EC2 Instance Started In Previously Unseen Region

Original Source: [splunk source]
Name:EC2 Instance Started In Previously Unseen Region
id:ada0f478-84a8-4641-a3f3-d82362d6fd75
version:3
date:2024-10-17
author:Bhavin Patel, Splunk
status:deprecated
type:Anomaly
Description:This search looks for AWS CloudTrail events where an instance is started in a particular region in the last one hour and then compares it to a lookup file of previously seen regions where an instance was started
Data_source:
search:`cloudtrail` earliest=-1h StartInstances
| stats earliest(_time) as earliest latest(_time) as latest by awsRegion
| inputlookup append=t previously_seen_aws_regions.csv
| stats min(earliest) as earliest max(latest) as latest by awsRegion
| outputlookup previously_seen_aws_regions.csv
| eval regionStatus=if(earliest >= relative_time(now(),"-1d@d"), "Instance Started in a New Region","Previously Seen Region")
| `security_content_ctime(earliest)`
| `security_content_ctime(latest)`
| where regionStatus="Instance Started in a New Region"
| `ec2_instance_started_in_previously_unseen_region_filter`


how_to_implement:You must install the AWS App for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS (version 4.4.0 or later), then configure your AWS CloudTrail inputs. Run the "Previously seen AWS Regions" support search only once to create of baseline of previously seen regions. This search is deprecated and have been translated to use the latest Change Datamodel.
known_false_positives:It's possible that a user has unknowingly started an instance in a new region. Please verify that this activity is legitimate.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'AWS Cryptomining'
    - 'Suspicious AWS EC2 Activities'
  asset_type:AWS Instance
  confidence:50
  impact:50
  message:tbd
  mitre_attack_id:
    - 'T1535'
  observable:
    name:'awsRegion'
    type:'Geo Location'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'awsRegion'
  risk_score:25.0
  security_domain:network

tests:
  :
manual_test:None