Skip to content

Commit c5413e9

Browse files
authored
updating version and removing detections (#3749)
1 parent 437a5cd commit c5413e9

6 files changed

+6
-6
lines changed

contentctl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.17.0
6+
version: 5.18.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU

detections/deprecated/detect_rundll32_application_control_bypass___advpack.yml renamed to removed/detections/detect_rundll32_application_control_bypass___advpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 4aefadfe-9abd-4bf8-b3fd-867e9ef95bf8
33
version: 12
44
date: '2025-10-06'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects the execution of rundll32.exe loading
99
advpack.dll or ieadvpack.dll via the LaunchINFSection function. This method is identified

detections/deprecated/detect_rundll32_application_control_bypass___setupapi.yml renamed to removed/detections/detect_rundll32_application_control_bypass___setupapi.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 61e7b44a-6088-4f26-b788-9a96ba13b37a
33
version: 12
44
date: '2025-10-06'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects the execution of rundll32.exe loading
99
setupapi.dll and iesetupapi.dll via the LaunchINFSection function. This behavior

detections/deprecated/detect_rundll32_application_control_bypass___syssetup.yml renamed to removed/detections/detect_rundll32_application_control_bypass___syssetup.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 71b9bf37-cde1-45fb-b899-1b0aa6fa1183
33
version: 12
44
date: '2025-10-06'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects the execution of rundll32.exe loading
99
syssetup.dll via the LaunchINFSection function. This method is identified through

detections/deprecated/windows_change_default_file_association_for_no_file_ext.yml renamed to removed/detections/windows_change_default_file_association_for_no_file_ext.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: dbdf52ad-d6a1-4b68-975f-0a10939d8e38
33
version: 9
44
date: '2025-10-06'
55
author: Teoderick Contreras, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects attempts to change the default file association
99
for files without an extension to open with Notepad.exe. It leverages data from

detections/deprecated/windows_set_private_network_profile_via_registry.yml renamed to removed/detections/windows_set_private_network_profile_via_registry.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: a277acde-9bfd-4edb-b201-7cfc504003e2
33
version: 2
44
date: '2025-10-07'
55
author: Teoderick Contreras, Splunk
6-
status: deprecated
6+
status: removed
77
type: Anomaly
88
description: The following analytic detects attempts to modify the Windows Registry to change a network profile's category to "Private", which may indicate an adversary is preparing the environment for lateral movement or reducing firewall restrictions. Specifically, this activity involves changes to the Category value within the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\{GUID} registry path. A value of 1 corresponds to a private network profile, which typically enables less restrictive firewall policies. While this action can occur during legitimate network configuration, it may also be a sign of malicious behavior when combined with other indicators such as suspicious account activity, unexpected administrative privilege usage, or execution of unsigned binaries. Monitoring for this registry modification—especially outside standard IT processes or correlated with persistence mechanisms—can help identify stealthy post-exploitation activity.
99
data_source:

0 commit comments

Comments
 (0)