diff --git a/rules/windows/process_creation/proc_creation_win_lolbin_fsharp_interpreters.yml b/rules/windows/process_creation/proc_creation_win_lolbin_fsharp_interpreters.yml new file mode 100644 index 000000000..e70af9399 --- /dev/null +++ b/rules/windows/process_creation/proc_creation_win_lolbin_fsharp_interpreters.yml @@ -0,0 +1,27 @@ +title: Use of FSharp Interpreters +id: b96b2031-7c17-4473-afe7-a30ce714db29 +status: experimental +description: The FSharp Interpreters, FsiAnyCpu.exe and FSi.exe, can be used for AWL bypass and is listed in Microsoft recommended block rules. +author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io' +references: + - https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules + - https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/ + - https://lolbas-project.github.io/lolbas/OtherMSBinaries/FsiAnyCpu/ + - https://lolbas-project.github.io/lolbas/OtherMSBinaries/Fsi/ +date: 2022/06/02 +logsource: + category: process_creation + product: windows +detection: + selection: + - Image|endswith: \fsianycpu.exe + - OriginalFileName: fsianycpu.exe + - Image|endswith: \fsi.exe + - OriginalFileName: fsi.exe + condition: selection +falsepositives: + - Legitimate use by a software developer. +level: medium +tags: + - attack.execution + - attack.t1059