SigmaHQ/rules/windows/other/win_defender_amsi_trigger.yml
2020-09-14 18:10:38 +05:45

19 lines
487 B
YAML

title: Windows Defender AMSI Trigger Detected
id: ea9bf0fa-edec-4fb8-8b78-b119f2528186
description: Detects triggering of AMSI by Windows Defender.
date: 2020/09/14
author: Bhabesh Raj
references:
- https://docs.microsoft.com/en-us/windows/win32/amsi/how-amsi-helps
status: stable
logsource:
product: windows
service: windefend
detection:
selection:
EventID: 1116
DetectionSource: 'AMSI'
condition: selection
falsepositives:
- unlikely
level: high