SigmaHQ/rules/windows/malware/av_relevant_files.yml
Bart a5b4b276d4
Add scriptlets
Adds .sct and .vbe.
2019-11-14 22:26:22 +01:00

46 lines
1.1 KiB
YAML

title: Antivirus Relevant File Paths Alerts
id: c9a88268-0047-4824-ba6e-4d81ce0b907c
description: Detects an Antivirus alert in a highly relevant file path or with a relevant file name
date: 2018/09/09
modified: 2019/10/04
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
logsource:
product: antivirus
detection:
selection:
FileName:
- 'C:\Windows\Temp\\*'
- 'C:\Temp\\*'
- '*\\Client\\*'
- 'C:\PerfLogs\\*'
- 'C:\Users\Public\\*'
- 'C:\Users\Default\\*'
- '*.ps1'
- '*.vbs'
- '*.bat'
- '*.chm'
- '*.xml'
- '*.txt'
- '*.jsp'
- '*.jspx'
- '*.asp'
- '*.aspx'
- '*.php'
- '*.war'
- '*.hta'
- '*.lnk'
- '*.scf'
- '*.sct'
- '*.vbe'
- '*.wsf'
- '*.wsh'
condition: selection
fields:
- Signature
- User
falsepositives:
- Unlikely
level: high