SigmaHQ/wazuh/rules/sigma_win_hack_smbexec.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
378 B
YAML

alert:
- debug
description: Detects the use of smbexec.py tool by detecting a specific service installation
filter:
- query:
query_string:
query: (data.win.system.eventID:"7045" AND service_name:"BTOBTO" AND service_image_path.keyword:*\\execute.bat)
index: wazuh-alerts-3.x-*
name: 52a85084-6989-40c3-8f32-091e12e13f09_0
priority: 1
realert:
minutes: 0
type: any