mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 02:08:54 +00:00
25d3a5a893
The condition field in this rule was in the global section which overwrote the condition in sub-rules and generated FPs. For example, once Sigma read the rule, the bottom sub-rule's "condition" was overwritten with "1 of them".
49 lines
1.2 KiB
YAML
49 lines
1.2 KiB
YAML
action: global
|
|
title: Suspicious PrinterPorts Created (CVE-2020-1048)
|
|
id: 7ec912f2-5175-4868-b811-ec13ad0f8567
|
|
status: experimental
|
|
description: Detects new registry printer port was created or powershell command add new printer port which point to suspicious file
|
|
author: EagleEye Team, Florian Roth
|
|
date: 2020/05/13
|
|
modified: 2020/05/15
|
|
references:
|
|
- https://windows-internals.com/printdemon-cve-2020-1048/
|
|
tags:
|
|
- attack.persistence
|
|
- attack.execution
|
|
falsepositives:
|
|
- New printer port install on host
|
|
level: high
|
|
---
|
|
logsource:
|
|
service: sysmon
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
EventID:
|
|
- 12
|
|
- 13
|
|
TargetObject|startswith: 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports'
|
|
EventType:
|
|
- SetValue
|
|
- DeleteValue
|
|
- CreateValue
|
|
TargetObject|contains:
|
|
- '.dll'
|
|
- '.exe'
|
|
- 'C:'
|
|
condition: selection
|
|
---
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection1:
|
|
CommandLine|contains: 'Add-PrinterPort -Name'
|
|
selection2:
|
|
CommandLine|contains:
|
|
- '.dll'
|
|
- '.exe'
|
|
condition: selection1 and selection2
|
|
|