Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detect Execution of BCP Utility #4968

Closed
wants to merge 5 commits into from

Conversation

Mahir-Ali-khan
Copy link
Contributor

@Mahir-Ali-khan Mahir-Ali-khan commented Aug 13, 2024

Summary of the Pull Request

Detects the execution of the bcp utility with 'queryout' or 'out' options in Windows Security Event Log (Event ID 4688). This rule is useful for identifying potential misuse of data copy between an SQL instance to a file

Changelog

Example Log Event

“C:\Windows\system32\cmd.exe” /c bcp “select binaryTable from uGnzBdZbsi” queryout “C:\users\public\music\build.txt” -T -f “C:\users\public\music\FODsOZKgAU.txt”

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

Detects the execution of the bcp utility with 'queryout' or 'out' options in Windows Security Event Log (Event ID 4688). This rule is useful for identifying potential misuse of data copy between an SQL instance to a file
@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Aug 13, 2024
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @Mahir-Ali-khan 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

@nasbench nasbench self-assigned this Aug 13, 2024
@nasbench nasbench added the Work In Progress Some changes are needed label Aug 13, 2024
@nasbench nasbench self-requested a review August 13, 2024 08:07
Detects the use of the SET command with the /p flag combined with the >> redirection operator, which can indicate an attempt to create or modify files maliciously.
@nasbench
Copy link
Member

nasbench commented Aug 20, 2024

There is already a PR (See #4948) that tries to cover the tool in a very similar way. Closing this as duplicate, since that PR came first. I'll merge the ideas shared here with that one too. (credit too)

Thanks for the contribution.

@nasbench nasbench closed this Aug 20, 2024
@nasbench nasbench removed the Work In Progress Some changes are needed label Aug 20, 2024
@nasbench nasbench removed their request for review August 20, 2024 09:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants