feat: new rule for sysnative process creation
This commit is contained in:
@@ -0,0 +1,23 @@
|
||||
title: Process Creation using Sysnative Folder
|
||||
id: 3c1b5fb0-c72f-45ba-abd1-4d4c353144ab
|
||||
status: experimental
|
||||
description: Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)
|
||||
references:
|
||||
- https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
|
||||
author: Max Altgelt
|
||||
date: 2022/08/23
|
||||
tags:
|
||||
- attack.t1055
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
sysnative:
|
||||
CommandLine|startswith: 'C:\Windows\Sysnative\'
|
||||
condition: sysnative
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
Reference in New Issue
Block a user