SOC Prime Threat Bounty Digest — December 2024 Results

[post-views]
January 17, 2025 · 3 min read
SOC Prime Threat Bounty Digest — December 2024 Results

Detection Content Creation, Submission & Release

December was another impressive month for the Threat Bounty Program, with the community showcasing a collaborative spirit and detection engineering skills.

Despite the end-of-year hustle, Program members continued actively submitting detections to address emerging threats. In total, 33 new detection rules were successfully released to the SOC Prime Platform after being validated by the team of SOC Prime’s experts.

Ongoing Changes and Program Enhancements

Starting January 2025, we have temporarily suspended the acceptance of new Threat Bounty detections. While the Threat Bounty Program activities are on hold, we are working on several enhancements to the SOC Prime Platform that aim to improve the overall experience for all users and extend opportunities for Threat Bounty Program members, including submission of content across different formats and additional ways to monetize your work. See details here.

Meanwhile, members of the SOC Prime community can explore the SOC Prime Platform membership plans for individual users and incorporate some of the platform’s premium functionalities into their detection engineering projects. 

TOP December Rules by Threat Bounty Authors

During the last month of the year, the following detection rules gained the most popularity among companies that use SOC Prime to enhance their cybersecurity operations:

Rundll32 Usage for LOLBin Exploitation (via process_creation) by Bogac KAYA. This rule detects the execution of rundll32 leveraging windows.storage.dll to invoke ShellExec_RunDLL.

Possible Privilege Escalation Attempt To Get SYSTEM User With Powershell CommandAs Module (via ps_script) by Mustafa Gurkan KARAKAYA. This rule detects possible malicious command that can be used to create a scheduled task, execute a command on a remote server, start a job with a specific gMSA account, and perform all these actions with SYSTEM privileges.

Suspicious TA4557/FIN6 Execution by Invoking More_Eggs Malware through WMI Provider Host Service (via process_creation) by Nattatorn Chuensangarun – this rule detects suspicious TA4557/FIN6 activity releasing malicious DLL files to deploy More_Eggs malware through the WMI provider hosting service.

Possible Persistence Activity of APT35 Group by Creating Suspicious Registry RunKey (via registry_event) by Emre Ay. This rule detects the suspicious creation of a registry runkey related to the APT35 group that attempts to maintain persistence on the victim system and silently load the malicious program.

Possible Persistence Activity of BlackCat Ransomware by Creating Suspicious Scheduled Task ( via process_creation) by Emre Ay. This rule detects schtasks execution with suspicious taskrun parameter to maintain persistence on the victim system and execute the malware.

Threat Bounty Auhors: December TOP 5

These authors gained the highest rating for their Threat Bounty rules: 

Davut Selcuk

Nattatorn Chuensangarun 

Emre Ay

Sittikorn Sangrattanapitak

Bogac KAYA

As Threat Bounty Program evolves, its core mission remains the same: to enable collaboration, innovation, and impact within the cybersecurity industry and enhance global cyberdefense. We are grateful to Threat Bounty authors who have been standing hand in hand making this immense impact on strengthening the world’s defenses against cyber attacks. 

Stay tuned for more news and updates! 

Table of Contents

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts