Merge pull request #811 from svnscha/fix/field-TargetFileName-to-TargetFilename

All Rules use 'TargetFilename' instead of 'TargetFileName'.
This commit is contained in:
Florian Roth
2020-06-03 10:48:05 +02:00
committed by GitHub
5 changed files with 6 additions and 6 deletions
+1 -1
View File
@@ -104,7 +104,7 @@ logsource:
detection:
selection_file_creation:
EventID: 11
TargetFileName|contains:
TargetFilename|contains:
- '.dmp' # dump process memory
- 'Desktop\how' # Ransomware
- 'Desktop\decrypt' # Ransomware
@@ -5,7 +5,7 @@ description: Detects process reimaging defense evasion technique
# where
# selection1: ImageFileName != selection1: OriginalFileName
# selection1: ParentProcessGuid = selection2: ProcessGuid
# selection1: Image = selection2: TargetFileName
# selection1: Image = selection2: TargetFilename
# and new field ImageFileName is coming from enrichment
# selection1: Image = ^.+\\<ImageFileName>$
# Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec.
@@ -45,4 +45,4 @@ detection:
EventID: 11
fields:
- ProcessGuid
- TargetFileName
- TargetFilename
@@ -29,5 +29,5 @@ logsource:
detection:
selection:
EventID: 11
TargetFileName|contains: '*\lsass.dmp'
TargetFilename|contains: '*\lsass.dmp'
condition: 1 of them
@@ -20,7 +20,7 @@ detection:
condition: selection
fields:
- ComputerName
- TargetFileName
- TargetFilename
falsepositives:
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
level: medium
@@ -11,7 +11,7 @@ detection:
selection:
EventID: 11
Image: '*\mstsc.exe'
TargetFileName: '*\Microsoft\Windows\Start Menu\Programs\Startup\\*'
TargetFilename: '*\Microsoft\Windows\Start Menu\Programs\Startup\\*'
condition: selection
falsepositives:
- unknown