-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Added rules related to ArcGIS Server Object Extension abuse #5774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
nasbench
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this PR @mbabinski. Below are some open questions and suggestions.
rules/windows/file/file_event/file_event_win_arcsoc_creating_susp_files.yml
Outdated
Show resolved
Hide resolved
rules/windows/file/file_event/file_event_win_arcsoc_creating_susp_files.yml
Outdated
Show resolved
Hide resolved
rules/windows/file/file_event/file_event_win_arcsoc_creating_susp_files.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml
Show resolved
Hide resolved
…le_event_win_arcsoc_susp_file_created.yml
Updated the description for clarity and added 'wmic.exe' to the list of suspicious child processes.
nasbench
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
|
@mbabinski qq for you. Do you happen to have an .evtx file containing logs of this chain. Are you able to generate or provide such evtx? |
frack113
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
| @@ -0,0 +1,44 @@ | |||
| title: Suspicious File Created by ArcSOC.exe | |||
| id: e890acee-d488-420e-8f20-d9b19b3c3d43 | |||
| status: experimental | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Waiting for possible log
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @nasbench, unfortunately I don't have access to ArcGIS Server - if I did I would create a server object extension that does something benign like just runs whoami. I reached out to people at ReliaQuest and Esri trying to get more information and specific log entries related to the intrusion but sadly I did not hear back.
Summary of the Pull Request
These rules pertain to the ArcSOC.exe process component of ArcGIS Server. My research indicates that they would be the initiating process of malicious activities as outlined in this recent threat report from ReliaQuest: https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise/
Changelog
new: ArcSOC.exe Creating Suspicious Files
new: Suspicious ArcSOC.exe Child Process
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions