fix TargetFilename case error
This commit is contained in:
@@ -30,6 +30,6 @@ detection:
|
||||
condition: selection and not filter
|
||||
fields:
|
||||
- ComputerName
|
||||
- TargetFileName
|
||||
- TargetFilename
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -20,7 +20,7 @@ detection:
|
||||
condition: selection
|
||||
fields:
|
||||
- ComputerName
|
||||
- TargetFileName
|
||||
- TargetFilename
|
||||
falsepositives:
|
||||
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
|
||||
level: medium
|
||||
|
||||
@@ -24,6 +24,6 @@ detection:
|
||||
condition: selection
|
||||
fields:
|
||||
- ComputerName
|
||||
- TargetFileName
|
||||
- TargetFilename
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -5,7 +5,7 @@ status: experimental
|
||||
description: Detects PsExec service installation and execution events (service and Sysmon)
|
||||
author: Thomas Patzke
|
||||
date: 2017/06/12
|
||||
modified: 2021/05/16
|
||||
modified: 2021/08/06
|
||||
references:
|
||||
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
|
||||
- https://jpcertcc.github.io/ToolAnalysisResultSheet
|
||||
@@ -22,7 +22,7 @@ fields:
|
||||
- ParentCommandLine
|
||||
- ServiceName
|
||||
- ServiceFileName
|
||||
- TargetFileName
|
||||
- TargetFilename
|
||||
- PipeName
|
||||
falsepositives:
|
||||
- unknown
|
||||
@@ -60,4 +60,4 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
sysmon_filecreation:
|
||||
TargetFileName|endswith: '\PSEXESVC.exe'
|
||||
TargetFilename|endswith: '\PSEXESVC.exe'
|
||||
|
||||
@@ -5,6 +5,7 @@ status: experimental
|
||||
description: Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum
|
||||
author: Sittikorn S
|
||||
date: 2021/07/16
|
||||
modified: 2021/08/06
|
||||
references:
|
||||
- https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/
|
||||
- https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/
|
||||
@@ -24,7 +25,7 @@ logsource:
|
||||
category: file_event
|
||||
detection:
|
||||
selection:
|
||||
TargetFileName|contains:
|
||||
TargetFilename|contains:
|
||||
- 'C:\Windows\system32\physmem.sys'
|
||||
- 'C:\Windows\System32\IME\IMEJP\imjpueact.dll'
|
||||
- 'C:\Windows\system32\ime\IMETC\IMTCPROT.DLL'
|
||||
|
||||
Reference in New Issue
Block a user