SigmaHQ/wazuh/rules/sigma_win_mal_ursnif.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
368 B
YAML

alert:
- debug
description: Detects new registry key created by Ursnif malware.
filter:
- query:
query_string:
query: (data.win.system.eventID:"13" AND data.win.eventdata.targetObject.keyword:*\\Software\\AppDataLow\\Software\\Microsoft\\*)
index: wazuh-alerts-3.x-*
name: 21f17060-b282-4249-ade0-589ea3591558_0
priority: 1
realert:
minutes: 0
type: any