Merge pull request #3080 from securepeacock/patch-20

Create proc_creation_win_lolbin_fsianycpu.yml
This commit is contained in:
frack113
2022-06-02 17:22:00 +02:00
committed by GitHub
@@ -0,0 +1,27 @@
title: Use of FSharp Interpreters
id: b96b2031-7c17-4473-afe7-a30ce714db29
status: experimental
description: The FSharp Interpreters, FsiAnyCpu.exe and FSi.exe, can be used for AWL bypass and is listed in Microsoft recommended block rules.
author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
- https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/
date: 2022/06/02
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|endswith: \fsianycpu.exe
- OriginalFileName: fsianycpu.exe
- Image|endswith: \fsi.exe
- OriginalFileName: fsi.exe
condition: selection
falsepositives:
- Legitimate use by a software developer.
level: medium
tags:
- attack.execution
- attack.t1059