Skip to content

Conversation

@tropChaud
Copy link
Contributor

@tropChaud tropChaud commented Oct 22, 2025

Summary of the Pull Request

New rules related to recent reported ransom group activity (The Gentlemen, and some similar to previously reported activity)

Changelog

new: Windows Default Domain GPO Modification
new: Windows Default Domain GPO Modification via GPME
update: Potential Tampering With RDP Related Registry Keys Via Reg.EXE - Add coverage for SecurityLayer value
update: RDP Sensitive Settings Changed - Add coverage for SecurityLayer value

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Oct 22, 2025
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR introduces detection rules for ransomware-related activities associated with The Gentlemen ransomware group and similar threat actors. The rules focus on detecting RDP security weakening through registry modifications and unauthorized Group Policy Object (GPO) changes.

Key changes include:

  • Detection of RDP SecurityLayer registry tampering through both registry monitoring and process creation events
  • Detection of suspicious modifications to default domain GPOs via Group Policy Management Editor
  • Detection of default domain GPO modifications through Windows Security event logs

Reviewed Changes

Copilot reviewed 5 out of 5 changed files in this pull request and generated 4 comments.

Show a summary per file
File Description
registry_set_rdp_securitylayer.yml Detects registry changes to RDP SecurityLayer values that weaken authentication
proc_creation_win_reg_rdp_securitylayer.yml Detects command-line registry modifications to RDP SecurityLayer settings
proc_creation_win_default_domain_gpo_modification_via_gpme.yml Detects use of GPME to modify default domain GPOs
win_security_default_domain_gpo_modification.yml Detects Event ID 5136 modifications to default domain GPOs
known-FPs.csv Adds false positive exception for GPO modification rule

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@nasbench nasbench added this to the Sigma-December-Release milestone Nov 20, 2025
@nasbench
Copy link
Member

Will review

@phantinuss phantinuss added Review Needed The PR requires review and removed 2nd Review Needed labels Nov 21, 2025
@phantinuss phantinuss force-pushed the new_ransomware_rules_oct21 branch from 2f09484 to 47fa18f Compare November 21, 2025 12:38
@phantinuss
Copy link
Collaborator

@tropChaud: Can you provide example events for each rule?

@nasbench
Copy link
Member

@tropChaud: Can you provide example events for each rule?

Checked the rules except for the SACL one that swach suggested. Which I assume he did test it. So we should be good to go.

@nasbench nasbench added Ready to Merge and removed Review Needed The PR requires review labels Nov 22, 2025
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 5 out of 5 changed files in this pull request and generated 3 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@swachchhanda000 swachchhanda000 force-pushed the new_ransomware_rules_oct21 branch from 46e0f74 to 6ce2e15 Compare November 23, 2025 14:43
@swachchhanda000 swachchhanda000 changed the title New rules related to recent reported ransom group activity (The Gentlemen) Add and Enhance Windows GPO & RDP Tampering Detection Rules Nov 23, 2025
@swachchhanda000 swachchhanda000 merged commit 0d7658f into SigmaHQ:master Nov 23, 2025
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Ready to Merge Rules Windows Pull request add/update windows related rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants