mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 17:58:52 +00:00
refactor: merging rule process_creation/win_susp_exec_folder.yml and process_creation/win_susp_prog_location_process_starts.yml because of significant overlap
This commit is contained in:
parent
109b7890db
commit
2cab121c71
@ -1,42 +0,0 @@
|
||||
title: Executables Started in Suspicious Folder
|
||||
id: 7a38aa19-86a9-4af7-ac51-6bfe4e59f254
|
||||
status: experimental
|
||||
description: Detects process starts of binaries from a suspicious folder
|
||||
author: Florian Roth
|
||||
date: 2017/10/14
|
||||
modified: 2019/02/21
|
||||
references:
|
||||
- https://github.com/mbevilacqua/appcompatprocessor/blob/master/AppCompatSearch.txt
|
||||
- https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses
|
||||
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
|
||||
- https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/suspicious_process_creation_via_windows_event_logs.md
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- C:\PerfLogs\\*
|
||||
- C:\$Recycle.bin\\*
|
||||
- C:\Intel\Logs\\*
|
||||
- C:\Users\Default\\*
|
||||
- C:\Users\Public\\*
|
||||
- C:\Users\NetworkService\\*
|
||||
- C:\Windows\Fonts\\*
|
||||
- C:\Windows\Debug\\*
|
||||
- C:\Windows\Media\\*
|
||||
- C:\Windows\Help\\*
|
||||
- C:\Windows\addins\\*
|
||||
- C:\Windows\repair\\*
|
||||
- C:\Windows\security\\*
|
||||
- '*\RSA\MachineKeys\\*'
|
||||
- C:\Windows\system32\config\systemprofile\\*
|
||||
- C:\Windows\Tasks\\*
|
||||
- C:\Windows\System32\Tasks\\*
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
@ -1,9 +1,15 @@
|
||||
title: Execution in Non-Executable Folder
|
||||
title: Execution from Suspicious Folder
|
||||
id: 3dfd06d2-eaf4-4532-9555-68aca59f57c4
|
||||
status: experimental
|
||||
description: Detects a suspicious execution from an uncommon folder
|
||||
author: Florian Roth
|
||||
date: 2019/01/16
|
||||
modified: 2021/03/31
|
||||
references:
|
||||
- https://github.com/mbevilacqua/appcompatprocessor/blob/master/AppCompatSearch.txt
|
||||
- https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses
|
||||
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
|
||||
- https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/suspicious_process_creation_via_windows_event_logs.md
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
@ -13,7 +19,7 @@ logsource:
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\$Recycle.bin'
|
||||
- '*\$Recycle.bin\\*'
|
||||
- '*\Users\All Users\\*'
|
||||
- '*\Users\Default\\*'
|
||||
- '*\Users\Public\\*'
|
||||
@ -22,6 +28,18 @@ detection:
|
||||
- '*\Windows\Fonts\\*'
|
||||
- '*\Windows\IME\\*'
|
||||
- '*\Windows\addins\\*'
|
||||
- '*\Intel\Logs\\*'
|
||||
- '*\Users\NetworkService\\*'
|
||||
- '*\Windows\debug\\*'
|
||||
- '*\Windows\Media\\*'
|
||||
- '*\Windows\Help\\*'
|
||||
- '*\Windows\repair\\*'
|
||||
- '*\Windows\security\\*'
|
||||
- '*\RSA\MachineKeys\\*'
|
||||
- '*\Windows\system32\config\systemprofile\\*'
|
||||
- '*\Windows\Tasks\\*'
|
||||
- '*\Windows\System32\Tasks\\*'
|
||||
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
|
@ -1,28 +0,0 @@
|
||||
title: Suspicious Program Location Process Starts
|
||||
id: f50bfd8b-e2a3-4c15-9373-7900b5a4c6d5
|
||||
status: experimental
|
||||
description: Detects programs running in suspicious files system locations
|
||||
references:
|
||||
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
author: Florian Roth
|
||||
date: 2019/01/15
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\$Recycle.bin'
|
||||
- '*\Users\Public\\*'
|
||||
- 'C:\Perflogs\\*'
|
||||
- '*\Windows\Fonts\\*'
|
||||
- '*\Windows\IME\\*'
|
||||
- '*\Windows\addins\\*'
|
||||
- '*\Windows\debug\\*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
Loading…
Reference in New Issue
Block a user