mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 17:35:19 +00:00
escape / in regex
This commit is contained in:
parent
3ff4e99d44
commit
0ef3dc2082
@ -4,6 +4,7 @@ description: Detects Obfuscated Powershell via VAR++ LAUNCHER
|
||||
status: experimental
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/13
|
||||
modified: 2021/07/15
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009 #(Task27)
|
||||
tags:
|
||||
@ -17,7 +18,7 @@ logsource:
|
||||
detection:
|
||||
selection_1:
|
||||
EventID: 4104
|
||||
ScriptBlockText|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c/c' # FPs with |\/r
|
||||
ScriptBlockText|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
|
||||
selection_2:
|
||||
EventID: 4103
|
||||
Payload|re: '(?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c' # FPs with |\/r
|
||||
|
@ -4,7 +4,7 @@ description: BITS will allow you to schedule a command to execute after a succes
|
||||
status: experimental
|
||||
author: Sreeman
|
||||
date: 2020/10/29
|
||||
modified: 2021/06/11
|
||||
modified: 2021/07/15
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
references:
|
||||
@ -16,9 +16,9 @@ logsource:
|
||||
category: process_creation
|
||||
detection:
|
||||
selection_1:
|
||||
CommandLine|re: '(?i).*bitsadmin.*/SetNotifyCmdLine.*(%COMSPEC%|cmd.exe|regsvr32.exe).*'
|
||||
CommandLine|re: '(?i).*bitsadmin.*\/SetNotifyCmdLine.*(%COMSPEC%|cmd.exe|regsvr32.exe).*'
|
||||
selection_2:
|
||||
CommandLine|re: '(?i).*bitsadmin.*/Addfile.*(http|https|ftp|ftps):.*'
|
||||
CommandLine|re: '(?i).*bitsadmin.*\/Addfile.*(http|https|ftp|ftps):.*'
|
||||
condition: selection_1 or selection_2
|
||||
falsepositives:
|
||||
- None observed yet.
|
||||
|
@ -12,7 +12,7 @@ tags:
|
||||
- attack.t1053
|
||||
author: Sreeman
|
||||
date: 2020/09/29
|
||||
modified: 2021/06/11
|
||||
modified: 2021/07/15
|
||||
fields:
|
||||
- EventID
|
||||
- CommandLine
|
||||
@ -37,5 +37,5 @@ logsource:
|
||||
category: process_creation
|
||||
detection:
|
||||
selection:
|
||||
CommandLine|re: '(?i).*schtasks.*(-|/)r.*\\Application Experience\\Microsoft Compatibility Appraiser.*'
|
||||
CommandLine|re: '(?i).*schtasks.*(-|\/)r.*\\Application Experience\\Microsoft Compatibility Appraiser.*'
|
||||
condition: selection
|
Loading…
Reference in New Issue
Block a user