Rule Library

Sigma Rules

11 rules found for "MSTIC"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Azure Active Directory Hybrid Health AD FS New Server

This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service. A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server. This can be done programmatically via HTTP requests to Azure.

Azureactivitylogs
TA0005 · Defense EvasionT1578 · Modify Cloud Compute Infrastructure
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26cloud
Detectionmediumtest

Azure Active Directory Hybrid Health AD FS Service Delete

This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant. A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs. The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.

Azureactivitylogs
TA0005 · Defense EvasionT1578.003 · Delete Cloud Instance
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26cloud
Detectionmediumtest

Persistence Via Cron Files

Detects creation of cron file or files in Cron directories which could indicates potential persistence.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Max Altgelt (Nextron Systems)+3Fri Oct 15linux
Detectionlowtest

Clipboard Collection with Xclip Tool

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

LinuxProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
Pawel Mazur+3Fri Oct 15linux
Detectionlowtest

DD File Overwrite

Detects potential overwriting and deletion of a file using DD.

LinuxProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteScript

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteShellCommand

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

Azure AD Health Monitoring Agent Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionmediumtest

Azure AD Health Service Agents Registry Keys Access

This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health service agents can be used to potentially abuse some of the features provided by those services in the cloud (e.g. Federation). This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object: HKLM:\SOFTWARE\Microsoft\ADHealthAgent. Make sure you set the SACL to propagate to its sub-keys.

Windowssecurity
TA0007 · DiscoveryT1012 · Query Registry
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26windows
Detectionhightest

User Added to Remote Desktop Users Group

Detects addition of users to the local Remote Desktop Users group via "Net" or "Add-LocalGroupMember".

WindowsProcess Creation
TA0001 · Initial AccessTA0003 · PersistenceTA0008 · Lateral MovementT1133 · External Remote Services+2
Florian Roth (Nextron Systems)Mon Dec 06windows