Skip to content

Commit 6a0ac56

Browse files
authored
Create defense_evasion_reg_disable_enableglobalqueryblocklist.toml (#3734)
1 parent 51b9717 commit 6a0ac56

File tree

1 file changed

+79
-0
lines changed

1 file changed

+79
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
[metadata]
2+
creation_date = "2024/05/31"
3+
integration = ["endpoint", "windows"]
4+
maturity = "production"
5+
updated_date = "2024/05/31"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies changes to the DNS Global Query Block List (GQBL), a security feature that prevents the resolution of certain
11+
DNS names often exploited in attacks like WPAD spoofing. Attackers with certain privileges, such as DNSAdmins, can
12+
modify or disable the GQBL, allowing exploitation of hosts running WPAD with default settings for privilege escalation
13+
and lateral movement.
14+
"""
15+
from = "now-9m"
16+
index = ["logs-endpoint.events.registry-*", "logs-windows.sysmon_operational-*"]
17+
language = "eql"
18+
license = "Elastic License v2"
19+
name = "DNS Global Query Block List Modified or Disabled"
20+
references = [
21+
"https://cube0x0.github.io/Pocing-Beyond-DA/",
22+
"https://www.thehacker.recipes/ad/movement/mitm-and-coerced-authentications/wpad-spoofing",
23+
"https://www.netspi.com/blog/technical-blog/network-penetration-testing/adidns-revisited/"
24+
]
25+
risk_score = 47
26+
rule_id = "57bfa0a9-37c0-44d6-b724-54bf16787492"
27+
severity = "medium"
28+
tags = [
29+
"Domain: Endpoint",
30+
"OS: Windows",
31+
"Use Case: Threat Detection",
32+
"Tactic: Defense Evasion",
33+
"Data Source: Elastic Defend",
34+
"Data Source: Sysmon"
35+
]
36+
timestamp_override = "event.ingested"
37+
type = "eql"
38+
39+
query = '''
40+
registry where host.os.type == "windows" and event.type : "change" and
41+
(
42+
(registry.value : "EnableGlobalQueryBlockList" and registry.data.strings : ("0", "0x00000000")) or
43+
(registry.value : "GlobalQueryBlockList" and not registry.data.strings : "wpad")
44+
)
45+
'''
46+
47+
48+
[[rule.threat]]
49+
framework = "MITRE ATT&CK"
50+
[[rule.threat.technique]]
51+
id = "T1562"
52+
name = "Impair Defenses"
53+
reference = "https://attack.mitre.org/techniques/T1562/"
54+
[[rule.threat.technique.subtechnique]]
55+
id = "T1562.001"
56+
name = "Disable or Modify Tools"
57+
reference = "https://attack.mitre.org/techniques/T1562/001/"
58+
59+
60+
61+
[rule.threat.tactic]
62+
id = "TA0005"
63+
name = "Defense Evasion"
64+
reference = "https://attack.mitre.org/tactics/TA0005/"
65+
66+
67+
[[rule.threat]]
68+
framework = "MITRE ATT&CK"
69+
[[rule.threat.technique]]
70+
id = "T1557"
71+
name = "Adversary-in-the-Middle"
72+
reference = "https://attack.mitre.org/techniques/T1557/"
73+
74+
75+
[rule.threat.tactic]
76+
id = "TA0006"
77+
name = "Credential Access"
78+
reference = "https://attack.mitre.org/tactics/TA0006/"
79+

0 commit comments

Comments
 (0)