Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto_campaign #3240

Merged
merged 38 commits into from
Jan 24, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
ab8b13c
crypto_campaign
tccontre Dec 13, 2024
5dd5554
Branch was auto-updated.
patel-bhavin Dec 16, 2024
36310e2
Branch was auto-updated.
patel-bhavin Dec 16, 2024
9c750f2
Branch was auto-updated.
patel-bhavin Dec 16, 2024
2a14589
Branch was auto-updated.
patel-bhavin Dec 16, 2024
3b701f7
Branch was auto-updated.
patel-bhavin Dec 16, 2024
8708b5f
Branch was auto-updated.
patel-bhavin Dec 16, 2024
b7f7c8c
Branch was auto-updated.
patel-bhavin Dec 16, 2024
6fc84d9
crypto_campaign
tccontre Dec 17, 2024
c7d68b5
crypto_campaign
tccontre Dec 17, 2024
95be36e
crypto_campaign
tccontre Dec 17, 2024
3db1a7e
crypto_campaign
tccontre Dec 17, 2024
6581cc6
crypto_campaign
tccontre Dec 17, 2024
4a5edfb
crypto_campaign
tccontre Dec 17, 2024
96ce187
crypto_campaign
tccontre Dec 18, 2024
aa34aa3
crypto_campaign
tccontre Dec 18, 2024
cac473c
Branch was auto-updated.
patel-bhavin Dec 18, 2024
6987fdc
Branch was auto-updated.
patel-bhavin Jan 3, 2025
00b1344
Branch was auto-updated.
patel-bhavin Jan 3, 2025
3579b63
Branch was auto-updated.
patel-bhavin Jan 6, 2025
4f8f4ef
Branch was auto-updated.
patel-bhavin Jan 6, 2025
9153947
crypto_campaign
tccontre Jan 8, 2025
185a5b8
crypto_campaign
tccontre Jan 8, 2025
7a46c66
crypto_campaign
tccontre Jan 8, 2025
4f75199
crypto_campaign
tccontre Jan 8, 2025
1e78187
crypto_campaign
tccontre Jan 8, 2025
0349709
Branch was auto-updated.
patel-bhavin Jan 8, 2025
ef6e7e7
Branch was auto-updated.
patel-bhavin Jan 9, 2025
e1a5602
Branch was auto-updated.
patel-bhavin Jan 9, 2025
8087f9f
Branch was auto-updated.
patel-bhavin Jan 10, 2025
3d32cfb
Branch was auto-updated.
patel-bhavin Jan 14, 2025
3e72f4e
Branch was auto-updated.
patel-bhavin Jan 14, 2025
cb90b85
Merge branch 'develop' into crypto_campaign
patel-bhavin Jan 17, 2025
a059e2d
updating with rba
patel-bhavin Jan 22, 2025
87f86e7
crypto_campaign
tccontre Jan 23, 2025
322008a
crypto_campaign
tccontre Jan 23, 2025
11dd085
Merge branch 'develop' into crypto_campaign
patel-bhavin Jan 23, 2025
6692321
Merge branch 'develop' into crypto_campaign
patel-bhavin Jan 24, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 8 additions & 7 deletions detections/endpoint/add_or_set_windows_defender_exclusion.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Add or Set Windows Defender Exclusion
id: 773b66fe-4dd9-11ec-8289-acde48001122
version: 6
date: '2024-12-10'
version: '6'
date: '2024-12-17'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -65,14 +65,15 @@ rba:
threat_objects: []
tags:
analytic_story:
- WhisperGate
- Windows Defense Evasion Tactics
- CISA AA22-320A
- AgentTesla
- Remcos
- Data Destruction
- CISA AA22-320A
- ValleyRAT
- Compromised Windows Host
- AgentTesla
- ValleyRAT
- Windows Defense Evasion Tactics
- WhisperGate
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1562.001
Expand Down
11 changes: 6 additions & 5 deletions detections/endpoint/any_powershell_downloadfile.yml
Original file line number Diff line number Diff line change
Expand Up @@ -71,15 +71,16 @@ rba:
type: process_name
tags:
analytic_story:
- DarkCrystal RAT
- Ingress Tool Transfer
- Hermetic Wiper
- Malicious PowerShell
- Data Destruction
- Log4Shell CVE-2021-44228
- Phemedrone Stealer
- Braodo Stealer
- Data Destruction
- PXA Stealer
- Ingress Tool Transfer
- Malicious PowerShell
- DarkCrystal RAT
- Crypto Stealer
- Braodo Stealer
asset_type: Endpoint
cve:
- CVE-2021-44228
Expand Down
3 changes: 2 additions & 1 deletion detections/endpoint/chcp_command_execution.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,9 +65,10 @@ rba:
threat_objects: []
tags:
analytic_story:
- IcedID
- Azorult
- Forest Blizzard
- Crypto Stealer
- IcedID
asset_type: Endpoint
mitre_attack_id:
- T1059
Expand Down
29 changes: 15 additions & 14 deletions detections/endpoint/cmd_carry_out_string_command_parameter.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,26 +38,27 @@ references:
