Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: check for processes deleting themselves #4995

Merged
merged 2 commits into from
Sep 3, 2024

Conversation

secDre4mer
Copy link
Collaborator

@secDre4mer secDre4mer commented Sep 3, 2024

Summary of the Pull Request

Add a rule to detect Windows binaries deleting themselves.

Changelog

new: Process Deletion of Its Own Executable

Example Log Event

AURORA: Notice MODULE: Sigma MESSAGE: Sigma match found RULE_TITLE: Process Deleted i ts Own Executable RULE_AUTHOR: Max Altgelt RULE_DESCRIPTION: Detects deletion of a process's own executable by itself. This is usually not possible without workarounds and may be used by malware to hide its own traces. RULE_FALSEPOSITIVES: RULE_ID: f01d1f70-cd41-42ec-9c0b-26dd9c22bf29 RULE_LEVEL: medium RULE_MODIFIED: 2024-09-03 RULE_PATH: correlation.yml RULE_REFERENCES: https://github.com/joaoviictorti/RustRedOps/tree/main/Self_Deletion RULE_SIGTYPE: custom COMMANDLINE: "\"C:\\Users\\Max\\Downloads\\deleteself2.exe\"" COMPUTER: DESKTOP-EEM5B52 CORRELATION_ACTIVITYID: {00000000-0000-0000-0000-000000000000} EVENTID: 26 EXECUTION_THREADID: 448 EXTRAINFORMATION: 0x0 FILEKEY: 0xFFFFAF0EA6DDF280 FILEOBJECT: 0xFFFFBF8A8CD059A0 FILEPATH: \Device\HarddiskVolume2\Users\Max\Downloads\deleteself2.exe IMAGE: C:\Users\Max\Downloads\deleteself2.exe INFOCLASS: 64 IRP: 0xFFFFBF8A87DF1AF8 ISSUINGTHREADID: 448 KEYWORDS: 0x8000000000000400 LEVEL: 4 MATCH_STRINGS: C:\Users\Max\Downloads\deleteself2.exe in TargetFilename OPCODE: 0 PARENTCOMMANDLINE: c:\windows\system32\windowspowershell\v1.0\powershell.exe PARENTIMAGE: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PROCESSID: 7424 PROVIDER_GUID: {EDD08927-9CC4-4E65-B970-C2560FB5C289} PROVIDER_NAME: Microsoft-Windows-Kernel-File SECURITY_USERID: S-1-5-21-1104056715-1399659138-4213224034-1001 TARGETFILENAME: C:\Users\Max\Downloads\deleteself2.exe TASK: 26 TIMECREATED_SYSTEMTIME: 2024-09-03T13:08:51.4639719+02:00 USER: DESKTOP-EEM5B52\Max VERSION: 1 WINVERSION: 19045

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Sep 3, 2024
@nasbench nasbench self-assigned this Sep 3, 2024
@nasbench nasbench self-requested a review September 3, 2024 13:40
@nasbench nasbench added Work In Progress Some changes are needed and removed Work In Progress Some changes are needed labels Sep 3, 2024
@nasbench nasbench merged commit 9b39e26 into SigmaHQ:master Sep 3, 2024
12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants