rule: false positive reduction in PowerShell rules
This commit is contained in:
@@ -1,6 +1,7 @@
|
||||
title: Malicious PowerShell Commandlets
|
||||
status: experimental
|
||||
description: Detects Commandlet names from well-known PowerShell exploitation frameworks
|
||||
modified: 2019/01/22
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
tags:
|
||||
@@ -40,7 +41,6 @@ detection:
|
||||
- Get-VulnAutoRun
|
||||
- Get-VulnSchTask
|
||||
- Get-UnattendedInstallFile
|
||||
- Get-WebConfig
|
||||
- Get-ApplicationHost
|
||||
- Get-RegAlwaysInstallElevated
|
||||
- Get-Unconstrained
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
title: Malicious PowerShell Keywords
|
||||
status: experimental
|
||||
description: Detects keywords from well-known PowerShell exploitation frameworks
|
||||
modified: 2019/01/22
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
tags:
|
||||
@@ -15,18 +16,12 @@ detection:
|
||||
keywords:
|
||||
- AdjustTokenPrivileges
|
||||
- IMAGE_NT_OPTIONAL_HDR64_MAGIC
|
||||
- Management.Automation.RuntimeException
|
||||
- Microsoft.Win32.UnsafeNativeMethods
|
||||
- ReadProcessMemory.Invoke
|
||||
- Runtime.InteropServices
|
||||
- SE_PRIVILEGE_ENABLED
|
||||
- System.Security.Cryptography
|
||||
- System.Runtime.InteropServices
|
||||
- LSA_UNICODE_STRING
|
||||
- MiniDumpWriteDump
|
||||
- PAGE_EXECUTE_READ
|
||||
- Net.Sockets.SocketFlags
|
||||
- Reflection.Assembly
|
||||
- SECURITY_DELEGATION
|
||||
- TOKEN_ADJUST_PRIVILEGES
|
||||
- TOKEN_ALL_ACCESS
|
||||
|
||||
Reference in New Issue
Block a user