SigmaHQ/rules/windows/builtin/win_alert_hacktool_use.yml
2018-05-18 14:23:52 +02:00

19 lines
489 B
YAML

title: Hacktool Use
description: This method detects well-known keywords, certain field combination that appear in Windows Eventlog when certain hack tools are used
author: Florian Roth
logsource:
product: windows
service: security
detection:
# Ruler https://github.com/sensepost/ruler
selection1:
EventID:
- 4776
- 4624
- 4625
WorkstationName: 'RULER'
condition: selection1
falsepositives:
- Unlikely
level: critical