SigmaHQ/rules/windows/builtin/win_ntfs_vuln_exploit.yml

23 lines
693 B
YAML

title: NTFS Vulnerability Exploitation
id: f14719ce-d3ab-4e25-9ce6-2899092260b0
description: This the exploitation of a NTFS vulnerability as reported without many details via Twitter
author: Florian Roth
date: 2021/01/11
references:
- https://twitter.com/jonasLyk/status/1347900440000811010
- https://twitter.com/wdormann/status/1347958161609809921
logsource:
product: windows
service: system
detection:
selection:
EventID: 55
Origin: 'File System Driver'
Description|contains|all:
- 'contains a corrupted file record'
- 'The name of the file is "\"'
condition: selection
falsepositives:
- Unlikely
level: critical