|
6753 | 6753 | <Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=CIA Vault7: https://wikileaks.org/ciav7p1/cms/page_16384212.html" groupRelation="and">
|
6754 | 6754 | <TargetFilename condition="contains">.mht</TargetFilename>
|
6755 | 6755 | </Rule>
|
6756 |
| - <Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=Chrome Extensions" groupRelation="and"> |
| 6756 | + <Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=File: File Creation,Level=0,Desc=Chrome Extensions" groupRelation="and"> |
6757 | 6757 | <TargetFilename condition="contains">\Chrome\User Data\Default\Extensions\</TargetFilename>
|
6758 | 6758 | </Rule>
|
6759 |
| - <Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=Chrome extension" groupRelation="and"> |
| 6759 | + <Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=File: File Creation,Level=0,Desc=Chrome extension auditing" groupRelation="and"> |
6760 | 6760 | <TargetFilename condition="end with">.crx</TargetFilename>
|
6761 | 6761 | </Rule>
|
6762 | 6762 | <Rule name="Attack=None,Technique=None,Tactic=None,DS=File: File Creation,Level=0,Desc=ClickOnce extension" groupRelation="and">
|
|
7123 | 7123 | <!--MITRE ATT&CK TECHNIQUE: Windows Management Instrumentation-->
|
7124 | 7124 |
|
7125 | 7125 | <!--MITRE ATT&CK TACTIC: Persistence-->
|
7126 |
| - <Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Chrome Extension auditing" groupRelation="and"> |
| 7126 | + <Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Old Chrome Extension auditing" groupRelation="and"> |
7127 | 7127 | <TargetObject condition="contains">Google\Chrome\Extensions</TargetObject>
|
7128 | 7128 | <TargetObject condition="end with">update_url</TargetObject>
|
7129 | 7129 | <EventType condition="is">SetValue</EventType>
|
7130 | 7130 | </Rule>
|
| 7131 | + <Rule name="Attack=T1176,Technique=Browser Extensions,Tactic=Persistence,DS=Windows Registry: Windows Registry Key Modification,Level=0,Forensic=Chrome Extension auditing" groupRelation="and"> |
| 7132 | + <TargetObject condition="contains">Google\Chrome</TargetObject> |
| 7133 | + <TargetObject condition="contains">extensions.settings</TargetObject> |
| 7134 | + <EventType condition="is">SetValue</EventType> |
| 7135 | + </Rule> |
7131 | 7136 | <!--MITRE ATT&CK TECHNIQUE: Account Manipulation-->
|
7132 | 7137 | <Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=Forced password reset detected" groupRelation="and">
|
7133 | 7138 | <TargetObject condition="contains">ForcePasswordReset</TargetObject>
|
|
8111 | 8116 | <Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=AutoStart on Disconnect" groupRelation="and">
|
8112 | 8117 | <TargetObject condition="contains">Windows CE Services\AutoStartOnDisconnect</TargetObject>
|
8113 | 8118 | </Rule>
|
8114 |
| - <!-- <TargetObject name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=Chrome Extensions" condition="contains">PreferenceMACs\Default\extensions.settings</TargetObject> Nosiy and doesn't seem to provide helpful information. --> |
8115 | 8119 | <Rule name="Attack=None,Technique=None,Tactic=None,DS=Windows Registry: Windows Registry Key Modification,Level=0,Desc=CurrentVersion URL Key" groupRelation="and">
|
8116 | 8120 | <TargetObject condition="contains">CurrentVersion\URL</TargetObject>
|
8117 | 8121 | </Rule>
|
|
0 commit comments