Skip to content

Commit 2fd6612

Browse files
authored
chore: promote older rules status from experimental to test
1 parent eeca352 commit 2fd6612

13 files changed

Lines changed: 13 additions & 13 deletions

rules-threat-hunting/windows/builtin/security/win_security_file_access_browser_credential.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 4b60e527-ec73-4b47-8cb3-f02ad927ca65
33
related:
44
- id: 91cb43db-302a-47e3-b3c8-7ede481e27bf
55
type: similar
6-
status: experimental
6+
status: test
77
description: |
88
Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing This rule requires heavy baselining before usage.
99
references:

rules-threat-hunting/windows/registry/registry_set/registry_set_runmru_command_execution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: f9d091f6-f1c7-4873-a24f-050b4a02b4dd
33
related:
44
- id: a7df0e9e-91a5-459a-a003-4cde67c2ff5d
55
type: derived
6-
status: experimental
6+
status: test
77
description: |
88
Detects execution of commands via the run dialog box on Windows by checking values of the "RunMRU" registry key.
99
This technique was seen being abused by threat actors to deceive users into pasting and executing malicious commands, often disguised as CAPTCHA verification steps.

rules/windows/builtin/bits_client/win_bits_client_new_transfer_via_file_sharing_domains.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: BITS Transfer Job Download From File Sharing Domains
22
id: d635249d-86b5-4dad-a8c7-d7272b788586
3-
status: experimental
3+
status: test
44
description: Detects BITS transfer job downloading files from a file sharing domain.
55
references:
66
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md

rules/windows/builtin/iis-configuration/win_iis_logging_etw_disabled.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: ETW Logging/Processing Option Disabled On IIS Server
22
id: a5b40a90-baf5-4bf7-a6f7-373494881d22
3-
status: experimental
3+
status: test
44
description: Detects changes to of the IIS server configuration in order to disable/remove the ETW logging/processing option.
55
references:
66
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis

rules/windows/builtin/iis-configuration/win_iis_logging_http_disabled.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: HTTP Logging Disabled On IIS Server
22
id: e8ebd53a-30c2-45bd-81bb-74befba07bdb
3-
status: experimental
3+
status: test
44
description: Detects changes to of the IIS server configuration in order to disable HTTP logging for successful requests.
55
references:
66
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis

rules/windows/builtin/iis-configuration/win_iis_module_added.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: New Module Module Added To IIS Server
22
id: dd857d3e-0c6e-457b-9b48-e82ae7f86bd7
3-
status: experimental
3+
status: test
44
description: Detects the addition of a new module to an IIS server.
55
references:
66
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis

rules/windows/builtin/iis-configuration/win_iis_module_removed.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Previously Installed IIS Module Was Removed
22
id: 9e1a1fdf-ee58-40ce-8e15-b66ca5a80e1f
3-
status: experimental
3+
status: test
44
description: Detects the removal of a previously installed IIS module.
55
references:
66
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis

rules/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_susp_extension.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 52182dfb-afb7-41db-b4bc-5336cb29b464
33
related:
44
- id: ae02ed70-11aa-4a22-b397-c0d0e8f6ea99
55
type: similar
6-
status: experimental
6+
status: test
77
description: Detects the download of suspicious file type from a well-known file and paste sharing domain
88
references:
99
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015

rules/windows/create_stream_hash/create_stream_hash_file_sharing_domains_download_unusual_extension.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: ae02ed70-11aa-4a22-b397-c0d0e8f6ea99
33
related:
44
- id: 52182dfb-afb7-41db-b4bc-5336cb29b464
55
type: similar
6-
status: experimental
6+
status: test
77
description: Detects the download of suspicious file type from a well-known file and paste sharing domain
88
references:
99
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90015

rules/windows/image_load/image_load_side_load_python.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential Python DLL SideLoading
22
id: d36f7c12-14a3-4d48-b6b8-774b9c66f44d
3-
status: experimental
3+
status: test
44
description: Detects potential DLL sideloading of Python DLL files.
55
references:
66
- https://www.securonix.com/blog/seolurker-attack-campaign-uses-seo-poisoning-fake-google-ads-to-install-malware/

0 commit comments

Comments
 (0)