- https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
tags:
analytic_story:
- AsyncRAT
- Winter Vivern
- WhisperGate
- Living Off The Land
- Data Destruction
- DarkGate Malware
- Chaos Ransomware
- Hermetic Wiper
- Warzone RAT
- Winter Vivern
- ProxyNotShell
- Log4Shell CVE-2021-44228
- IcedID
- Living Off The Land
- NjRAT
- RedLine Stealer
- Log4Shell CVE-2021-44228
- CISA AA23-347A
- AsyncRAT
- Rhysida Ransomware
- IcedID
- Chaos Ransomware
- PlugX
- DarkCrystal RAT
- Crypto Stealer
- Azorult
- Qakbot
- Hermetic Wiper
- Warzone RAT
- DarkCrystal RAT
- CISA AA23-347A
- Data Destruction
- RedLine Stealer
- PlugX
- WhisperGate
asset_type: Endpoint
cve:
- CVE-2021-44228
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@ rba:
tags:
analytic_story:
- Compromised User Account
- Crypto Stealer
asset_type: Account
mitre_attack_id:
- T1110.003
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/detect_rare_executables.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,7 @@ tags:
analytic_story:
- Unusual Processes
- Rhysida Ransomware
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1204
Expand Down
3 changes: 2 additions & 1 deletion detections/endpoint/download_files_using_telegram.yml
Original file line number Diff line number Diff line change
Expand Up @@ -50,9 +50,10 @@ rba:
threat_objects: []
tags:
analytic_story:
- XMRig
- Phemedrone Stealer
- Crypto Stealer
- Snake Keylogger
- XMRig
asset_type: Endpoint
mitre_attack_id:
- T1105
Expand Down
3 changes: 2 additions & 1 deletion detections/endpoint/excessive_service_stop_attempt.yml
Original file line number Diff line number Diff line change
Expand Up @@ -63,9 +63,10 @@ rba:
type: process_name
tags:
analytic_story:
- XMRig
- Ransomware
- BlackByte Ransomware
- Crypto Stealer
- XMRig
asset_type: Endpoint
mitre_attack_id:
- T1489
Expand Down
3 changes: 2 additions & 1 deletion detections/endpoint/excessive_usage_of_cacls_app.yml
Original file line number Diff line number Diff line change
Expand Up @@ -62,10 +62,11 @@ rba:
type: process_name
tags:
analytic_story:
- XMRig
- Azorult
- Windows Post-Exploitation
- Prestige Ransomware
- XMRig
- Crypto Stealer
- Defense Evasion or Unauthorized Access Via SDDL Tampering
asset_type: Endpoint
mitre_attack_id:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,8 +54,9 @@ rba:
threat_objects: []
tags:
analytic_story:
- Ransomware
- Azorult
- Ransomware
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1569
Expand Down
5 changes: 3 additions & 2 deletions detections/endpoint/excessive_usage_of_taskkill.yml
Original file line number Diff line number Diff line change
Expand Up @@ -62,12 +62,13 @@ rba:
type: parent_process_name
tags:
analytic_story:
- XMRig
- Azorult
- CISA AA22-264A
- AgentTesla
- CISA AA22-277A
- NjRAT
- CISA AA22-264A
- XMRig
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1562.001
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,41 +61,42 @@ rba:
type: file_name
tags:
analytic_story:
- Volt Typhoon
- LockBit Ransomware
- Data Destruction
- Snake Keylogger
- XMRig
- DarkGate Malware
- Chaos Ransomware
- Double Zero Destructor
- Hermetic Wiper
- Warzone RAT
- AcidPour
- Graceful Wipe Out Attack
- AsyncRAT
- WhisperGate
- DarkGate Malware
- AgentTesla
- Brute Ratel C4
- BlackByte Ransomware
- IcedID
- NjRAT
- RedLine Stealer
- Handala Wiper
- Meduza Stealer
- CISA AA23-347A
- AsyncRAT
- Amadey
- Industroyer2
- ValleyRAT
- Rhysida Ransomware
- Swift Slicer
- IcedID
- DarkCrystal RAT
- Chaos Ransomware
- PlugX
- Industroyer2
- Crypto Stealer
- Azorult
- Remcos
- XMRig
- Swift Slicer
- AgentTesla
- Qakbot
- Volt Typhoon
- Hermetic Wiper
- Warzone RAT
- Remcos
- Trickbot
- Amadey
- BlackByte Ransomware
- LockBit Ransomware
- CISA AA23-347A
- Data Destruction
- Snake Keylogger
- AcidPour
- Handala Wiper
- Brute Ratel C4
- RedLine Stealer
- PlugX
- MoonPeak
- ValleyRAT
- Meduza Stealer
- WhisperGate
asset_type: Endpoint
mitre_attack_id:
- T1036
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -60,10 +60,11 @@ rba:
threat_objects: []
tags:
analytic_story:
