Title here
Summary here
The SigHunt room allows us to train our writing of sigma rules. It emphasis the selection of the right IoCs in order to avoid being too vast by selecting IoCs that are too generic as well as being too specific by selecting IoCs that can be easily changed, thus not extracting the core working of the incident.
The write-up only contains the sigma rules used to obtain the flag. We only need to focus on the detection part of the rule. Therefore I will only write the detection part in this write-up.
What we know :
detection:
selection:
ParentImage|contains:
- 'chrome.exe'
Image|contains:
- 'mshta.exe'
EventID:'1'
condition: selectionWhat we know :
detection:
selection:
EventID: '1'
CommandLine|contains|all:
- 'certutil'
- '-urlcache'
- '-split'
- '-f'
Image|contains:
- 'certutil.exe'
condition: selectionHere we either find it by name — nc.exe — or by MD5 hash.
detection:
selection:
EventID: 1
CommandLine|contains|all:
- ' -e '
Image|contains:
- 'nc.exe'
selection2:
Hashes|contains:
- 'MD5=523613A7B9DFA398CBD5EBD2DD0F4F38'
condition: selection or selection2detection:
selection:
EventID: 1
CommandLine|contains|all:
- 'downloadstring'
- 'powershell'
- 'Invoke-AllChecks'
- 'new-object net.webclient'
Image|contains:
- 'powershell.exe'
condition: selectiondetection:
selection:
EventID: 1
CommandLine|contains|all:
- ' binPath= '
- 'sc.exe'
- ' config '
Image|contains:
- 'sc.exe'
condition: selectiondetection:
selection:
EventID: 1
CommandLine|contains|all:
- 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce'
- 'reg'
- ' add '
Image|contains:
- 'reg.exe'
condition: selectiondetection:
selection:
EventID: 1
CommandLine|contains|all:
- '-p'
- '7z'
- ' a '
Image|contains:
- '7z.exe'
condition: selectiondetection:
selection:
EventID: 1
CommandLine|contains|all:
- '.zip'
- 'curl'
- ' -d '
Image|contains:
- 'curl.exe'
condition: selectiondetection:
selection:
EventID: 11
TargetFilename|endswith:
- 'huntme'
condition: selectionThis is the end of the write-up. Hope it was useful.