Skip to content

Commit f60cde8

Browse files
author
vastlimits
committed
Updated converted sigma rules for version version/7.1
1 parent 32944c7 commit f60cde8

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

config/uberAgent-ESA-am-sigma-high-windows.conf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ EventType = File.Create
383383
Tag = potential-file-extension-spoofing-using-right-to-left-override
384384
RiskScore = 75
385385
Annotation = {"mitre_attack": ["T1036.002"]}
386-
Query = (File.Path like r"%\\u202e%" or File.Path like r"%[U+202E]%") and (File.Path like r"%3pm.%" or File.Path like r"%4pm.%" or File.Path like r"%cod.%" or File.Path like r"%fdp.%" or File.Path like r"%ftr.%" or File.Path like r"%gepj.%" or File.Path like r"%gnp.%" or File.Path like r"%gpj.%" or File.Path like r"%ism.%" or File.Path like r"%lmth.%" or File.Path like r"%nls.%" or File.Path like r"%piz.%" or File.Path like r"%slx.%" or File.Path like r"%tdo.%" or File.Path like r"%vsc.%" or File.Path like r"%vwm.%" or File.Path like r"%xcod.%" or File.Path like r"%xslx.%" or File.Path like r"%xtpp.%")
386+
Query = (File.Path like r"%\\u202e%" or File.Path like r"%[U+202E]%" or File.Path like r"%‮%") and (File.Path like r"%3pm.%" or File.Path like r"%4pm.%" or File.Path like r"%cod.%" or File.Path like r"%fdp.%" or File.Path like r"%ftr.%" or File.Path like r"%gepj.%" or File.Path like r"%gnp.%" or File.Path like r"%gpj.%" or File.Path like r"%ism.%" or File.Path like r"%lmth.%" or File.Path like r"%nls.%" or File.Path like r"%piz.%" or File.Path like r"%slx.%" or File.Path like r"%tdo.%" or File.Path like r"%vsc.%" or File.Path like r"%vwm.%" or File.Path like r"%xcod.%" or File.Path like r"%xslx.%" or File.Path like r"%xtpp.%")
387387
GenericProperty1 = File.Path
388388

389389

@@ -1157,7 +1157,7 @@ EventType = File.Create
11571157
Tag = suspicious-double-extension-files
11581158
RiskScore = 75
11591159
Annotation = {"mitre_attack": ["T1036.007"]}
1160-
Query = (File.Path like r"%.exe" or File.Path like r"%.iso" or File.Path like r"%.rar" or File.Path like r"%.svg" or File.Path like r"%.zip") and (File.Path like r"%.doc.%" or File.Path like r"%.docx.%" or File.Path like r"%.gif.%" or File.Path like r"%.jpeg.%" or File.Path like r"%.jpg.%" or File.Path like r"%.mp3.%" or File.Path like r"%.mp4.%" or File.Path like r"%.pdf.%" or File.Path like r"%.png.%" or File.Path like r"%.ppt.%" or File.Path like r"%.pptx.%" or File.Path like r"%.rtf.%" or File.Path like r"%.svg.%" or File.Path like r"%.txt.%" or File.Path like r"%.xls.%" or File.Path like r"%.xlsx.%") or File.Path like r"%.rar.exe" or File.Path like r"%.zip.exe"
1160+
Query = ((File.Path like r"%.exe" or File.Path like r"%.iso" or File.Path like r"%.rar" or File.Path like r"%.svg" or File.Path like r"%.zip") and (File.Path like r"%.doc.%" or File.Path like r"%.docx.%" or File.Path like r"%.gif.%" or File.Path like r"%.jpeg.%" or File.Path like r"%.jpg.%" or File.Path like r"%.mp3.%" or File.Path like r"%.mp4.%" or File.Path like r"%.pdf.%" or File.Path like r"%.png.%" or File.Path like r"%.ppt.%" or File.Path like r"%.pptx.%" or File.Path like r"%.rtf.%" or File.Path like r"%.svg.%" or File.Path like r"%.txt.%" or File.Path like r"%.xls.%" or File.Path like r"%.xlsx.%") or File.Path like r"%.rar.exe" or File.Path like r"%.zip.exe") and not File.Path like r"/usr/share/icons/%"
11611161
GenericProperty1 = File.Path
11621162

11631163

@@ -7897,15 +7897,15 @@ Query = (Process.CommandLine like r"%.DownloadString(%" or Process.CommandLine l
78977897

78987898
[ActivityMonitoringRule platform=Windows]
78997899
# Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence.
7900-
# This is used as an obfuscation and masquerading techniques.
7901-
# Author: Micah Babinski, @micahbabinski, Swachchhanda Shrawan Poudel (Nextron Systems)
7900+
# This character is used as an obfuscation and masquerading techniques by adversaries to trick users into opening malicious files.
7901+
# Author: Micah Babinski, @micahbabinski, Swachchhanda Shrawan Poudel (Nextron Systems), Luc Génaux
79027902
RuleId = ad691d92-15f2-4181-9aa4-723c74f9ddc3
79037903
RuleName = Potential Defense Evasion Via Right-to-Left Override
79047904
EventType = Process.Start
79057905
Tag = proc-start-potential-defense-evasion-via-right-to-left-override
79067906
RiskScore = 75
79077907
Annotation = {"mitre_attack": ["T1036.002"]}
7908-
Query = Process.CommandLine like r"%\\u202e%" or Process.CommandLine like r"%[U+202E]%"
7908+
Query = Process.CommandLine like r"%\\u202e%" or Process.CommandLine like r"%[U+202E]%" or Process.CommandLine like r"%‮%"
79097909

79107910

79117911
[ActivityMonitoringRule platform=Windows]

0 commit comments

Comments
 (0)