|
1 | 1 | <!-- |
2 | 2 | sysmon-config | A Sysmon configuration focused on default high-quality event tracing and easy customization by the community |
3 | | - Source version: 73 | Date: 2021-02-16 |
| 3 | + Source version: 74 | Date: 2021-07-08 |
4 | 4 | Source project: https://github.com/SwiftOnSecurity/sysmon-config |
5 | 5 | Source license: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text. |
6 | 6 |
|
|
382 | 382 | <Image condition="end with">AppData\Local\Microsoft\Teams\current\Teams.exe</Image> <!--Microsoft: Teams--> |
383 | 383 | <DestinationHostname condition="is">microsoft.com</DestinationHostname> <!--Microsoft:Update delivery--> |
384 | 384 | <DestinationHostname condition="end with">.microsoft.com</DestinationHostname> <!--Microsoft:Update delivery--> |
| 385 | + <DestinationHostname condition="end with">microsoft.com.akadns.net</DestinationHostname> <!--Microsoft:Update delivery--> |
| 386 | + <DestinationHostname condition="end with">microsoft.com.nsatc.net</DestinationHostname> <!--Microsoft:Update delivery--> |
385 | 387 | <!--OCSP known addresses--> |
386 | 388 | <DestinationIp condition="is">23.4.43.27</DestinationIp> <!--Digicert [ https://otx.alienvault.com/indicator/ip/23.4.43.27 ] --> |
387 | 389 | <DestinationIp condition="is">72.21.91.29</DestinationIp> <!--Digicert [ https://otx.alienvault.com/indicator/ip/72.21.91.29 ] --> |
388 | | - <DestinationHostname condition="is">microsoft.com.akadns.net</DestinationHostname> <!--Microsoft:Update delivery--> |
389 | | - <DestinationHostname condition="end with">.microsoft.com.nsatc.net</DestinationHostname> <!--Microsoft:Update delivery--> |
390 | 390 | <!--Section: Loopback Addresses--> |
391 | 391 | <DestinationIp condition="is">127.0.0.1</DestinationIp> <!--Credit @ITProPaul--> |
392 | 392 | <DestinationIp condition="begin with">fe80:0:0:0</DestinationIp> <!--Credit @ITProPaul--> |
|
479 | 479 |
|
480 | 480 | <!--SYSMON EVENT ID 10 : INTER-PROCESS ACCESS [ProcessAccess]--> |
481 | 481 | <!--EVENT 10: "Process accessed"--> |
482 | | - <!--COMMENT: Can cause high system load.--> |
| 482 | + <!--COMMENT: Can cause high system load, disabled by default.--> |
483 | 483 | <!--COMMENT: Monitor for processes accessing other process' memory.--> |
484 | 484 |
|
485 | 485 | <!--DATA: UtcTime, SourceProcessGuid, SourceProcessId, SourceThreadId, SourceImage, TargetProcessGuid, TargetProcessId, TargetImage, GrantedAccess, CallTrace--> |
|
545 | 545 | <TargetFilename condition="end with">.job</TargetFilename> <!--Scheduled task--> |
546 | 546 | <TargetFilename condition="end with">.pptm</TargetFilename> <!--Microsoft:Office:Word: Macro--> |
547 | 547 | <TargetFilename condition="end with">.ps1</TargetFilename> <!--PowerShell [ More information: http://www.hexacorn.com/blog/2014/08/27/beyond-good-ol-run-key-part-16/ ] --> |
| 548 | + <TargetFilename condition="end with">.sct</TargetFilename> <!--Scripting | Credit @bartblaze --> |
548 | 549 | <TargetFilename condition="end with">.sys</TargetFilename> <!--System driver files--> |
549 | 550 | <TargetFilename condition="end with">.scr</TargetFilename> <!--System driver files--> |
550 | 551 | <TargetFilename condition="end with">.vbe</TargetFilename> <!--VisualBasicScripting--> |
551 | 552 | <TargetFilename condition="end with">.vbs</TargetFilename> <!--VisualBasicScripting--> |
| 553 | + <TargetFilename condition="end with">.wsc</TargetFilename> <!--Scripting | Credit @bartblaze --> |
| 554 | + <TargetFilename condition="end with">.wsf</TargetFilename> <!--Scripting | Credit @bartblaze --> |
552 | 555 | <TargetFilename condition="end with">.xlsm</TargetFilename> <!--Microsoft:Office:Word: Macro--> |
553 | 556 | <TargetFilename condition="end with">.ocx</TargetFilename> <!--Microsoft:ActiveX--> |
554 | 557 | <TargetFilename condition="end with">proj</TargetFilename><!--Microsoft:MSBuild:Script: [ https://twitter.com/subTee/status/885919612969394177 ] --> |
|
712 | 715 | <!--Credential providers--> |
713 | 716 | <TargetObject condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\Credential Provider</TargetObject> <!--Wildcard, includes Credential Providers and Credential Provider Filters--> |
714 | 717 | <TargetObject name="T1101" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\</TargetObject> <!-- [ https://attack.mitre.org/wiki/Technique/T1131 ] [ https://attack.mitre.org/wiki/Technique/T1101 ] --> |
715 | | - <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\</TargetObject> <!--Windows: Changes to WDigest-UseLogonCredential for password scraping [ https://www.trustedsec.com/april-2015/dumping-wdigest-creds-with-meterpreter-mimikatzkiwi-in-windows-8-1/ ] --> |
| 718 | + <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders</TargetObject> <!--Windows: Changes to WDigest-UseLogonCredential for password scraping [ https://www.trustedsec.com/april-2015/dumping-wdigest-creds-with-meterpreter-mimikatzkiwi-in-windows-8-1/ ] --> |
716 | 719 | <TargetObject condition="begin with">HKLM\Software\Microsoft\Netsh</TargetObject> <!--Windows: Netsh helper DLL [ https://attack.mitre.org/wiki/Technique/T1128 ] --> |
717 | 720 | <TargetObject condition="contains">Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable</TargetObject> <!--Windows: Malware often disables a web proxy for 2nd stage downloads --> |
718 | 721 | <!--Networking--> |
|
731 | 734 | <TargetObject name="T1137" condition="contains">Office Test\</TargetObject> <!-- Microsoft:Office: Persistence method [ http://www.hexacorn.com/blog/2014/04/16/beyond-good-ol-run-key-part-10/ ] | Credit @Hexacorn --> |
732 | 735 | <TargetObject name="Suspicious,ChangedURLOutlook" condition="contains all">\Software\Microsoft\Office\;\Outlook\WebView\;URL</TargetObject> <!-- The URL shouldn't be changed all that often and could enable persistance for hackers | @humpelpum [ https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=70 ]--> |
733 | 736 | <TargetObject name="Context,ProtectedModeExitOrMacrosUsed" condition="contains">Security\Trusted Documents\TrustRecords</TargetObject> <!--Microsoft:Office: Monitor when "Enable editing" or "Enable macros" is used | Credit @OutflankNL | [ https://outflank.nl/blog/2018/01/16/hunting-for-evil-detect-macros-being-executed/ ] --> |
| 737 | + <TargetObject name="Context,ContactedDomain" condition="end with">\EnableBHO</TargetObject> <!--Microsoft:Office: Contacted domains stored here 'HKEY_CURRENT_USER\<SID>\SOFTWARE\Microsoft\Office\16.0\Common\Internet\Server Cache\<domain>\EnableBHO' --> |
734 | 738 | <!--IE--> |
735 | 739 | <TargetObject name="T1176" condition="contains">Internet Explorer\Toolbar\</TargetObject> <!--Microsoft:InternetExplorer: Machine and user [ Example: https://www.exterminate-it.com/malpedia/remove-mywebsearch ] --> |
736 | 740 | <TargetObject name="T1176" condition="contains">Internet Explorer\Extensions\</TargetObject> <!--Microsoft:InternetExplorer: Machine and user [ Example: https://www.exterminate-it.com/malpedia/remove-mywebsearch ] --> |
|
755 | 759 | <TargetObject name="T1089,Tamper-Defender" condition="end with">DisableRealtimeMonitoring</TargetObject> <!--Windows:Defender: State modified via registry--> |
756 | 760 | <TargetObject name="T1089,Tamper-Defender" condition="end with">\SubmitSamplesConsent</TargetObject> <!--Windows:Defender: State modified via registry--> |
757 | 761 | <TargetObject name="T1089,Tamper-Defender" condition="begin with">HKLM\Software\Microsoft\Windows Defender\Exclusions</TargetObject> <!--Windows:Defender: State modified via registry--> |
758 | | - <TargetObject name="T1562,Tamper-Defender" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\</TargetObject> <!--Windows:Defender: Exclusions in policy key--> |
| 762 | + <TargetObject name="T1562,Tamper-Defender" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender</TargetObject> <!--Windows:Defender: Monitor any modified via registry--> |
759 | 763 | <!--Windows UAC tampering--> |
