Document toolboxDocument toolbox

Release 9 - Out-of-the-box alerts

This latest release brings more alerts across various technologies, adding a total of 15 new detections for Windows, Office 365, and Endpoint Detection (EDR)—our latest technology to be covered.

Endpoints can cause quite the headache for SOC analysts when involved in an incident, as Endpoints communicate with various important assets within companies and can be used for all sorts of attacks. Endpoints also store your company's most restricted data.

For our upcoming releases we will continue to take a closer look at some of our more “noisy” alerts and tune them to help with our performance. We also plan on expanding our EDR detections, as well as working with some use cases that were provided by our customers.

We urge you to continue to reach out with any questions, thoughts, or concerns about our detections. We love getting feedback and this flow of information helps us create detections or security content that improves your SOC and the product as a whole.

Alert Analyzed/Updated:

Detection name

Changes made

SecOpsWinWmiExecVbsScript

 

Updated the alert to have an enhanced detection condition.

SecOpsWinWmiScriptExecution

Fixed an error where the entity source IP was not properly mapped.

 

Details on the new detections released can be seen below:

Detection name

Detection description

Devo table/Data source/Category

SecOpsBroRdpBruteForceSuccessHydraNcrack

Detects a successful RDP connection via Hydra or Ncrack hacking tools.

ids.bro.rdp

SecOpsBroWinLsatUserEnumeration

Detects actors utilizing MS-LSAT Remote protocol to map security SIDs to user accounts.

ids.bro.dce_rpc

SecOpsBroWinDceRpceServiceCall

Detects the creation or deletion of services via RPC remote administration. Actors may create/delete services to establish a greater foothold once inside a network.

ids.bro.dce_rpc

SecOpsBroWinDceRpcSamrEnumeration

Detects actors enumerating user accounts in Active Directory via Security Account Manager Remote Protocol (SAMR).

ids.bro.dce_rpc

SecOpsBroSmbFirstSeenShare

Detects the first seen SMB share for an entity. Adversaries may utilize SMB shares to transport files; while not inherently malicious, this event should be reviewed for legitimacy.

ids.bro.notice

SecOpsBroSshInteresingHostNameLogin

Detects interesting host name login events. See Bro/Zeek reference for context around interesting hostnames.

ids.bro.notice

SecOpsBroHttpRequestSingleHeader

Detects HTTP requests that contain only a single header.

ids.bro.http

SecOpsBroSelfSignedCert

Detects servers responding via SSL or TLS services using self-signed certificates.

ids.bro.ssl

SecOpsWinMemoryCorruptionVulnerability

Detects exploitation of Microsoft Office Memory Corruption Vulnerability (CVE-2015-1641) allowing remote code execution.

box.all.win

SecOpsWinFakeProcesses

Detects instances of known Windows processes executing outside of standard directories. Malware authors often utilize masquerading to hide malicious executables behind legitimate Windows executable names.

box.all.win

SecOpsWinDnsExeParentProcess

Detects DNS.EXE program spawning other processes.

box.all.win

SecOpsLinuxNOPASSWDSudoers

Detects suspicious command lines that may add an entry to /etc/sudoers with NOPASSWD attribute in Linux platform. This requires auditd installed and configured.

box.unix

SecOpsEDRCrowdStrikeOverwatchNotification

Falcon Overwatch has identified suspicious activity. This has been raised for your awareness and should be investigated as normal.

edr.crowdstrike.falcon

SecOpsEDRCylanceScoreUnsafe

An unsafe file is one that has attributes that greatly resemble malware.

edr.cylance.threats

SecOpsO365PSTExportAlert

This detection is triggered when a user has performed an Ediscovery or exported a pst file with sensitive information.

cloud.office365.management