Skip to content

Commit bf148ad

Browse files
committed
fix: fp found in testing
1 parent da468ec commit bf148ad

4 files changed

+19
-7
lines changed

rules/windows/builtin/security/win_security_susp_lsass_dump_generic.yml

+6-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
88
author: Roberto Rodriguez, Teymur Kheirkhabarov, Dimitrios Slamaris, Mark Russinovich, Aleksey Potapov, oscd.community (update)
99
date: 2019/11/01
10-
modified: 2023/03/13
10+
modified: 2023/03/21
1111
tags:
1212
- attack.credential_access
1313
- car.2019-04-004
@@ -85,6 +85,11 @@ detection:
8585
# Example: C:\a70de9569c3a5aa22184ef52a890177b\x64\SCENARIOENGINE.EXE
8686
ProcessName|endswith: '\x64\SCENARIOENGINE.EXE'
8787
AccessList: '%%4484'
88+
filter_avira:
89+
ProcessName|startswith: 'C:\Users\'
90+
ProcessName|contains: '\AppData\Local\Temp\is-'
91+
ProcessName|endswith: '\avira_system_speedup.tmp'
92+
AccessList: '%%4484'
8893
condition: 1 of selection_* and not 1 of filter_*
8994
falsepositives:
9095
- Legitimate software accessing LSASS process for legitimate reason; update the whitelist with it

rules/windows/network_connection/net_connection_win_susp_rdp.yml

+7-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
77
author: Markus Neis
88
date: 2019/05/15
9-
modified: 2022/09/02
9+
modified: 2023/03/21
1010
tags:
1111
- attack.lateral_movement
1212
- attack.t1021.001
@@ -18,7 +18,7 @@ detection:
1818
selection:
1919
DestinationPort: 3389
2020
Initiated: 'true'
21-
filter:
21+
filter_generic:
2222
- Image|endswith:
2323
- '\mstsc.exe'
2424
- '\RTSApp.exe'
@@ -46,7 +46,11 @@ detection:
4646
- '\Avast\AvastSvc.exe'
4747
- Image|startswith: 'C:\Program Files\SplunkUniversalForwarder\bin\'
4848
- Image: 'C:\Program Files\Mozilla Firefox\firefox.exe'
49-
condition: selection and not filter
49+
filter_null:
50+
Image: null
51+
filter_empty:
52+
Image: ''
53+
condition: selection and not 1 of filter_*
5054
falsepositives:
5155
- Other Remote Desktop RDP tools
5256
- Domain controller using dns.exe

rules/windows/process_creation/proc_creation_win_susp_elevated_system_shell.yml

+4-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://github.com/Wh04m1001/SysmonEoP
77
author: frack113, Tim Shelton (update fp)
88
date: 2022/12/05
9-
modified: 2023/03/14
9+
modified: 2023/03/21
1010
tags:
1111
- attack.privilege_escalation
1212
- attack.defense_evasion
@@ -67,6 +67,9 @@ detection:
6767
filter_empty_parent_2:
6868
Image|endswith: '\cmd.exe'
6969
CommandLine|contains: '/d /c C:\Windows\system32\silcollector.cmd'
70+
filter_empty_parent_3:
71+
Image|endswith: '\cmd.exe'
72+
CommandLine|endswith: 'cmd.exe /c btool server list replication_port --no-log'
7073
condition: all of selection_* and not 1 of filter_*
7174
falsepositives:
7275
- Unknown

rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_image.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ references:
1111
- https://twitter.com/frack113/status/1555830623633375232
1212
author: frack113, Nasreddine Bencherchali
1313
date: 2022/08/07
14-
modified: 2022/09/18
14+
modified: 2023/03/21
1515
tags:
1616
- attack.defense_evasion
1717
- attack.t1564.004
@@ -43,4 +43,4 @@ detection:
4343
condition: selection and not 1 of filter*
4444
falsepositives:
4545
- Applications could use this notation occasionally which might generate some false positives. In that case Investigate the parent and child process.
46-
level: high
46+
level: medium

0 commit comments

Comments
 (0)