Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The Haag Element: Breaking Down AA24-241A #3115

Merged
merged 6 commits into from
Sep 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ tags:
- Azorult
- CISA AA22-257A
- DarkGate Malware
- CISA AA24-241A
asset_type: Endpoint
confidence: 60
impact: 50
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/detect_new_local_admin_account.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ tags:
- DHS Report TA18-074A
- HAFNIUM Group
- CISA AA22-257A
- CISA AA24-241A
asset_type: Windows
confidence: 70
impact: 60
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ tags:
- Command And Control
- Ransomware
- Gozi Malware
- CISA AA24-241A
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ tags:
- Command And Control
- Ransomware
- Gozi Malware
- CISA AA24-241A
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ tags:
analytic_story:
- IcedID
- Windows Registry Abuse
- CISA AA24-241A
asset_type: Endpoint
confidence: 70
impact: 70
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/powershell_4104_hunting.yml
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,7 @@ tags:
- Flax Typhoon
- CISA AA23-347A
- Data Destruction
- CISA AA24-241A
asset_type: Endpoint
confidence: 100
impact: 80
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ tags:
analytic_story:
- Ransomware
- Revil Ransomware
- CISA AA24-241A
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,7 @@ tags:
- Phemedrone Stealer
- ShrinkLocker
- MoonPeak
- CISA AA24-241A
asset_type: Endpoint
confidence: 80
impact: 70
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,7 @@ tags:
- DarkCrystal RAT
- CISA AA23-347A
- MoonPeak
- CISA AA24-241A
asset_type: Endpoint
confidence: 50
impact: 70
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/windows_abused_web_services.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ references:
tags:
analytic_story:
- NjRAT
- CISA AA24-241A
asset_type: Endpoint
confidence: 60
impact: 60
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/windows_create_local_account.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ references:
tags:
analytic_story:
- Active Directory Password Spraying
- CISA AA24-241A
asset_type: Endpoint
confidence: 90
impact: 20
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
name: Windows DISM Install PowerShell Web Access
id: fa6142a7-c364-4d11-9954-895dd9efb2d4
version: 1
date: '2024-09-03'
author: Michael Haag, Splunk
data_sources:
- Windows Event Log Security 4688
- Sysmon EventID 1
type: TTP
status: production
description: The following analytic detects the installation of PowerShell Web Access using the Deployment Image Servicing and Management (DISM) tool. It leverages Sysmon Event ID 1 to identify the execution of `dism.exe` with specific parameters related to enabling the WindowsPowerShellWebAccess feature. This activity is significant because enabling PowerShell Web Access can facilitate remote execution of PowerShell commands, potentially allowing an attacker to gain unauthorized access to systems and networks. If confirmed malicious, this action could lead to further exploitation and compromise of the affected system.
search: ' | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime
from datamodel=Endpoint.Processes
where Processes.process_name=dism.exe
(Processes.process="*WindowsPowerShellWebAccess*" AND Processes.process="*/online*" AND Processes.process="*/enable-feature*")
by Processes.dest Processes.user Processes.parent_process_name Processes.process_name
Processes.original_file_name Processes.process Processes.process_id Processes.parent_process_id
| `drop_dm_object_name(Processes)`
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_dism_install_powershell_web_access_filter`'
how_to_implement: The detection is based on data that originates from Endpoint Detection
and Response (EDR) agents. These agents are designed to provide security-related
telemetry from the endpoints where the agent is installed. To implement this search,
you must ingest logs that contain the process GUID, process name, and parent process.
Additionally, you must ingest complete command-line executions. These logs must
be processed using the appropriate Splunk Technology Add-ons that are specific to
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
data model. Use the Splunk Common Information Model (CIM) to normalize the field
names and speed up the data modeling process.
known_false_positives: Administrators using the DISM tool to update and install Windows features may cause false positives that can be filtered with `windows_dism_install_powershell_web_access_filter`.
references:
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
- https://gist.github.com/MHaggis/7e67b659af9148fa593cf2402edebb41
tags:
analytic_story:
- CISA AA24-241A
asset_type: Endpoint
confidence: 80
impact: 90
message: PowerShell Web Access has been installed on $dest$.
mitre_attack_id:
- T1548.002
observable:
- name: dest
type: Endpoint
role:
- Victim
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
required_fields:
- _time
- dest
- user
- parent_process_name
- process_name
- original_file_name
- process
- process_id
- parent_process_id
risk_score: 72
security_domain: endpoint
cve: []
tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.002/atomic_red_team/dism_pswa_4688_windows-security.log
sourcetype: XmlWinEventLog
source: XmlWinEventLog:Security
57 changes: 57 additions & 0 deletions detections/endpoint/windows_enable_powershell_web_access.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
name: Windows Enable PowerShell Web Access
id: 175bb2de-6227-416b-9678-9b61999cd21f
version: 1
date: '2024-09-03'
author: Michael Haag, Splunk
data_sources:
- Powershell Script Block Logging 4104
type: TTP
status: production
description: The following analytic detects the enabling of PowerShell Web Access via PowerShell commands. It leverages PowerShell script block logging (EventCode 4104) to identify the execution of the `Install-WindowsFeature` cmdlet with the `WindowsPowerShellWebAccess` parameter. This activity is significant because enabling PowerShell Web Access can facilitate remote execution of PowerShell commands, potentially allowing an attacker to gain unauthorized access to systems and networks.
search: '`powershell` EventCode=4104 ScriptBlockText IN ("*Install-WindowsFeature*WindowsPowerShellWebAccess*","*Install-PswaWebApplication*","*Add-PswaAuthorizationRule*UserName *ComputerName *")
| rename Computer as dest
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText dest UserID
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)` | `windows_enable_powershell_web_access_filter`'
how_to_implement: To successfully implement this analytic, you will need to enable
PowerShell Script Block Logging on some or all endpoints. Additional setup here
https://docs.splunk.com/Documentation/UBA/5.0.4.1/GetDataIn/AddPowerShell#Configure_module_logging_for_PowerShell.
known_false_positives: It is possible that legitimate scripts or network administrators
may enable PowerShell Web Access. Monitor and escalate as needed.
references:
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
- https://gist.github.com/MHaggis/7e67b659af9148fa593cf2402edebb41
tags:
analytic_story:
- CISA AA24-241A
- Malicious PowerShell
asset_type: Endpoint
confidence: 80
impact: 90
message: PowerShell Web Access has been enabled on $dest$.
mitre_attack_id:
- T1059.001
observable:
- name: dest
type: Endpoint
role:
- Victim
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
required_fields:
- _time
- EventCode
- ScriptBlockText
- dest
- UserID
risk_score: 72
security_domain: endpoint
cve: []
tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/powershell_script_block_logging/pswa_powershell.log
sourcetype: XmlWinEventLog
source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ references:
tags:
analytic_story:
- ShrinkLocker
- CISA AA24-241A
asset_type: Endpoint
confidence: 80
impact: 80
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ references:
tags:
analytic_story:
- ShrinkLocker
- CISA AA24-241A
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ tags:
analytic_story:
- Reverse Network Proxy
- CISA AA22-320A
- CISA AA24-241A
asset_type: Endpoint
confidence: 100
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@ tags:
- Data Destruction
- Amadey
- Scheduled Tasks
- CISA AA24-241A
- BlackSuit Ransomware
asset_type: Endpoint
confidence: 100
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ references:
tags:
analytic_story:
- Active Directory Lateral Movement
- CISA AA24-241A
asset_type: Endpoint
confidence: 60
impact: 90
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ tags:
- Insider Threat
- Command And Control
- Ransomware
- CISA AA24-241A
asset_type: Endpoint
confidence: 20
impact: 20
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ references:
tags:
analytic_story:
- F5 BIG-IP Vulnerability CVE-2022-1388
- CISA AA24-241A
asset_type: Web Server
confidence: 70
cve:
Expand Down
1 change: 1 addition & 0 deletions detections/network/ngrok_reverse_proxy_on_network.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ tags:
analytic_story:
- Reverse Network Proxy
- CISA AA22-320A
- CISA AA24-241A
asset_type: Endpoint
confidence: 100
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ tags:
- CVE-2024-21887
analytic_story:
- Ivanti Connect Secure VPN Vulnerabilities
- CISA AA24-241A
asset_type: VPN Appliance
atomic_guid: []
confidence: 80
Expand Down
1 change: 1 addition & 0 deletions detections/web/citrix_adc_exploitation_cve_2023_3519.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ references:
tags:
analytic_story:
- Citrix Netscaler ADC CVE-2023-3519
- CISA AA24-241A
cve:
- CVE-2023-3519
asset_type: Network
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ tags:
- Insider Threat
- Command And Control
- Ransomware
- CISA AA24-241A
asset_type: Network
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ tags:
- CVE-2024-21887
analytic_story:
- Ivanti Connect Secure VPN Vulnerabilities
- CISA AA24-241A
asset_type: VPN Appliance
atomic_guid: []
confidence: 90
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ tags:
- CVE-2024-21887
analytic_story:
- Ivanti Connect Secure VPN Vulnerabilities
- CISA AA24-241A
asset_type: VPN Appliance
atomic_guid: []
confidence: 80
Expand Down
25 changes: 25 additions & 0 deletions stories/cisa_aa24_241a.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
name: CISA AA24-241A
id: f075adb6-76a6-4476-b24a-ce9d471a1bdc
version: 1
date: '2024-09-03'
author: Michael Haag, Splunk
description: This story covers the tactics of Iran-based cyber actors exploiting U.S. and foreign organizations across multiple sectors, as detailed in CISA Alert AA24-241A. It focuses on their methods of gaining initial access, establishing persistence, and enabling ransomware attacks through vulnerabilities in public-facing networking devices.
narrative: As of August 2024, Iran-based cyber actors continue to exploit organizations across several U.S. sectors and other countries. The FBI assesses that a significant percentage of these operations aim to obtain network access for collaboration with ransomware affiliates. The actors typically use Shodan to identify vulnerable devices, then exploit public-facing networking equipment such as Citrix Netscaler, F5 BIG-IP, and various VPNs. They deploy webshells, create local accounts, and manipulate existing ones to maintain access. Post-exploitation, they repurpose credentials, disable security software, and use remote access tools. The group collaborates with ransomware affiliates like NoEscape, Ransomhouse, and ALPHV, actively participating in network lockdowns and extortion strategies. Defenders should prioritize patching public-facing devices, monitoring for unauthorized accounts and suspicious PowerShell activity, implementing strong access controls, and regularly reviewing logs for signs of compromise.
references:
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
- https://gist.github.com/MHaggis/7e67b659af9148fa593cf2402edebb41
tags:
category:
- Adversary Tactics
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
usecase: Advanced Threat Detection
cve:
- CVE-2024-24919
- CVE-2024-3400
- CVE-2019-19781
- CVE-2023-3519
- CVE-2022-1388
- CVE-2024-21887