rule: SysmonEnte usage

This commit is contained in:
Florian Roth
2022-09-07 14:33:44 +02:00
parent 1fff6c3bb6
commit 6ad167a4f3
@@ -0,0 +1,27 @@
title: SysmonEnte Usage
id: d29ada0f-af45-4f27-8f32-f7b77c3dbc4e
status: experimental
description: Detects the use of SysmonEnte, a tool to attack the integrity of Sysmon
author: Florian Roth
references:
- https://codewhitesec.blogspot.com/2022/09/attacks-on-sysmon-revisited-sysmonente.html
- https://github.com/codewhitesec/SysmonEnte/
- https://github.com/codewhitesec/SysmonEnte/blob/main/screens/1.png
date: 2022/09/07
logsource:
category: process_access
product: windows
detection:
selection_1:
TargetImage: 'C:\Windows\Sysmon64.exe'
GrantedAccess: '0x1400'
filter_1:
SourceImage|startswith:
- 'C:\Program Files'
- 'C:\Windows\System32\'
selection_calltrace:
CallTrace: 'Ente'
condition: ( selection_1 and not filter_1 ) or selection_calltrace
falsepositives:
- Unknown
level: high