forked from splunk/security_content
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathbadrabbit_schtasks.yml
More file actions
111 lines (111 loc) · 3.9 KB
/
badrabbit_schtasks.yml
File metadata and controls
111 lines (111 loc) · 3.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
asset_type: Endpoint
confidence: medium
creation_date: '2017-11-03'
data_metadata:
data_models:
- Endpoint
data_source:
- Endpoint Intel
providing_technologies:
- Carbon Black Response
- CrowdStrike Falcon
- Sysmon
- Tanium
- Ziften
description: This search looks for flags passed to schtasks.exe on the command-line
that indicate that task names related to the execution of Bad Rabbit ransomware
were created or deleted.
detect:
splunk:
correlation_rule:
notable:
nes_fields: dest, user, process_name
rule_description: This search looks for flags passed to schtasks.exe on the
command-line that indicate that task names specific to Bad Rabbit ransomware
has been created or deleted
rule_title: Scheduled tasks used in BadRabbit ransomware detected on $dest$
risk:
risk_object: dest
risk_object_type:
- system
risk_score: 80
schedule:
cron_schedule: 0 * * * *
earliest_time: -70m@m
latest_time: -10m@m
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as
lastTime values(Processes.process) as process from datamodel=Endpoint.Processes
where Processes.process_name=schtasks.exe (Processes.process= "*create*" OR
Processes.process= "*delete*") by Processes.parent_process Processes.process_name
Processes.user | `drop_dm_object_name("Processes")` | `security_content_ctime(firstTime)`|`security_content_ctime(lastTime)`
| search (process=*rhaegal* OR process=*drogon* OR *viserion_*)'
suppress:
suppress_fields: dest, process_name
suppress_period: 28800s
eli5: The search looks for execution of schtasks.exe with parameters that indicate
that specific task names related to the Bad Rabbit ransomware were created or deleted.
The specific task name used are rhaegal, drogon and viserion_. Schtasks.exe is a
native windows program that is used to schedule tasks on local or remote systems.
Attackers often leverage this capability to schedule the execution of commands or
establish persistence.
entities:
- dest
how_to_implement: You must be ingesting data that records process activity from your
hosts to populate the Endpoint data model in the Processes node. You must also be
ingesting logs with both the process name and command line from your endpoints.
The command-line arguments are mapped to the "process" field in the Endpoint data
model.
id: 1297fb80-f42a-4b4a-9c8b-78c066437cf6
investigations:
- id: bc91a8cf-35e7-4bb2-8140-e756cc06fd76
name: Get Authentication Logs For Endpoint
type: splunk
- id: bc91a8cf-35e7-4bb2-8140-e756cc06fd74
name: Get User Information from Identity Table
type: splunk
- id: fecf2918-670d-4f1c-872b-3d7317a41bf9
name: Get Parent Process Info
type: splunk
- id: fdcfb369-1725-4c24-824a-22972d7f0d55
name: Get Risk Modifiers For User
type: splunk
- id: bc91a8cf-35e7-4bb2-8140-e756cc06fd71
name: Get Process Info
type: splunk
- id: 3d6c3213-5fff-4a1e-b57d-b24c262171e7
name: Get Notable History
type: splunk
- id: fdcfb369-1725-4c24-824a-22972d7f0d65
name: Get Risk Modifiers For Endpoint
type: splunk
- id: bc91a8cf-35e7-4bb2-8140-e756cc06fd22
name: Investigate Web Activity From Host
type: splunk
known_false_positives: No known false positives
maintainers:
- company: Splunk
email: bpatel@splunk.com
name: Bhavin Patel
mappings:
cis20:
- CIS 3
kill_chain_phases:
- Actions on Objectives
mitre_attack:
- Persistence
- Lateral Movement
- Execution
- Scheduled Task
nist:
- PR.IP
modification_date: '2019-02-28'
name: Scheduled tasks used in BadRabbit ransomware
original_authors:
- company: Splunk
email: bpatel@splunk.com
name: Bhavin Patel
references: []
security_domain: endpoint
spec_version: 2
type: splunk
version: '2.0'