SigmaHQ/wazuh/rules/sigma_win_susp_csc_folder.yml

16 lines
534 B
YAML
Raw Permalink Normal View History

2020-12-02 22:43:30 +00:00
alert:
- debug
description: Detects a suspicious execution of csc.exe, which uses a source in a suspicious folder (e.g. AppData)
filter:
- query:
query_string:
query: ((data.win.eventdata.image.keyword:*\\csc.exe AND data.win.eventdata.commandLine.keyword:(*\\AppData\\* OR *\\Windows\\Temp\\*)) AND (NOT (data.win.eventdata.parentImage.keyword:(C\:\\Program\ Files* OR *\\sdiagnhost.exe OR *\\w3wp.exe))))
index: wazuh-alerts-3.x-*
name: dcaa3f04-70c3-427a-80b4-b870d73c94c4_0
priority: 2
realert:
minutes: 0
type: any