMI) of the binary file written
by the Microsoft Office process. Attackers can exploit WMI to silently execute malicious code.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential ClickFix infection chain via Run window
id: ffe1fc54-2893-4760-ab50-51a83bd71d13
version: 1.0.4
version: 1.0.5
description: |
Identifies the execution of the process via the Run command dialog box followed by spawning of the potential
infostealer process.
Expand Down Expand Up @@ -42,7 +42,7 @@ action:
- name: kill

output: >
Potential infostealer process %2.ps.child.exe executed via the Run command window by %1.ps.child.cmdline
Potential infostealer process %2.ps.exe executed via the Run command window by %1.ps.cmdline
severity: high

min-engine-version: 3.0.0
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Suspicious execution via WMI from a Microsoft Office process
id: cc3f0bbe-ec53-40a7-9eed-f0a8a3f7d7fa
version: 1.0.3
version: 1.0.4
description: |
Identifies a suspicious process execution via Windows Management Instrumentation (WMI)
originated from the Microsoft Office process loading an unusual WMI DLL. This technique
Expand Down Expand Up @@ -86,7 +86,7 @@ condition: >
))|

output: >
Suspicious process %2.ps.child.exe launched via WMI from Microsoft Office process %1.ps.cmdline
Suspicious process %2.ps.exe launched via WMI from Microsoft Office process %1.ps.parent.cmdline
severity: high

min-engine-version: 3.0.0
Loading