It's Day 11 of #100DaysofLC. Today, we're talking about reported CVE-2023-22527 post-exploitation activity. With D&R rules, let's hunt the post-exploit cURL activity, as the folks at @TheDFIRReport reported.

This LimaCharlie detection rule looks for suspicious cURL calls to .me & .fun domains. This is likely already a great network artifact but can be found via EDR via process execution and command-line parameters. #limacharlie #dfir #DetectionEngineering #ThreatHunting

On day 6 of #100DaysofLC, we're hunting for .xyz TLD DNS requests. LimaCharlie detection & response rules can easily monitor DNS requests & hunt for malware, phishing, & spam. Share your #detectionengineering rules; how else would you approach finding this from an EDR perspective? #ThreatHunting #limacharlie #detectionengineering #dfir
It's Day 5 of #100DaysofLC, and the final day we focus on RDP detection skills. Today's detection looks for connectivity to port 3389 from an external IP address. Craft LimaCharlie rules, build defenses, and stay vigilant! #ThreatHunting #detectionengineering #dfir #limacharlie
Day 4 of #100DaysofLC, and we're still looking at RDP activity. LimaCharlie makes it super easy to stream Windows Event Logs. Look for Event ID 4624 (Type 10) - those are your RDP logins. Share your LimaCharlie rules & detection strategies. Let's build strong defenses together! #ThreatHunting #DetectionEngineering #DFIR #LC
Deep dive into RDP activity on Day 3 of #100DaysofLC! ️‍Unmask potential RDP activity (T1021.001) when "svchost.exe -k termsvcs" spawns rdpclip.exe. Let's craft LC rules, share detection strategies, and build stronger defenses! #ThreatHunting #detectionengineering #dfir #limacharlie
Day 2 of #100DaysofLC tackles lurking threats in C:\Users\Public. This shared directory is a favorite for malware to hide and execute. Today's focus: crafting an EDR rule to monitor process execution originating from this directory. #ThreatHunting #limacharlie #detectionengineering #dfir

It's Day 1 of the new #100DaysofLC. We'll start simple, detecting the use of bitsadmin.exe (MITRE Technique T1197). Within @limacharlieio, I'm pivoting against a NEW_PROCESS event, looking for "bitsadmin" in the command line. Start simple, and work in increments. Looking for a more detailed explanation, or "What is this thing?" Link to it - add value easily.

#limacharlie #100daysoflc #detectionengineering #dfir

It's Day 11 of #100DaysofLC, and today's detection draws from some threat intelligence from Proofpoint, found here: https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week They report on a multi-step attack from TA422; I focused on the LNK and DOCX files created on disk. We can utilize LimaCharlie's NEW_DOCUMENT to monitor these files and pivot on a common keyword.

I used the keyword "SEDE-PV-2023". This might be legitimate, but the extensions should help with the rule fidelity.

#limacharlie #detectionengineering #dfir

TA422’s Dedicated Exploitation Loop—the Same Week After Week  | Proofpoint US

Key takeaways  Since March 2023, Proofpoint researchers have observed regular TA422 (APT28) phishing activity, in which the threat actor leveraged patched vulnerabilities to send, at times, high-vo...

Proofpoint

Today is Day 10 of #100DaysofLC! Today's detection rule looks for suspicious mshta.exe usage, mainly focused on whether mshta was executed by an Administrator OR with an HTTP in the command line. This rule also shows nesting operators to build complex rules, allowing for more granularity.

More information on this LOLBAS technique is here: https://lolbas-project.github.io/lolbas/Binaries/Mshta/

#limacharlie #detectionengineering #dfir

Mshta | LOLBAS

It's Day 9 of #100DaysofLC, and today's detection will pinpoint a driver installation event. Known as a DRIVER_CHANGE in LimaCharlie, this event can be very useful in detecting all sorts of suspicious activity. This event is not as suspicious - I'm just installing Sysmon. However, I configured the D&R rule to look for a mismatch, potentially yielding a find. We could also add more to the reporting section to help analysts understand the alert. #limacharlie #detectionengineering #dfir