Skip to content

Commit 2883c2e

Browse files
committed
fix: test errors
1 parent 05adb15 commit 2883c2e

5 files changed

+6
-7
lines changed

rules/windows/process_creation/proc_creation_win_cmd_copy_dmp_from_share.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ detection:
2424
CommandLine|contains:
2525
- '.dmp'
2626
- '.dump'
27-
condition: selection
27+
condition: all of selection_*
2828
falsepositives:
2929
- Unknown
3030
level: high

rules/windows/process_creation/proc_creation_win_findstr_lsass.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ detection:
2626
- 'findstr.exe lsass'
2727
- 'findstr "lsass'
2828
- 'findstr.exe "lsass'
29-
condition: all of selection_finstr_* or selection_special
29+
condition: all of selection_findstr_* or selection_special
3030
falsepositives:
3131
- Unknown
3232
level: high

rules/windows/process_creation/proc_creation_win_susp_private_keys_recon.yml

+1-2
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,7 @@ detection:
2727
- 'PowerShell.EXE'
2828
- 'pwsh.dll'
2929
selection_pwsh_cli:
30-
CommandLine|contains:
31-
- 'Get-ChildItem '
30+
CommandLine|contains: 'Get-ChildItem '
3231
selection_findstr:
3332
- Image|endswith: '\findstr.exe'
3433
- OriginalFileName: 'FINDSTR.EXE'

rules/windows/process_creation/proc_creation_win_wmic_recon_product_class.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
title: Potential Product Reconnaissance Via Wmic.EXE
1+
title: Potential Product Class Reconnaissance Via Wmic.EXE
22
id: e568650b-5dcd-4658-8f34-ded0b1e13992
33
status: experimental
44
description: Detects the execution of WMIC in order to get a list of firewall and antivirus products
@@ -7,6 +7,7 @@ references:
77
- https://www.hybrid-analysis.com/sample/4be06ecd234e2110bd615649fe4a6fa95403979acf889d7e45a78985eb50acf9?environmentId=1
88
author: Michael Haag, Florian Roth (Nextron Systems), juju4, oscd.community
99
date: 2023/02/14
10+
modified: 2023/03/07
1011
tags:
1112
- attack.execution
1213
- attack.t1047

tests/test_rules.py

+1-2
Original file line numberDiff line numberDiff line change
@@ -945,8 +945,7 @@ def test_title(self):
945945
faulty_rules.append(file)
946946
wrong_casing = []
947947
for word in title.split(" "):
948-
#if word.islower() and not word.lower() in allowed_lowercase_words and not "." in word and not "/" in word and not word[0].isdigit():
949-
if word.islower() and not word.lower() in allowed_lowercase_words:
948+
if word.islower() and not word.lower() in allowed_lowercase_words and not "." in word and not "/" in word and not word[0].isdigit():
950949
wrong_casing.append(word)
951950
if len(wrong_casing) > 0:
952951
print(Fore.RED + "Rule {} has a title that has not title capitalization. Words: '{}'".format(

0 commit comments

Comments
 (0)