Skip to content

[Rule Tuning] Merge and Delete duplicate rules for Registration Utilities #1028

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 9 commits into from
Mar 19, 2021
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
[metadata]
creation_date = "2020/03/25"
maturity = "production"
updated_date = "2021/03/03"
deprecation_date = "2021/03/17"
maturity = "deprecated"
updated_date = "2021/03/17"

[rule]
author = ["Elastic"]
Expand Down
54 changes: 0 additions & 54 deletions rules/windows/defense_evasion_reg_beacon.toml

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/03/17"

[rule]
author = ["Elastic"]
Expand All @@ -28,12 +28,15 @@ type = "eql"

query = '''
sequence by process.entity_id
[process where (process.name : "regsvr32.exe" or process.name : "regsvr64.exe" or
process.name : "RegAsm.exe" or process.name : "RegSvcs.exe") and
event.type == "start"]
[network where (process.name : "regsvr32.exe" or process.name : "regsvr64.exe" or
process.name : "RegAsm.exe" or process.name : "RegSvcs.exe") and
not cidrmatch(destination.ip, "10.0.0.0/8", "169.254.169.254", "172.16.0.0/12", "192.168.0.0/16")]
[process where event.type == "start" and
process.name : ("regsvr32.exe", "RegAsm.exe", "RegSvcs.exe") and
not (
user.id == "S-1-5-18" and
(process.parent.name : "msiexec.exe" or process.parent.executable : ("C:\\Program Files (x86)\\*.exe", "C:\\Program Files\\*.exe"))
)
]
[network where process.name : ("regsvr32.exe", "RegAsm.exe", "RegSvcs.exe") and
not cidrmatch(destination.ip, "10.0.0.0/8", "169.254.169.254", "172.16.0.0/12", "192.168.0.0/16") and network.protocol != "dns"]
'''


Expand Down Expand Up @@ -61,4 +64,3 @@ reference = "https://attack.mitre.org/techniques/T1218/010/"
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"