- Windows Persistence Techniques
- Azorult
- Windows Persistence Techniques
- Compromised Windows Host
- Windows Defense Evasion Tactics
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1222
Expand Down
7 changes: 4 additions & 3 deletions detections/endpoint/high_process_termination_frequency.yml
Original file line number Diff line number Diff line change
Expand Up @@ -51,11 +51,12 @@ rba:
type: process
tags:
analytic_story:
- Clop Ransomware
- LockBit Ransomware
- BlackByte Ransomware
- Rhysida Ransomware
- Clop Ransomware
- Snake Keylogger
- Rhysida Ransomware
- BlackByte Ransomware
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1486
Expand Down
3 changes: 2 additions & 1 deletion detections/endpoint/icacls_deny_command.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,8 +65,9 @@ tags:
analytic_story:
- Azorult
- Sandworm Tools
- XMRig
- Compromised Windows Host
- XMRig
- Crypto Stealer
- Defense Evasion or Unauthorized Access Via SDDL Tampering
asset_type: Endpoint
mitre_attack_id:
Expand Down
9 changes: 5 additions & 4 deletions detections/endpoint/icacls_grant_command.yml
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
name: ICACLS Grant Command
id: b1b1e316-accc-11eb-a9b4-acde48001122
version: 5
date: '2024-12-16'
version: '5'
date: '2024-12-17'
author: Teoderick Contreras, Splunk
status: production
type: TTP
type: Anomaly
description: The following analytic detects the use of the ICACLS command to grant
additional access permissions to files or directories. It leverages data from Endpoint
Detection and Response (EDR) agents, focusing on specific process names and command-line
Expand Down Expand Up @@ -62,8 +62,9 @@ rba:
threat_objects: []
tags:
analytic_story:
- XMRig
- Ransomware
- Crypto Stealer
- XMRig
- Defense Evasion or Unauthorized Access Via SDDL Tampering
asset_type: Endpoint
mitre_attack_id:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,17 +43,18 @@ references:
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
tags:
analytic_story:
- Hermetic Wiper
- Malicious PowerShell
- NOBELIUM Group
- WhisperGate
- DarkCrystal RAT
- Qakbot
- CISA AA22-320A
- Hermetic Wiper
- Sandworm Tools
- Data Destruction
- Qakbot
- Volt Typhoon
- NOBELIUM Group
- Data Destruction
- Lumma Stealer
- Malicious PowerShell
- DarkCrystal RAT
- WhisperGate
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1027
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,13 @@ author: Teoderick Contreras, Splunk
status: production
type: Anomaly
description: The following analytic detects the modification of ACL permissions to
files or folders, making them accessible to everyone. It leverages data from Endpoint
Detection and Response (EDR) agents, focusing on processes like "cacls.exe," "icacls.exe,"
and "xcacls.exe" with specific command-line arguments. This activity is significant
as it may indicate an adversary attempting to evade ACLs or access protected files.
If confirmed malicious, this could allow unauthorized access to sensitive data,
potentially leading to data breaches or further system compromise.
files or folders, making them accessible to everyone or to system account. It leverages
data from Endpoint Detection and Response (EDR) agents, focusing on processes like
"cacls.exe," "icacls.exe," and "xcacls.exe" with specific command-line arguments.
This activity is significant as it may indicate an adversary attempting to evade
ACLs or access protected files. If confirmed malicious, this could allow unauthorized
access to sensitive data, potentially leading to data breaches or further system
compromise.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
Expand Down Expand Up @@ -59,6 +60,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- Crypto Stealer
- XMRig
- Defense Evasion or Unauthorized Access Via SDDL Tampering
asset_type: Endpoint
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,8 +62,9 @@ rba:
type: process_name
tags:
analytic_story:
- Ransomware
- Sandworm Tools
- Ransomware
- Crypto Stealer
asset_type: Endpoint
mitre_attack_id:
- T1222
Expand Down
Loading
Loading