Skip to content

xworm #3513

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 6 commits into from
May 15, 2025
Merged

xworm #3513

merged 6 commits into from
May 15, 2025

Conversation

tccontre
Copy link
Contributor

@tccontre tccontre commented May 8, 2025

Updated and Tagged

    modified:   detections/endpoint/cmd_carry_out_string_command_parameter.yml
    modified:   detections/endpoint/executables_or_script_creation_in_suspicious_path.yml
    modified:   detections/endpoint/executables_or_script_creation_in_temp_path.yml
    modified:   detections/endpoint/powershell_loading_dotnet_into_memory_via_reflection.yml
    modified:   detections/endpoint/suspicious_mshta_child_process.yml
    modified:   detections/endpoint/windows_cmdline_tool_execution_from_non_shell_process.yml
    modified:   detections/endpoint/windows_replication_through_removable_media.yml

Tagged

    modified:   detections/endpoint/add_or_set_windows_defender_exclusion.yml
    modified:   detections/endpoint/any_powershell_downloadfile.yml
    modified:   detections/endpoint/any_powershell_downloadstring.yml
    modified:   detections/endpoint/detect_mshta_inline_hta_execution.yml
    modified:   detections/endpoint/detect_mshta_url_in_command_line.yml
    modified:   detections/endpoint/malicious_powershell_process___execution_policy_bypass.yml
    modified:   detections/endpoint/powershell_4104_hunting.yml
    modified:   detections/endpoint/powershell_fileless_script_contains_base64_encoded_content.yml
    modified:   detections/endpoint/powershell_processing_stream_of_data.yml
    modified:   detections/endpoint/recon_avproduct_through_pwh_or_wmi.yml
    modified:   detections/endpoint/registry_keys_used_for_persistence.yml
    modified:   detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml
    modified:   detections/endpoint/suspicious_scheduled_task_from_public_directory.yml
    modified:   detections/endpoint/windows_boot_or_logon_autostart_execution_in_startup_folder.yml
    modified:   detections/endpoint/windows_defender_exclusion_registry_entry.yml
    modified:   detections/endpoint/windows_hijack_execution_flow_version_dll_side_load.yml
    modified:   detections/endpoint/windows_mshta_writing_to_world_writable_path.yml
    modified:   detections/endpoint/windows_powershell_cryptography_namespace.yml
    modified:   detections/endpoint/windows_process_execution_from_programdata.yml
    modified:   detections/endpoint/windows_process_execution_in_temp_dir.yml
    modified:   detections/endpoint/windows_scheduled_task_with_highest_privileges.yml
    modified:   detections/endpoint/windows_suspicious_process_file_path.yml
    modified:   detections/endpoint/windows_system_logoff_commandline.yml
    modified:   detections/endpoint/windows_system_reboot_commandline.yml
    modified:   detections/endpoint/windows_system_shutdown_commandline.yml
    modified:   detections/endpoint/windows_unsigned_dll_side_loading_in_same_process_path.yml
    modified:   detections/endpoint/windows_unsigned_ms_dll_side_loading.yml
    modified:   detections/endpoint/windows_user_execution_malicious_url_shortcut_file.yml
    modified:   detections/endpoint/winevent_scheduled_task_created_within_public_path.yml
    modified:   detections/endpoint/wscript_or_cscript_suspicious_child_process.yml
    new file:   stories/xworm.yml

NEW

    new file:   detections/endpoint/windows_renamed_powershell.yml
    new file:   stories/xworm.yml

What does this PR have in it? Screenshots are worth 1000 words 😄

Checklist

  • Validate name matches <platform>_<mitre att&ck technique>_<short description> nomenclature
  • CI/CD jobs passed ✔️
  • Validated SPL logic.
  • Validated tags, description, and how to implement.
  • Verified references match analytic.
  • Confirm updates to lookups are handled properly.

Notes For Submitters and Reviewers

  • If you're submitting a PR from a fork, ensuring the box to allow updates from maintainers is checked will help speed up the process of getting it merged.
  • Checking the output of the build CI job when it fails will likely show an error about what is failing. You may have a very descriptive error of the specific field(s) in the specific file(s) that is causing an issue. In some cases, its also possible there is an issue with the YAML. Many of these can be caught with the pre-commit hooks if you set them up. These errors will be less descriptive as to what exactly is wrong, but will give you a column and row position in a specific file where the YAML processing breaks. If you're having trouble with this, feel free to add a comment to your PR tagging one of the maintainers and we'll be happy to help troubleshoot it.
  • Updates to existing lookup files can be tricky, because of how Splunk handles application updates and the differences between existing lookup files being updated vs new lookups. You can read more here but the short version is that any changes to lookup files need to bump the the date and version in the associated YAML file.

@tccontre tccontre self-assigned this May 8, 2025
@tccontre tccontre added the WIP DO NOT MERGE Work in Progress label May 8, 2025
@tccontre tccontre removed the WIP DO NOT MERGE Work in Progress label May 15, 2025
@patel-bhavin patel-bhavin added this to the v5.6.0 milestone May 15, 2025
@patel-bhavin
Copy link
Contributor

Updated new search name to Windows Renamed Powershell Execution

@patel-bhavin patel-bhavin merged commit 6e6a5d3 into develop May 15, 2025
4 checks passed
@patel-bhavin patel-bhavin deleted the xworm branch May 15, 2025 19:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants