Skip to content

Commit

Permalink
Added detection for CVE-2017-0199 and CVE-2017-8759.
Browse files Browse the repository at this point in the history
  • Loading branch information
d4rk-d4nph3 committed May 21, 2020
1 parent 046c4a0 commit 857d65f
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions sysmonconfig-export.xml
Original file line number Diff line number Diff line change
Expand Up @@ -311,6 +311,9 @@
<Image condition="image">tasklist.exe</Image> <!--Windows: List processes, has remote ability -->
<Image condition="image">wmic.exe</Image> <!--WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
<Image condition="image">wscript.exe</Image> <!--WindowsScriptingHost: | Credit @arekfurt -->

<Image condition="image">WINWORD.exe</Image> <!-- CVE-2017-0199, CVE-2017-8759 OLE2 embedded link in Office initiating a HTTP request to a remote server to retrieve payload [https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html] [https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html]-->
<Image condition="image">EXCEL.exe</Image> <!-- [https://www.logpoint.com/en/blog/using-logpoint-to-mitigate-cisa-routinely-exploited-vulnerabilities-2016-2020/]-->>
<!--Relevant 3rd Party Tools-->
<Image condition="image">nc.exe</Image> <!-- Nmap's modern version of netcat [ https://nmap.org/ncat/guide/index.html#ncat-overview ] [ https://securityblog.gr/1517/create-backdoor-in-windows-with-ncat/ ] -->
<Image condition="image">ncat.exe</Image> <!-- Nmap's modern version of netcat [ https://nmap.org/ncat/guide/index.html#ncat-overview ] [ https://securityblog.gr/1517/create-backdoor-in-windows-with-ncat/ ] -->
Expand Down

1 comment on commit 857d65f

@jokezone
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I often see Office applications phoning home to Microsoft, which means these could become noisy without more filtering. You could either whitelist the Microsoft IP range here in the Sysmon config, or in your SIEM alerting. Just something to be aware of.

Please sign in to comment.