diff --git a/rules/windows/raw_access_thread/sysmon_raw_disk_access_using_illegitimate_tools.yml b/rules/windows/raw_access_thread/sysmon_raw_disk_access_using_illegitimate_tools.yml index 863e5be95..71f4c66c5 100644 --- a/rules/windows/raw_access_thread/sysmon_raw_disk_access_using_illegitimate_tools.yml +++ b/rules/windows/raw_access_thread/sysmon_raw_disk_access_using_illegitimate_tools.yml @@ -4,7 +4,7 @@ description: Raw disk access using illegitimate tools, possible defence evasion author: Teymur Kheirkhabarov, oscd.community status: test date: 2019/10/22 -modified: 2022/01/02 +modified: 2022/02/06 references: - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment tags: @@ -39,6 +39,7 @@ detection: - '\MsMpEng.exe' - '\SearchApp.exe' - '\powershell.exe' + - '\GamingServices.exe' filter_3: ProcessId: 4 filter_fullpath: