Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion detections/endpoint/disable_logs_using_wevtutil.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ search: |-
AND
(Processes.process = "*sl*"
OR
Processes.process = "*set-log*" ) Processes.process = "*/e:false*"
Processes.process = "*set-log*" ) Processes.process IN ("*/e:false*", "*/enabled:false*")
BY Processes.action Processes.dest Processes.original_file_name
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ version: 15
date: '2026-04-15'
author: Mauricio Velazco, Michael Haag, Splunk
status: production
type: TTP
type: Anomaly
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did you want to keep the score 50 for this?

description: |
The following analytic detects the spawning of a PowerShell process as a child or grandchild of commonly abused processes like services.exe, wmiprvse.exe, svchost.exe, wsmprovhost.exe, and mmc.exe.
It leverages data from Endpoint Detection and Response (EDR) agents, focusing on process and parent process names, as well as command-line executions.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ search: |-
| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes
WHERE `process_regsvr32`
AND
Processes.process="*/i*"
Processes.process="*/i*" AND NOT Processes.process="*Microsoft\\TeamsMeetingAddin*"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a note in the FP section about this and teams

BY Processes.action Processes.dest Processes.original_file_name
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
Expand Down
6 changes: 3 additions & 3 deletions detections/endpoint/schtasks_run_task_on_demand.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ version: 9
date: '2026-04-15'
author: Teoderick Contreras, Splunk
status: production
type: TTP
type: Anomaly
description: The following analytic detects the execution of a Windows Scheduled Task on demand via the shell or command line. It leverages process-related data, including process name, parent process, and command-line executions, sourced from endpoint logs. The detection focuses on 'schtasks.exe' with an associated 'run' command. This activity is significant as adversaries often use it to force the execution of their created Scheduled Tasks for persistent access or lateral movement within a compromised machine. If confirmed malicious, this could allow attackers to maintain persistence or move laterally within the network, potentially leading to further compromise.
data_source:
- Sysmon EventID 1
Expand Down Expand Up @@ -42,10 +42,10 @@ rba:
risk_objects:
- field: dest
type: system
score: 50
score: 20
- field: user
type: user
score: 50
score: 20
threat_objects: []
tags:
analytic_story:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,15 +4,15 @@ version: 13
date: '2026-04-15'
author: Michael Haag, Splunk
status: production
type: TTP
type: Anomaly
description: The following analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers. It leverages data from Endpoint Detection and Response (EDR) agents, focusing on process execution events where AppCmd.exe is used with specific parameters to alter logging settings. This activity is significant because disabling HTTP logging can help adversaries hide their tracks and avoid detection by removing evidence of their actions. If confirmed malicious, this could allow attackers to operate undetected, making it difficult to trace their activities and respond to the intrusion effectively.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: |-
| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes
WHERE NOT (Processes.parent_process_name IN ("msiexec.exe", "iissetup.exe")) Processes.process_name=appcmd.exe Processes.process IN ("*set config*", "*httplogging*","*dontlog:true*")
WHERE NOT (Processes.parent_process_name IN ("msiexec.exe", "iissetup.exe")) Processes.process_name=appcmd.exe Processes.process IN ("*httplogging*","*dontlog:true*")
BY Processes.action Processes.dest Processes.original_file_name
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ version: 13
date: '2026-04-15'
author: Teoderick Contreras, Splunk
status: production
type: TTP
type: Anomaly
description: |
The following analytic identifies the modification of security permissions
on files or directories using tools like icacls.exe, cacls.exe, or xcacls.exe. It
Expand Down Expand Up @@ -50,10 +50,10 @@ rba:
risk_objects:
- field: dest
type: system
score: 50
score: 30
- field: user
type: user
score: 50
score: 30
threat_objects: []
tags:
analytic_story:
Expand Down
6 changes: 3 additions & 3 deletions detections/endpoint/windows_msiexec_remote_download.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ version: 15
date: '2026-04-15'
author: Michael Haag, Splunk
status: production
type: TTP
type: Anomaly
description: |
The following analytic detects the use of msiexec.exe with an HTTP or
HTTPS URL in the command line, indicating a remote file download attempt. This detection
Expand Down Expand Up @@ -61,10 +61,10 @@ rba:
risk_objects:
- field: user
type: user
score: 50
score: 30
- field: dest
type: system
score: 50
score: 30
threat_objects:
- field: parent_process_name
type: parent_process_name
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,15 +4,15 @@ version: 14
date: '2026-04-15'
author: Michael Haag, Splunk
status: production
type: TTP
type: Anomaly
description: The following analytic detects MSIExec spawning multiple discovery commands, such as Cmd.exe or PowerShell.exe. This behavior is identified using data from Endpoint Detection and Response (EDR) agents, focusing on process creation events where MSIExec is the parent process. This activity is significant because MSIExec typically does not spawn child processes other than itself, making this behavior highly suspicious. If confirmed malicious, an attacker could use these discovery commands to gather system information, potentially leading to further exploitation or lateral movement within the network.
data_source:
- Sysmon EventID 1
- Windows Event Log Security 4688
- CrowdStrike ProcessRollup2
search: |-
| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes
WHERE Processes.parent_process_name=msiexec.exe Processes.process_name IN ("powershell.exe", "pwsh.exe","cmd.exe", "nltest.exe","ipconfig.exe","systeminfo.exe")
WHERE Processes.parent_process_name=msiexec.exe Processes.process_name IN ("powershell.exe", "pwsh.exe", "nltest.exe","ipconfig.exe","systeminfo.exe")
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add reasoning for the filter, so that people do not add it in the future without consideration.

BY Processes.action Processes.dest Processes.original_file_name
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
Expand Down Expand Up @@ -43,10 +43,10 @@ rba:
risk_objects:
- field: user
type: user
score: 50
score: 30
- field: dest
type: system
score: 50
score: 30
threat_objects:
- field: parent_process_name
type: parent_process_name
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ search: |-
"*;LS*",
"*;S-1-5-19*"
)
NOT Processes.process IN ("*McAfeeFramework*", "*mfefire*", "*mfemms*", "*mfevtp*", "*macmnsvc*", "*masvc*")
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a note in the rule to make people aware about this filter. So for those who do not use McAfee products make the necessary changes if they want

BY Processes.action Processes.dest Processes.original_file_name
Processes.parent_process Processes.parent_process_exec
Processes.parent_process_guid Processes.parent_process_id
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ version: 10
date: '2026-04-15'
author: Steven Dick
status: production
type: TTP
type: Anomaly
description: The following analytic identifies the execution of suspicious processes typically associated with WebShell activity on web servers. It detects when processes like `cmd.exe`, `powershell.exe`, or `bash.exe` are spawned by web server processes such as `w3wp.exe` or `nginx.exe`. This behavior is significant as it may indicate an adversary exploiting a web application vulnerability to install a WebShell, providing persistent access and command execution capabilities. If confirmed malicious, this activity could allow attackers to maintain control over the compromised server, execute arbitrary commands, and potentially escalate privileges or exfiltrate sensitive data.
data_source:
- Sysmon EventID 1
Expand Down Expand Up @@ -48,10 +48,10 @@ rba:
risk_objects:
- field: user
type: user
score: 50
score: 10
- field: dest
type: system
score: 50
score: 10
threat_objects:
- field: process_name
type: process_name
Expand Down
Loading