Skip to content

[New RTA] Endpoint Rules #2788

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 114 commits into from
Jun 23, 2023
Merged

[New RTA] Endpoint Rules #2788

merged 114 commits into from
Jun 23, 2023

Conversation

Samirbous
Copy link
Contributor

@Samirbous Samirbous commented May 11, 2023

Rules Summary :

NTDLL Loaded from an Unusual Path 
Suspicious Impersonation as Trusted Installer
Potential Privilege Escalation via Token Impersonation
Privilege Escalation via EXTENDED STARTUPINFO
Security Account Manager (SAM) Registry Access
Suspicious Access to LSA Secrets Registry
Sensitive File Access - Unattended Panther
Sensitive File Access - SSH Saved Keys
Sensitive File Access - System Admin Utilities
Potential Credential Access via Windows Credential History
Failed Attempts to Access Sensitive Files
Potential Discovery of Windows Credential Manager Store 
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode 
Potential Injection via the Console Window Class
Network Module Loaded from Suspicious Unbacked Memory
Potential Masquerading as Windows Error Manager
Potential DLL SideLoad via a Renamed Signed Binary
Suspicious DNS Query from Mounted Virtual Disk
Suspicious DNS Query to Free SSL Certificate Domains
DNS Query to Suspicious Top Level Domain
Persistence via a Process from a Removable or Mounted ISO Device
Scheduled Task from a Removable or Mounted ISO Device
Suspicious ImageLoad from an ISO Mounted Device
DLL Loaded from an Archive File
Library Loaded via a CallBack Function
Oversized DLL Creation followed by SideLoad
Potential Evasion via Oversized Image Load
Rundll32 or Regsvr32 Executing an OverSized File
DLL Side Loading via a Copied Microsoft Executable
Suspicious Access to Active Directory Database File
Security Account Manager (SAM) File Access
Suspicious Execution via DotNet Remoting
Suspicious ImageLoad via Windows CertOC
Suspicious ImageLoad via ODBC Driver Configuration Program
Potential Evasion via Intel GfxDownloadWrapper
Potential NTDLL Memory Unhooking
Suspicious Image Load via LdrLoadDLL
Process Creation from Modified NTDLL

NTDLL Loaded from an Unusual Path :

image

Suspicious Impersonation as Trusted Installer :

image

Potential Privilege Escalation via Token Impersonation :

image

Privilege Escalation via EXTENDED STARTUPINFO :

image

Security Account Manager (SAM) Registry Access :

image

Suspicious Access to LSA Secrets Registry :

image

Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys :

image

Potential Process Creation via ShellCode & Potential Injection via the Console Window Class :

image

Network Module Loaded from Suspicious Unbacked Memory (Diag) & Potential Masquerading as Windows Error Manager (Diag) (dummy shellcode to load ws2_32.dll from unbacked memory into an instance of WerFault.exe :

image

image

Potential DLL SideLoad via a Renamed Signed Binary :

image

Suspicious DNS Query from Mounted Virtual Disk
Suspicious DNS Query to Free SSL Certificate Domains
Suspicious DNS Query to Free SSL Certificate Domains:

image

Persistence via a Process from a Removable or Mounted ISO Device
Scheduled Task from a Removable or Mounted ISO Device

image

Suspicious ImageLoad from an ISO Mounted Device :
DLL Loaded from an Archive File:

image

Library Loaded via a CallBack Function:

image

Oversized DLL Creation followed by SideLoad
Potential Evasion via Oversized Image Load
Rundll32 or Regsvr32 Executing an OverSized File
DLL Side Loading via a Copied Microsoft Executable
image

Security Account Manager (SAM) File Access

image

Potential NTDLL Memory Unhooking
Suspicious Image Load via LdrLoadDLL
Process Creation from Modified NTDLL:
image

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode
@Samirbous Samirbous added RTA work on RTA framework OS: Windows windows related rules labels May 11, 2023
@Samirbous Samirbous self-assigned this May 11, 2023
@Samirbous
Copy link
Contributor Author

Samirbous commented Jun 23, 2023

@brokensound77 @Mikaayenson thanks for your reviews.

Copy link
Contributor

@Mikaayenson Mikaayenson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🏅 Fantastic

Copy link
Contributor

@eric-forte-elastic eric-forte-elastic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good! 👍

Minor NIT, may want to add new lines to these files.

