SigmaHQ/rules/windows/process_creation/win_multiple_suspicious_cli.yml
mlp1515 aa5dab332e
Update win_multiple_suspicious_cli.yml
Modify modified field
2021-06-14 08:54:07 +02:00

61 lines
1.6 KiB
YAML

title: Quick Execution of a Series of Suspicious Commands
id: 61ab5496-748e-4818-a92f-de78e20fe7f1
description: Detects multiple suspicious process in a limited timeframe
status: experimental
references:
- https://car.mitre.org/wiki/CAR-2013-04-002
author: juju4
date: 2019/01/16
modified: 2021/06/13
tags:
- car.2013-04-002
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- arp.exe
- at.exe
- attrib.exe
- cscript.exe
- dsquery.exe
- hostname.exe
- ipconfig.exe
- mimikatz.exe
- nbtstat.exe
- net.exe
- netsh.exe
- nslookup.exe
- ping.exe
- quser.exe
- qwinsta.exe
- reg.exe
- runas.exe
- sc.exe
- schtasks.exe
- ssh.exe
- systeminfo.exe
- taskkill.exe
- telnet.exe
- tracert.exe
- wscript.exe
- xcopy.exe
- pscp.exe
- copy.exe
- robocopy.exe
- certutil.exe
- vssadmin.exe
- powershell.exe
- wevtutil.exe
- psexec.exe
- bcedit.exe
- wbadmin.exe
- icacls.exe
- diskpart.exe
timeframe: 5m
condition: selection | count() by MachineName > 5
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: low