This commit is contained in:
Thomas Patzke 2018-08-02 22:45:25 +02:00
commit e6c3313168

View File

@ -1,7 +1,7 @@
---
action: global
title: Suspicious Process Creation
description: Detects suspicious process starts on Windows systems bsed on keywords
description: Detects suspicious process starts on Windows systems based on keywords
status: experimental
references:
- https://www.swordshield.com/2015/07/getting-hashes-from-ntds-dit-file/
@ -65,7 +65,7 @@ detection:
# AddInProcess
- '*AddInProcess*'
# NotPowershell (nps) attack
- '*msbuild*'
# - '*msbuild*' # too many false positives
condition: selection
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment