sigma icon indicating copy to clipboard operation
sigma copied to clipboard

Add Rule: proc_creation_win_renamed_ssh.yml

Open omaramin17 opened this issue 6 months ago • 0 comments

Summary of the Pull Request

This PR adds detection for the renaming of the SSH client on Windows, based on the following reference: Rapid7 Blog on Black Basta Ransomware.

Black Basta ransomware operators downloaded a zip archive containing a legitimate copy of OpenSSH for Windows, which was ultimately renamed to RuntimeBroker.exe.

Changelog

new: Renamed SSH Client of Windows

Example Log Event

Execution of SSH client for Windows renamed to asdf.exe

<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'>
    <System>
        <Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/>
        <EventID>7</EventID>
        <Version>3</Version>
        <Level>4</Level>
        <Task>7</Task>
        <Opcode>0</Opcode>
        <Keywords>0x8000000000000000</Keywords>
        <TimeCreated SystemTime='2024-08-15T08:46:16.9016070Z'/>
        <EventRecordID>158024818</EventRecordID>
        <Correlation/>
        <Execution ProcessID='6312' ThreadID='8660'/>
        <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
        <Computer>REDACTED</Computer>
        <Security UserID='S-1-5-18'/>
    </System>
    <EventData>
        <Data Name='RuleName'>-</Data>
        <Data Name='UtcTime'>2024-08-15 08:46:16.887</Data>
        <Data Name='ProcessGuid'>{f3beb03c-c058-66bd-f486-000000002601}</Data>
        <Data Name='ProcessId'>21876</Data>
        <Data Name='Image'>C:\Users\redacted\Desktop\asdf.exe</Data>
        <Data Name='ImageLoaded'>C:\Users\redacted\Desktop\asdf.exe</Data>
        <Data Name='FileVersion'>8.1.0.1</Data>
        <Data Name='Description'>-</Data>
        <Data Name='Product'>OpenSSH for Windows</Data>
        <Data Name='Company'>-</Data>
        <Data Name='OriginalFileName'>-</Data>
        <Data Name='Hashes'>SHA1=A0D1A4F068ED3ED585E5CEC6C787521B1C0D2D64,MD5=C05426E6F6DFB30FB78FBA874A2FF7DC,SHA256=722BEE41CCF54B88660C0E67ADEB2C9612C18D739E5A8EB8C35C3D7066A95871,IMPHASH=91C272778494F545A220F3E427777252</Data>
        <Data Name='Signed'>true</Data>
        <Data Name='Signature'>Microsoft Windows</Data>
        <Data Name='SignatureStatus'>Valid</Data>
        <Data Name='User'>REDACTED</Data>
    </EventData>
</Event>
<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'>
    <System>
        <Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/>
        <EventID>1</EventID>
        <Version>5</Version>
        <Level>4</Level>
        <Task>1</Task>
        <Opcode>0</Opcode>
        <Keywords>0x8000000000000000</Keywords>
        <TimeCreated SystemTime='2024-08-15T08:46:16.8874100Z'/>
        <EventRecordID>158024792</EventRecordID>
        <Correlation/>
        <Execution ProcessID='6312' ThreadID='8504'/>
        <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
        <Computer>REDACTED</Computer>
        <Security UserID='S-1-5-18'/>
    </System>
    <EventData>
        <Data Name='RuleName'>-</Data>
        <Data Name='UtcTime'>2024-08-15 08:46:16.878</Data>
        <Data Name='ProcessGuid'>{f3beb03c-c058-66bd-f486-000000002601}</Data>
        <Data Name='ProcessId'>21876</Data>
        <Data Name='Image'>C:\Users\redacted\Desktop\asdf.exe</Data>
        <Data Name='FileVersion'>8.1.0.1</Data>
        <Data Name='Description'>-</Data>
        <Data Name='Product'>OpenSSH for Windows</Data>
        <Data Name='Company'>-</Data>
        <Data Name='OriginalFileName'>-</Data>
        <Data Name='CommandLine'>asdf.exe</Data>
        <Data Name='CurrentDirectory'>C:\Users\redacted\Desktop\</Data>
        <Data Name='User'>REDACTED</Data>
        <Data Name='LogonGuid'>{f3beb03c-cacc-66bc-b6da-450000000000}</Data>
        <Data Name='LogonId'>0x45dab6</Data>
        <Data Name='TerminalSessionId'>1</Data>
        <Data Name='IntegrityLevel'>High</Data>
        <Data Name='Hashes'>SHA1=A0D1A4F068ED3ED585E5CEC6C787521B1C0D2D64,MD5=C05426E6F6DFB30FB78FBA874A2FF7DC,SHA256=722BEE41CCF54B88660C0E67ADEB2C9612C18D739E5A8EB8C35C3D7066A95871,IMPHASH=91C272778494F545A220F3E427777252</Data>
        <Data Name='ParentProcessGuid'>{f3beb03c-c053-66bd-f186-000000002601}</Data>
        <Data Name='ParentProcessId'>44336</Data>
        <Data Name='ParentImage'>C:\Windows\System32\cmd.exe</Data>
        <Data Name='ParentCommandLine'>"C:\Windows\system32\cmd.exe" </Data>
        <Data Name='ParentUser'>REDACTED</Data>
    </EventData>
</Event>

Fixed Issues

N/A

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

omaramin17 avatar Aug 15 '24 09:08 omaramin17