@Samirbous Samirbous merged commit 0f6ded4 into main Jun 23, 2023
@Samirbous Samirbous deleted the rta-sbo branch June 23, 2023 15:58
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
protectionsmachine pushed a commit that referenced this pull request Jun 23, 2023
* [New RTA] Endpoint Rules

Suspicious Access to LSA Secrets Registry
Security Account Manager (SAM) Registry Access
Privilege Escalation via EXTENDED STARTUPINFO
Potential Privilege Escalation via Token Impersonation
Suspicious Impersonation as Trusted Installer
NTDLL Loaded from an Unusual Path
Sensitive File Access - Unattended Panther
Potential Discovery of Windows Credential Manager Store
Potential Discovery of DPAPI Master Keys
Potential Process Creation via ShellCode

* Update evasion_ntdll_from_unusual_path.py

* Update credaccess_reg_query_privesc_token_manip.py

* Create shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* fix import

* Update credaccess_reg_query_privesc_token_manip.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_winexec_calc.py

* DLL Side Loading via a Copied Microsoft Executable

* Update sideload_msbin_faultrep.py

* DLL SideLoad via a Microsoft Signed Binary

* Update sideload_msbin_faultrep.py

* C2 via ISO file

* ++

* persistence from ISO

* Update exec_persistence_from_iso.py

* replaced win32con with actual static values

* Update sensitive_file_access.py

* Update credaccess_reg_query_privesc_token_manip.py

* Update ExecFromISOFile.ps1

* Suspicious ImageLoad from an ISO Mounted Device

* Update execution_iso_dll_rundll32.py

* Update c2_dns_from_iso.py

* Update shellcode_load_ws2_32_unbacked.py

* Update shellcode_load_ws2_32_unbacked.py

* Update impersonate_trusted_installer.py

* Library Loaded via a Callback Function

* Update evasion_loadlib_via_callback.py

* ++

* added ntds.dit access

* Security Account Manager (SAM) File Access

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Update sensitive_file_access.py

* Suspicious Execution via DotNet Remoting

* Update evasion_addinproc_certoc.py

* Update evasion_addinproc_certoc_odbc.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* ++

* Update evasion_unhook_ldrloaddll.py

* added ETW and AMSI patching

* Update evasion_oversized_dll_load.py

* Update sensitive_file_access.py

added technique ids

* Update c2_dns_from_iso.py

fixed endpoint rule.ids array

* moved getppid to common.py

* moved impersonate_system to common

* moved inject to common.py

* Update credaccess_sam_from_vss.py

* Update evasion_addinproc_certoc_odbc_gfxdwn.py

* Update evasion_loadlib_via_callback.py

* Update evasion_oversized_dll_load.py

* Update evasion_patch_etw_amsi.py

* Update execution_iso_dll_sideload.py

* Update evasion_unhook_ldrloaddll.py

* Update exec_persistence_from_iso.py

* Update execution_iso_dll_rundll32.py

* Update sensitive_file_access.py

* Update shellcode_load_ws2_32_unbacked.py

* ++

* Update rta/c2_dns_from_iso.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_reg_query_privesc_token_manip.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/common.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update shellcode_winexec_calc.py

* Update shellcode_load_ws2_32_unbacked.py

* Update c2_dns_from_iso.py

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update evasion_oversized_dll_load.py

* Update rta/credaccess_sam_from_vss.py

Co-authored-by: Justin Ibarra <[email protected]>

* Update credaccess_sam_from_vss.py

* Update c2_dns_from_iso.py

* ++

* ++

* ++

* Update impersonate_trusted_installer.py

* Update evasion_patch_etw_amsi.py

* Update credaccess_reg_query_privesc_token_manip.py

* ++

* Update evasion_ntdll_from_unusual_path.py

* Update evasion_oversized_dll_load.py

* ++

* Update common.py

* Update ExecFromISOFile.ps1

* Update evasion_ntdll_from_unusual_path.py

* add cpp source files

* Update rta/common.py

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/LoadLib-Callback64.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/src/rta_unhook_ldrload.cpp

Co-authored-by: eric-forte-elastic <[email protected]>

* Update rta/impersonate_trusted_installer.py

Co-authored-by: eric-forte-elastic <[email protected]>

---------

Co-authored-by: Justin Ibarra <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson <[email protected]>

(cherry picked from commit 0f6ded4)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto OS: Windows windows related rules RTA work on RTA framework
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants