Windows Redcannary
This commit is contained in:
@@ -0,0 +1,25 @@
|
||||
title: Suspicious IO.FileStream
|
||||
id: 70ad982f-67c8-40e0-a955-b920c2fa05cb
|
||||
status: experimental
|
||||
description: open a handle on the drive volume via the \\.\ DOS device path specifier and perform direct access read of the first few bytes of the volume.
|
||||
date: 2022/01/09
|
||||
author: frack113
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1006/T1006.md
|
||||
logsource:
|
||||
product: windows
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
detection:
|
||||
selection:
|
||||
ScriptBlockText|contains|all:
|
||||
- New-Object
|
||||
- IO.FileStream
|
||||
- '"\\.\'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate PowerShell scripts
|
||||
level: medium
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070.003
|
||||
Reference in New Issue
Block a user