Merge pull request #3080 from securepeacock/patch-20
Create proc_creation_win_lolbin_fsianycpu.yml
This commit is contained in:
@@ -0,0 +1,27 @@
|
||||
title: Use of FSharp Interpreters
|
||||
id: b96b2031-7c17-4473-afe7-a30ce714db29
|
||||
status: experimental
|
||||
description: The FSharp Interpreters, FsiAnyCpu.exe and FSi.exe, can be used for AWL bypass and is listed in Microsoft recommended block rules.
|
||||
author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
|
||||
- https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/
|
||||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/
|
||||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/
|
||||
date: 2022/06/02
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
- Image|endswith: \fsianycpu.exe
|
||||
- OriginalFileName: fsianycpu.exe
|
||||
- Image|endswith: \fsi.exe
|
||||
- OriginalFileName: fsi.exe
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate use by a software developer.
|
||||
level: medium
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
Reference in New Issue
Block a user