760 | 764 | <TargetObject name="T1088" condition="end with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm --> |
761 | 765 | <TargetObject name="T1088" condition="end with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</TargetObject> <!--Detect: UAC Tampering | Credit @ion-storm --> |
|
775 | 779 | <TargetObject name="Context,MsiInstallerStarted" condition="is">HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\InProgress\(Default)</TargetObject> <!--Windows: See when WindowsInstaller is engaged, useful for timeline matching with other events--> |
776 | 780 | <TargetObject name="Tamper-Tracing" condition="begin with">HKLM\Software\Microsoft\Tracing\RASAPI32</TargetObject> <!--Windows: Malware sometimes disables tracing to obfuscate tracks--> |
777 | 781 | <TargetObject name="Context,ProcessAccessedPrivateResource" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\</TargetObject> <!-- Windows: Win10 tracks when and what process uses webcam/microphone/location etc [ https://medium.com/@7a616368/can-you-track-processes-accessing-the-camera-and-microphone-7e6885b37072 ] --> |
| 782 | + <TargetObject condition="contains">\Keyboard Layout\Preload</TargetObject> <!--Microsoft:Windows: Keyboard layout loaded into user session [ https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index ] | Credit @cyb3rops --> |
| 783 | + <TargetObject condition="contains">\Keyboard Layout\Substitutes</TargetObject> <!--Microsoft:Windows: Keyboard layout loaded into user session [ https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index ] | Credit @cyb3rops --> |
778 | 784 | <!--Windows inventory events--> |
779 | 785 | <TargetObject name="InvDB-Path" condition="end with">\LowerCaseLongPath</TargetObject> <!-- [ https://binaryforay.blogspot.com/2017/10/amcache-still-rules-everything-around.html ] --> |
780 | 786 | <TargetObject name="InvDB-Pub" condition="end with">\Publisher</TargetObject> <!-- [ https://binaryforay.blogspot.com/2017/10/amcache-still-rules-everything-around.html ] --> |
|
887 | 893 | <TargetFilename condition="end with">.cmd</TargetFilename> <!--Batch scripting | Credit @ion-storm --> |
888 | 894 | <TargetFilename condition="end with">.doc</TargetFilename> <!--Office doc potentially with macro --> |
889 | 895 | <TargetFilename condition="end with">.hta</TargetFilename> <!--Scripting--> |
| 896 | + <TargetFilename condition="end with">.jse</TargetFilename> <!--Registry File--> |
890 | 897 | <TargetFilename condition="end with">.lnk</TargetFilename> <!--Shortcut file | Credit @ion-storm --> |
891 | 898 | <TargetFilename condition="end with">.ppt</TargetFilename> <!--Office doc potentially with macros--> |
892 | 899 | <TargetFilename condition="end with">.ps1</TargetFilename> <!--PowerShell--> |
893 | 900 | <TargetFilename condition="end with">.ps2</TargetFilename> <!--PowerShell--> |
894 | 901 | <TargetFilename condition="end with">.reg</TargetFilename> <!--Registry File--> |
895 | | - <TargetFilename condition="end with">.jse</TargetFilename> <!--Registry File--> |
| 902 | + <TargetFilename condition="end with">.sct</TargetFilename> <!--Scripting | Credit @bartblaze --> |
896 | 903 | <TargetFilename condition="end with">.vb</TargetFilename> <!--VisualBasicScripting files--> |
897 | 904 | <TargetFilename condition="end with">.vbe</TargetFilename> <!--VisualBasicScripting files--> |
898 | 905 | <TargetFilename condition="end with">.vbs</TargetFilename> <!--VisualBasicScripting files--> |
| 906 | + <TargetFilename condition="end with">.wsc</TargetFilename> <!--Scripting | Credit @bartblaze --> |
| 907 | + <TargetFilename condition="end with">.wsf</TargetFilename> <!--Scripting | Credit @bartblaze --> |
899 | 908 | <TargetFilename condition="end with">:Zone.Identifier</TargetFilename> <!-- Track Zone.Identifiers regardless of their download location --> |
900 | 909 | <TargetFilename condition="end with">:newads</TargetFilename> <!-- CobaltStrike BOF https://github.com/EspressoCake/Self_Deletion_BOF/blob/main/src/main.c --> |
901 | 910 |
|
|
0 commit comments