Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

1549 add power shell classic eid400 to extract-base64 #1550

Merged
merged 3 commits into from
Jan 21, 2025

Conversation

fukusuket
Copy link
Collaborator

@fukusuket fukusuket commented Jan 20, 2025

What Changed

Evidence

Integration-Test

https://github.com/Yamato-Security/hayabusa/actions/runs/12867115258

I would appreciate it if you could check it out when you have time🙏

@fukusuket fukusuket added the enhancement New feature or request label Jan 20, 2025
@fukusuket fukusuket added this to the 3.1 (2025/2/22 Ninja Day) milestone Jan 20, 2025
@fukusuket fukusuket self-assigned this Jan 20, 2025
@fukusuket
Copy link
Collaborator Author

fukusuket commented Jan 20, 2025

I tested following case.
Yamato-Security/hayabusa-rules#512 (comment)

PS C:\tmp\hayabusa-3.0.1-win-x64> powershell.exe -e JgAgACgAZwBjAG0AIAAoACcAaQBlAHsAMAB9ACcAIAAtAGYAIAAnAHgAJwApACkAIAAoACIAVwByACIAKwAiAGkAdAAiACsAIgBlAC0ASAAiACsAIgBvAHMAdAAgACcASAAiACsAIgBlAGwAIgArACIAbABvACwAIABmAHIAIgArACIAbwBtACAAUAAiACsAIgBvAHcAIgArACIAZQByAFMAIgArACIAaAAiACsAIgBlAGwAbAAhACcAIgApAA==

PS C:\tmp\hayabusa-3.0.1-win-x64> .\hayabusa.exe extract-base64 --time-offset 1h -l -q
Start time: 2025/01/20 20:32
Total event log files: 369
Total file size: 107.2 MB

Loading detection rules. Please wait.

[00:00:01] 369 / 369   [========================================] 100%

Scanning finished.
                                                                                                                                                                                             ╭────────────────────────────────┬──────────┬───────────────────────────────────────────────────────────────────────┬───────────────────────────────────────────────────────────────────────╮
│            Timestamp           ┆ Computer ┆                             Base64 String                             ┆                             Decoded String                            │
╞════════════════════════════════╪══════════╪═══════════════════════════════════════════════════════════════════════╪═══════════════════════════════════════════════════════════════════════╡
│ 2025-01-20 20:20:04.244 +09:00 ┆ mouse    ┆ JgAgACgAZwBjAG0AIAAoACcAaQBlAHsAMAB9ACcAIAAtAGYAIAAnAHgAJwApACkAIAAoA ┆ & (gcm ('ie{0}' -f 'x')) ("Wr"+"it"+"e-H"+"ost 'H"+"el"+"lo, fr"+"om  │
│                                ┆          ┆ CIAVwByACIAKwAiAGkAdAAiACsAIgBlAC0ASAAiACsAIgBvAHMAdAAgACcASAAiACsAIg ┆ P"+"ow"+"erS"+"h"+"ell!'")                                            │
│                                ┆          ┆ BlAGwAIgArACIAbABvACwAIABmAHIAIgArACIAbwBtACAAUAAiACsAIgBvAHcAIgArACI ┆                                                                       │
│                                ┆          ┆ AZQByAFMAIgArACIAaAAiACsAIgBlAGwAbAAhACcAIgApAA                       ┆                                                                       │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┼╌╌╌╌╌╌╌╌╌╌┼╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┼╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ 2025-01-20 20:22:34.515 +09:00 ┆ mouse    ┆ JgAgACgAZwBjAG0AIAAoACcAaQBlAHsAMAB9ACcAIAAtAGYAIAAnAHgAJwApACkAIAAoA ┆ & (gcm ('ie{0}' -f 'x')) ("Wr"+"it"+"e-H"+"ost 'H"+"el"+"lo, fr"+"om  │
│                                ┆          ┆ CIAVwByACIAKwAiAGkAdAAiACsAIgBlAC0ASAAiACsAIgBvAHMAdAAgACcASAAiACsAIg ┆ P"+"ow"+"erS"+"h"+"ell!'")                                            │
│                                ┆          ┆ BlAGwAIgArACIAbABvACwAIABmAHIAIgArACIAbwBtACAAUAAiACsAIgBvAHcAIgArACI ┆                                                                       │
│                                ┆          ┆ AZQByAFMAIgArACIAaAAiACsAIgBlAGwAbAAhACcAIgApAA                       ┆                                                                       │
╰────────────────────────────────┴──────────┴───────────────────────────────────────────────────────────────────────┴───────────────────────────────────────────────────────────────────────╯
Elapsed time: 00:00:01.319

@fukusuket fukusuket marked this pull request as ready for review January 20, 2025 11:36
Copy link
Collaborator

@YamatoSecurity YamatoSecurity left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@fukusuket LGTM! I tested it and works great! Thanks so much!

@YamatoSecurity YamatoSecurity merged commit 029b7f9 into main Jan 21, 2025
5 checks passed
@YamatoSecurity YamatoSecurity deleted the 1549-Add-PowerShellClassic-EID400-extract-base64 branch January 21, 2025 05:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add PowerShellClassic: EID400 to the target of the extract-base64 command
2 participants