SigmaHQ / sigma

Main Sigma Rule Repository
Other
8.37k stars 2.2k forks source link

issue with 1 match for rule Use Short Name Path in Image by frack113, Nasreddine Bencherchali from Sigma Integrated Rule Set (GitHub) Detect use of the Windows 8.3 short name. Which could be used as a method to avoid Iamge detection #3407

Closed leemidgley closed 2 years ago

leemidgley commented 2 years ago

Hello, not sure if you can help with this also. which is a High Level one.

InstallShield setup.exe extracting and executing using a 8.3 path. (this is something I don't have control of, that I know of)

TerminalSessionId:1 ProcessGuid:C784477D-A9C4-62FE-6B06-000000003000 ProcessId:3424 Product:InstallShield (R) Description:InstallShield (R) Setup Engine Company:InstallShield Software Corporation ParentProcessGuid:C784477D-D342-62FD-0F00-000000003000 User:DESKTOP-123\lee OriginalFileName:iKernel.exe ParentImage:C:\Windows\System32\svchost.exe FileVersion:6, 31, 100, 1221 ParentProcessId:840 CurrentDirectory:C:\Windows\system32\ CommandLine:C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exe -Embedding EventID:1 LogonGuid:C784477D-D347-62FD-1DD8-030000000000 LogonId:251933 Image:C:\PROGRA~2\COMMON~1\INSTAL~1\engine\6\INTEL3~1\IKernel.exe IntegrityLevel:High ParentCommandLine:C:\Windows\system32\svchost.exe -k DcomLaunch -p UtcTime:2022-08-18 21:06:12.777 RuleName:-

frack113 commented 2 years ago

Should be the rule id: a96970af-f126-420d-90e1-d37bf25e50e1 (proc_creation_win_ntfs_short_name_path_use_image.yml) @nasbench we can add this filter ?

filter_installshield:
    - Product: 'InstallShield (R)'
    - Description: 'InstallShield (R) Setup Engine'
    - Company: 'InstallShield Software Corporation'
nasbench commented 2 years ago

Yes. It's a good filter since we can't control this one. We can be safe and filter the parent process + image name but there might be other binaries used with this. So the filter you proposed frack is good in my opinion

leemidgley commented 2 years ago

Thank you for this.