Document toolboxDocument toolbox

Release 12 - Out-of-the-box alerts

Our February release improves our library for Windows and Linux, adding a total of 22 new alerts to our library—this brings us to our milestone of 500 out-of-the-box detections. We used various research and pen-testing techniques to help close some gaps in coverage, so these alerts are extra important to have in your library. These are the following MITRE tactics that we have improved:

  • Collection

  • Exfiltration

  • Execution

  • Persistence

Install these alerts today! Also, feel free to install the MITRE Attack Advisor App from Devo Exchange to ensure that your company is properly covered.

For our next release, we will continue to update old alerts and cover more techniques to help your company stay protected.

Alerts updated:

Detection name

Detection description

Devo table/Data source/Category

Changes made

SecOpsGroupMembershipModifiedO365

Group Membership Modified.

cloud.office365.siem_agent_event

Updated alert template to provide better integration with Devo and created public documentation.

SecOpsExplotationAttemptF5BigIp

Detects the exploitation attempt of the vulnerability found in F5 BIG-IP and described in CVE-2020-5902

web.all.access

Updated alert template to provide better integration with Devo and created public documentation.

SecOpsDataExfiltrationToUnsanctionedAppsO365

Detects attempts to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).

cloud.office365.siem_agent_event

Updated alert template to provide better integration with Devo and created public documentation.

 

Details on the new detections released can be seen below:

Detection name

Detection description

Devo table/Data source/Category

SecOpsWinIISWebRootProcessExecution

The execution of a process from inside a web hosting directory. Could indicate when adversaries upload a malicious file to the web server and run the file as a process.

box.all.win

SecOpsWINWmiMOFProcessExecution

Windows Management Instrumentation enables system administrators to perform tasks locally and remotely. Adversaries may utilize the Managed Object Format (MOF) compiler to compile and execute their malicious code within the WMI repository.

box.all.win

SecOpsWinWMIPermanentEventSubscription

WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. WMI subscription execution is proxied by the process WmiPrvSe.exe and might result in elevated SYSTEM privileges.

box.all.win

SecOpsWinWmiTemporaryEventSubscription

WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. WMI subscription execution is proxied by the process WmiPrvSe.exe and might result in elevated SYSTEM privileges.

box.all.win

SecOpsWinPotentialPassTheHash

Adversaries might pass the hash using stolen password hashes to move laterally within an environment, bypassing normal system access controls.

box.all.win

SecOpsWinAutomatedCollectionCmd

Detects a command tha could be trying to compile a list of different sensitive files on the host.

box.all.win

SecOpsLinuxClipboardCopyXclip

Detects attempts to collect data from the clipboard using xclip tool.

box.unix

SecOpsLinuxCompressEncryptData

Detects a potentially malicious command that could be compressing and/or encrypting data on the host.

box.unix

SecOpsWinCompressEncryptData

Detects a potentially malicious command that could be compressing and/or encrypting data on the host.

box.all.win

SecOpsLinuxNcUseDetected

Detects a potentially malicious Nc execution.

box.unix

SecOpsLinuxAbMaliciousExecution

Detects a potentially malicious Ab execution

box.unix

SecOpsLinuxRdpMountShare

Detects a command trying to mount an RDP share. This could indicate that an attacker could be trying to exfiltrate or download files to the target machine.

box.unix

SecOpsLinuxWgetUseDetected

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate. Masquerading occurs when the name or location of an object is manipulated or abused for the sake of evading defenses and observation.

box.unix

SecOpsLinuxSCPDetect

Detects a potentially malicious Scp execution. This could indicate that an attacker could be trying to exfiltrate from or download a file to the target machine.

box.unix

SecOpsLinuxPhpServerStarted

Detects the initialization of a PHP Http server. This could indicate that an attacker could be trying to exfiltrate files from the target machine.

box.unix

SecOpsLinuxRubyHttpServerStarted

Detects the initialization of a Ruby Http server. This could indicate that an attacker could be trying to exfiltrate files from to the target machine.

box.unix

SecOpsLinuxPythonServerStarted

Detects the initialization of a Python simple server. This could indicate that an attacker could be trying to exfiltrate files from to the target machine.

box.unix

SecOpsLinuxCurlExecution

Detects a potentially malicious Curl execution. This could indicate that an attacker could be trying to exfiltrate from or download a file to the target machine.

box.unix

SecOpsWinMapSmbShare

Detects a potentially malicious command that could be related to a mapping of an SMB share.

box.all.win

SecOpsWinNewPsDrive

Detects a command mounting a new PS-drive.

box.all.win

SecOpsWinRcloneExecution

Detects exfiltration using Rclone utility.

box.all.win

SecOpsWinSmtpExfiltration

Detects exfiltration via SMTP.

box.all.win