SigmaHQ/wazuh/rules/sigma_sysmon_invoke_phantom.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
503 B
YAML

alert:
- debug
description: Detects suspect access to svchost process memory such as that used by Invoke-Phantom to kill the winRM windows event logging service.
filter:
- query:
query_string:
query: (data.win.eventdata.targetImage.keyword:*\\windows\\system32\\svchost.exe AND data.win.eventdata.grantedAccess:"0x1f3fff" AND data.win.eventdata.callTrace.keyword:(*unknown*))
index: wazuh-alerts-3.x-*
name: 166e9c50-8cd9-44af-815d-d1f0c0e90dde_0
priority: 2
realert:
minutes: 0
type: any