Skip to content

Snap convert 1#4015

Open
RavenTait wants to merge 13 commits intodevelopfrom
snap_convert_1
Open

Snap convert 1#4015
RavenTait wants to merge 13 commits intodevelopfrom
snap_convert_1

Conversation

@RavenTait
Copy link
Copy Markdown
Contributor

First Big chunk of detections from SnapAttack

Contains 109 new detections and some new malicious powershell strings.

@nasbench
Copy link
Copy Markdown
Contributor

image

@patel-bhavin patel-bhavin added this to the v5.27.0 milestone Apr 15, 2026

PowGoop is the primary loader used by MuddyWater (also tracked as SeedWorm, Static Kitten, and MERCURY) and has been their main initial access loader since at least 2020. It abuses DLL side-loading against a fake GoogleUpdate.exe to execute a multi-stage decoding chain, a fully functional PowerShell backdoor disguised with a benign extension. The config.txt contains a hardcoded C2 address and victim GUID, beacons via modified base64-encoded HTTP, and runs C2 traffic under the legitimate Google Update process to evade network detection.

'
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we update the script to remove this extra line from the description?

'
data_source:
- Sysmon EventID 11
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*cred64.dll", "*clip64.dll") by Filesystem.dest Filesystem.file_create_time Filesystem.process_path Filesystem.process_guid Filesystem.process_id Filesystem.file_path Filesystem.file_name Filesystem.action Filesystem.vendor_product Filesystem.user| `drop_dm_object_name(Filesystem)` | `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)`| `windows_amadey_file_indicators_filter`'
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we instead target the file_name IN ("cred64.dll", "clip64.dll") . that said, I am not sure if we want to ship detections that look for specific file based indicators.

@nasbench - any thoughts?

threat_objects: []
tags:
analytic_story:
- Compromised Windows Host
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

better served with Amadey analytic story

search: '%original_detection_search% | search user = "$user$" dest = "$dest$"'
- earliest_offset: $info_min_time$
latest_offset: $info_max_time$
name: View risk events for the last 7 days for - "$user$" and "$dest$"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lets update all the drilldowns in this PR to use the latest configs :

- name: View risk events for the last 7 days for - "$dest$"

name: starthoursago=168
search: <remove 
earliest_offset: 7d
latest_offset: "0"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants