Skip to content

Commit 8c91bdd

Browse files
committed
solarwinds_expl
1 parent 31b8406 commit 8c91bdd

27 files changed

+28
-85
lines changed

detections/endpoint/disable_defender_antivirus_registry.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61-
- SolarWinds WHD RCE Exploitation
61+
- SolarWinds WHD RCE Post Exploitation
6262
- Windows Registry Abuse
6363
- CISA AA24-241A
6464
- IcedID

detections/endpoint/disable_defender_blockatfirstseen_feature.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ rba:
5656
threat_objects: []
5757
tags:
5858
analytic_story:
59-
- SolarWinds WHD RCE Exploitation
59+
- SolarWinds WHD RCE Post Exploitation
6060
- Azorult
6161
- CISA AA23-347A
6262
- IcedID

detections/endpoint/disable_windows_behavior_monitoring.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ rba:
5959
threat_objects: []
6060
tags:
6161
analytic_story:
62-
- SolarWinds WHD RCE Exploitation
62+
- SolarWinds WHD RCE Post Exploitation
6363
- Windows Defense Evasion Tactics
6464
- CISA AA23-347A
6565
- Revil Ransomware

detections/endpoint/malicious_powershell_process___encoded_command.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ references:
4848
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
4949
tags:
5050
analytic_story:
51-
- SolarWinds WHD RCE Exploitation
51+
- SolarWinds WHD RCE Post Exploitation
5252
- CISA AA22-320A
5353
- Hermetic Wiper
5454
- Sandworm Tools

detections/endpoint/scheduled_task_deleted_or_created_via_cmd.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ rba:
7474
threat_objects: []
7575
tags:
7676
analytic_story:
77-
- SolarWinds WHD RCE Exploitation
77+
- SolarWinds WHD RCE Post Exploitation
7878
- ShrinkLocker
7979
- AgentTesla
8080
- CISA AA24-241A

detections/endpoint/set_default_powershell_execution_policy_to_unrestricted_or_bypass.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ rba:
6262
type: registry_path
6363
tags:
6464
analytic_story:
65-
- SolarWinds WHD RCE Exploitation
65+
- SolarWinds WHD RCE Post Exploitation
6666
- HAFNIUM Group
6767
- Hermetic Wiper
6868
- Credential Dumping

detections/endpoint/suspicious_scheduled_task_from_public_directory.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ rba:
7070
threat_objects: []
7171
tags:
7272
analytic_story:
73-
- SolarWinds WHD RCE Exploitation
73+
- SolarWinds WHD RCE Post Exploitation
7474
- XWorm
7575
- Medusa Ransomware
7676
- CISA AA23-347A
@@ -100,9 +100,6 @@ tags:
100100
- Splunk Enterprise Security
101101
- Splunk Cloud
102102
security_domain: endpoint
103-
cve:
104-
- CVE-2025-40551
105-
- CVE-2025-26399
106103
tests:
107104
- name: True Positive Test
108105
attack_data:

detections/endpoint/system_information_discovery_detection.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ rba:
7676
threat_objects: []
7777
tags:
7878
analytic_story:
79-
- SolarWinds WHD RCE Exploitation
79+
- SolarWinds WHD RCE Post Exploitation
8080
- Windows Discovery Techniques
8181
- Gozi Malware
8282
- Medusa Ransomware
@@ -93,9 +93,6 @@ tags:
9393
- Splunk Enterprise Security
9494
- Splunk Cloud
9595
security_domain: endpoint
96-
cve:
97-
- CVE-2025-40551
98-
- CVE-2025-26399
9996
tests:
10097
- name: True Positive Test
10198
attack_data:

detections/endpoint/windows_cmdline_tool_execution_from_non_shell_process.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ tags:
9292
- FIN7
9393
- Water Gamayun
9494
- Tuoni
95-
- SolarWinds WHD RCE Exploitation
95+
- SolarWinds WHD RCE Post Exploitation
9696
asset_type: Endpoint
9797
mitre_attack_id:
9898
- T1059.007
@@ -101,9 +101,6 @@ tags:
101101
- Splunk Enterprise Security
102102
- Splunk Cloud
103103
security_domain: endpoint
104-
cve:
105-
- CVE-2025-40551
106-
- CVE-2025-26399
107104
tests:
108105
- name: True Positive Test
109106
attack_data:

detections/endpoint/windows_disableantispyware_registry.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ rba:
5555
threat_objects: []
5656
tags:
5757
analytic_story:
58-
- SolarWinds WHD RCE Exploitation
58+
- SolarWinds WHD RCE Post Exploitation
5959
- Azorult
6060
- Ryuk Ransomware
6161
- Windows Registry Abuse
@@ -71,9 +71,6 @@ tags:
7171
- Splunk Enterprise Security
7272
- Splunk Cloud
7373
security_domain: endpoint
74-
cve:
75-
- CVE-2025-40551
76-
- CVE-2025-26399
7774
tests:
7875
- name: True Positive Test
7976
attack_data:

0 commit comments

Comments
 (0)