mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 01:15:17 +00:00
16 lines
465 B
YAML
16 lines
465 B
YAML
alert:
|
|
- debug
|
|
description: Detects WMI executing suspicious commands
|
|
filter:
|
|
- query:
|
|
query_string:
|
|
query: (data.win.eventdata.image.keyword:(*\\wmic.exe) AND data.win.eventdata.commandLine.keyword:(*\/NODE\:*process\ call\ create\ * OR *\ path\ AntiVirusProduct\ get\ * OR *\ path\ FirewallProduct\ get\ * OR *\ shadowcopy\ delete\ *))
|
|
index: wazuh-alerts-3.x-*
|
|
name: 526be59f-a573-4eea-b5f7-f0973207634d_0
|
|
priority: 3
|
|
realert:
|
|
minutes: 0
|
|
type: any
|
|
|
|
|