More conversions to the new process_creation logsource

This commit is contained in:
Tareq AlKhatib 2019-03-05 09:46:53 +03:00
parent b2952b9f78
commit 879017818f
2 changed files with 7 additions and 22 deletions

View File

@ -11,14 +11,13 @@ tags:
author: Markus Neis
date: 2017/11/07
logsource:
product: windows
service: sysmon
category: process_creation
product: windows
falsepositives:
- Unknown
---
detection:
selection:
EventID: 1
CommandLine:
- 'net use \\%DomainController%\C$ "P@ssw0rd" *'
- 'dir c:\\*.doc* /s'
@ -28,13 +27,10 @@ level: critical
---
detection:
netCommand1:
EventID: 1
CommandLine: 'net view /DOMAIN'
netCommand2:
EventID: 1
CommandLine: 'net session'
netCommand3:
EventID: 1
CommandLine: 'net share'
timeframe: 1m
condition: netCommand1 | near netCommand2 and netCommand3

View File

@ -1,3 +1,4 @@
---
action: global
title: Unidentified Attacker November 2018
status: stable
@ -11,26 +12,14 @@ tags:
- attack.execution
- attack.t1085
detection:
condition: selection
condition: 1 of them
level: high
---
# Windows Security Eventlog: Process Creation with Full Command Line
logsource:
category: process_creation
product: windows
service: security
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
detection:
selection:
EventID: 4688
ProcessCommandLine: '*cyzfc.dat, PointFunctionCall'
---
# Sysmon: Process Creation (ID 1)
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
selection1:
CommandLine: '*cyzfc.dat, PointFunctionCall'
---
# Sysmon: File Creation (ID 11)
@ -38,7 +27,7 @@ logsource:
product: windows
service: sysmon
detection:
selection:
selection2:
EventID: 11
TargetFilename:
- '*ds7002.lnk*'