SigmaHQ/rules/windows/sysmon/sysmon_workflow_compiler.yml
Thomas Patzke 9235175e26
Fixed rule
* Added condition
* Replaced Description wirh Image attribute and improved search pattern
2018-08-23 08:20:28 +02:00

25 lines
779 B
YAML

title: Microsoft Workflow Compiler
status: experimental
description: Detects invocation of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.
tags:
- attack.defense_evasion
- attack.execution
author: Nik Seetharaman
references:
- https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
logsource:
product: windows
service: sysmon
detection:
# Description contains MWC even if file has been renamed.
selection:
EventID: 1
Image: '*\Microsoft.Workflow.Compiler.exe'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Legitimate MWC use (unlikely in modern enterprise environments)
level: high