feat: new rule for sysnative process creation

This commit is contained in:
Max Altgelt
2022-08-23 14:36:40 +02:00
parent c7cb961277
commit 6711a3e2ed
@@ -0,0 +1,23 @@
title: Process Creation using Sysnative Folder
id: 3c1b5fb0-c72f-45ba-abd1-4d4c353144ab
status: experimental
description: Detects process creation events that use the Sysnative folder (common for CobaltStrike spawns)
references:
- https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
author: Max Altgelt
date: 2022/08/23
tags:
- attack.t1055
logsource:
category: process_creation
product: windows
detection:
sysnative:
CommandLine|startswith: 'C:\Windows\Sysnative\'
condition: sysnative
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: medium