From 2f4eed2fe4e001260d22367d045d4c60b5960493 Mon Sep 17 00:00:00 2001 From: Florian Roth Date: Wed, 9 Nov 2022 18:33:13 +0100 Subject: [PATCH] no need to update the modified date here --- .../proc_creation_win_weak_or_abused_passwords.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml b/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml index b19d0ca3f..89d1ac20b 100644 --- a/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml +++ b/rules/windows/process_creation/proc_creation_win_weak_or_abused_passwords.yml @@ -8,7 +8,7 @@ references: - https://www.microsoft.com/en-us/security/blog/2022/10/25/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector/ author: Nasreddine Bencherchali date: 2022/09/14 -modified: 2022/11/08 +modified: 2022/09/27 tags: - attack.defense_evasion - attack.execution