Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nterl0k T1564.004 - Nothing about this ADS up. #2914

Closed
wants to merge 5 commits into from

Conversation

nterl0k
Copy link
Contributor

@nterl0k nterl0k commented Nov 10, 2023

Details

NTFS Alternate Data Stream abuse techniques

See splunk/attack_data#850 for data as well as a TTP data generation script.

PR has 3 detections
1 detection for executable code stored in an ADS
1 detection for commonly abused processes with command line evidence of execution from ADS.
1 detection for base64 code stored in an ADS, with bonus lazy base64 decoding macro/lookup (optional can be removed but is convenient for analysts).

image

Checklist

  • Validate name matches <platform>_<mitre att&ck technique>_<short description> nomenclature
  • CI/CD jobs passed ✔️
  • Validated SPL logic.
  • Validated tags, description, and how to implement.
  • Verified references match analytic.

@patel-bhavin
Copy link
Contributor

thanks @nterl0k ! We are testing this in our dev environment and left some comments on the attack_data PR!

@nterl0k
Copy link
Contributor Author

nterl0k commented Dec 11, 2023 via email

@patel-bhavin
Copy link
Contributor

image

updated and tested and these detections look good!

@patel-bhavin
Copy link
Contributor

we will ship this in ESCU 4.19.0 :)

@patel-bhavin
Copy link
Contributor

The detections is in PR have now been merged and published! Thanks @nterl0k

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants