Skip to content

Commit ccabe7b

Browse files
Samirbousgithub-actions[bot]
authored andcommitted
[Tuning] Suspicious File Downloaded from Google Drive (#3411)
* Update command_and_control_google_drive_malicious_file_download.toml * Update command_and_control_google_drive_malicious_file_download.toml * Update command_and_control_google_drive_malicious_file_download.toml (cherry picked from commit 4c74588)
1 parent 17eac60 commit ccabe7b

File tree

1 file changed

+18
-57
lines changed

1 file changed

+18
-57
lines changed

rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml

+18-57
Original file line numberDiff line numberDiff line change
@@ -1,86 +1,47 @@
11
[metadata]
22
creation_date = "2023/06/19"
3-
integration = ["endpoint"]
3+
integration = ["endpoint", "system"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2023/10/16"
7+
updated_date = "2024/01/30"
88

99
[rule]
1010
author = ["Elastic"]
1111
description = """
12-
Identifies potential malicious file download and execution from Google Drive. The rule checks for download activity from
13-
Google Drive URL, followed by the creation of files commonly leveraged by or for malware. This could indicate an attempt
14-
to run malicious scripts, executables or payloads.
12+
Identifies suspicious file download activity from a Google Drive URL. This could indicate an attempt
13+
to deliver phishing payloads via a trusted webservice.
1514
"""
1615
false_positives = [
1716
"Approved third-party applications that use Google Drive download URLs.",
1817
"Legitimate publicly shared files from Google Drive.",
1918
]
2019
from = "now-9m"
21-
index = ["auditbeat-*", "logs-endpoint*"]
20+
index = ["auditbeat-*", "logs-endpoint*", "logs-system.security*"]
2221
language = "eql"
2322
license = "Elastic License v2"
24-
name = "Potential Malicious File Downloaded from Google Drive"
23+
name = "Suspicious File Downloaded from Google Drive"
2524
references = ["https://intelligence.abnormalsecurity.com/blog/google-drive-matanbuchus-malware"]
26-
risk_score = 73
25+
risk_score = 47
2726
rule_id = "a8afdce2-0ec1-11ee-b843-f661ea17fbcd"
28-
severity = "high"
27+
severity = "medium"
2928
tags = ["Domain: Endpoint", "OS: Linux", "OS: Windows", "OS: macOS", "Use Case: Threat Detection", "Tactic: Command and Control"]
29+
timestamp_override = "event.ingested"
3030
type = "eql"
3131

3232
query = '''
33-
sequence by host.id, process.entity_id with maxspan=30s
34-
[any where
33+
process where
3534
36-
/* Look for processes started or libraries loaded from untrusted or unsigned Windows, Linux or macOS binaries */
37-
(event.action in ("exec", "fork", "start", "load")) or
35+
/* common browser processes */
36+
event.action in ("exec", "fork", "start") and
3837
39-
/* Look for Google Drive download URL with AV flag skipping */
40-
(process.args : "*drive.google.com*" and process.args : "*export=download*" and process.args : "*confirm=no_antivirus*")
41-
42-
/* ignore trusted processes */
43-
and not (
44-
process.code_signature.trusted == true and
45-
process.code_signature.subject_name:
46-
("Mozilla Corporation",
47-
"Google LLC",
48-
"Google Inc",
49-
"Bitdefender SRL",
50-
"Microsoft Corporation",
51-
"Netskope, Inc.",
52-
"Avast Software s.r.o.",
53-
"Microsoft Windows",
54-
"AVG Technologies USA, LLC",
55-
"Symantec Corporation",
56-
"Trend Micro, Inc.",
57-
"Palo Alto Networks (Netherlands) B.V.",
58-
"Docker Inc"))
59-
60-
/* ignore common benign processes */
61-
and not process.executable:
62-
("/bin/terraform",
63-
"*/bin/dockerd",
64-
"/usr/local/bin/docker-init",
65-
"*/bin/go",
66-
"?:\\Program Files*\\Mozilla Firefox\firefox.exe",
67-
"?:\\Program Files*\\Google\\Chrome\\Application\\chrome.exe")
68-
69-
/* ignore shellscripts + go install from legitimate repository*/
70-
and not (process.executable == "/bin/sh" and process.args : "go install google.golang.org*")]
38+
process.name : ("Microsoft Edge", "chrome.exe", "Google Chrome", "google-chrome-stable",
39+
"google-chrome-beta", "google-chrome", "msedge.exe", "firefox.exe", "brave.exe",
40+
"whale.exe", "browser.exe", "dragon.exe", "vivaldi.exe", "opera.exe", "firefox",
41+
"powershell.exe", "curl", "curl.exe", "wget", "wget.exe") and
7142
72-
[network where
73-
/* Look for DNS requests for Google Drive */
74-
(dns.question.name : "drive.google.com" and dns.question.type : "A") or
75-
76-
/* Look for connection attempts to address that resolves to Google */
77-
(destination.as.organization.name : "GOOGLE" and event.action == "connection_attempted")]
78-
79-
/* Identify the creation of files following Google Drive connection with extensions commonly used for executables or libraries */
80-
[file where event.action == "creation" and
81-
file.extension :
82-
("exe", "dll", "scr", "jar", "pif", "app", "dmg",
83-
"pkg", "elf", "so", "bin", "deb", "rpm","sh","hta","lnk")]
43+
/* Look for Google Drive download URL with AV flag skipping */
44+
(process.command_line : "*drive.google.com*" and process.command_line : "*export=download*" and process.command_line : "*confirm=no_antivirus*")
8445
'''
8546

8647

0 commit comments

Comments
 (0)