fix TargetFilename case error

This commit is contained in:
frack113
2021-08-06 08:43:05 +02:00
parent eb247704fe
commit cf8d8d3ed4
5 changed files with 8 additions and 7 deletions
@@ -30,6 +30,6 @@ detection:
condition: selection and not filter
fields:
- ComputerName
- TargetFileName
- TargetFilename
falsepositives:
- Unknown
@@ -20,7 +20,7 @@ detection:
condition: selection
fields:
- ComputerName
- TargetFileName
- TargetFilename
falsepositives:
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
level: medium
@@ -24,6 +24,6 @@ detection:
condition: selection
fields:
- ComputerName
- TargetFileName
- TargetFilename
falsepositives:
- Unknown
+3 -3
View File
@@ -5,7 +5,7 @@ status: experimental
description: Detects PsExec service installation and execution events (service and Sysmon)
author: Thomas Patzke
date: 2017/06/12
modified: 2021/05/16
modified: 2021/08/06
references:
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
- https://jpcertcc.github.io/ToolAnalysisResultSheet
@@ -22,7 +22,7 @@ fields:
- ParentCommandLine
- ServiceName
- ServiceFileName
- TargetFileName
- TargetFilename
- PipeName
falsepositives:
- unknown
@@ -60,4 +60,4 @@ logsource:
product: windows
detection:
sysmon_filecreation:
TargetFileName|endswith: '\PSEXESVC.exe'
TargetFilename|endswith: '\PSEXESVC.exe'
@@ -5,6 +5,7 @@ status: experimental
description: Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum
author: Sittikorn S
date: 2021/07/16
modified: 2021/08/06
references:
- https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/
- https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/
@@ -24,7 +25,7 @@ logsource:
category: file_event
detection:
selection:
TargetFileName|contains:
TargetFilename|contains:
- 'C:\Windows\system32\physmem.sys'
- 'C:\Windows\System32\IME\IMEJP\imjpueact.dll'
- 'C:\Windows\system32\ime\IMETC\IMTCPROT.DLL'