Skip to content

Commit

Permalink
Updated converted sigma rules for version version/7.3
Browse files Browse the repository at this point in the history
  • Loading branch information
vastlimits committed Jan 20, 2025
1 parent 4cae212 commit e4f676b
Showing 1 changed file with 0 additions and 13 deletions.
13 changes: 0 additions & 13 deletions config/uberAgent-ESA-am-sigma-high-windows.conf
Original file line number Diff line number Diff line change
Expand Up @@ -8516,19 +8516,6 @@ GenericProperty1 = Reg.TargetObject
GenericProperty2 = Reg.Value.Data


[ThreatDetectionRule platform=Windows]
# Detects the image load of VSS DLL by uncommon executables
# Author: frack113
RuleId = 48bfd177-7cf2-412b-ad77-baf923489e82
RuleName = Suspicious Volume Shadow Copy Vsstrace.dll Load
EventType = Image.Load
Tag = suspicious-volume-shadow-copy-vsstrace.dll-load
RiskScore = 75
Annotation = {"mitre_attack": ["T1490"], "author": "frack113"}
Query = Image.Path like r"%\\vsstrace.dll" and not (Process.Path in ["C:\\Windows\\explorer.exe", "C:\\Windows\\ImmersiveControlPanel\\SystemSettings.exe"] or Process.Path like r"C:\\Windows\\System32\\%" or Process.Path like r"C:\\Windows\\SysWOW64\\%" or Process.Path like r"C:\\Windows\\Temp\\{%" or Process.Path like r"C:\\Windows\\WinSxS\\%" or Process.Path like r"C:\\Program Files\\%" or Process.Path like r"C:\\Program Files (x86)\\%")
GenericProperty1 = Image.Path


[ThreatDetectionRule platform=Windows]
# Detects the execution of powershell, a WebClient object creation and the invocation of DownloadFile in a single command line
# Author: Florian Roth (Nextron Systems)
Expand Down

0 comments on commit e4f676b

Please sign in to comment.