Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_sysmon_exploitation.yml
T
2022-12-30 10:12:25 +01:00

38 lines
1.3 KiB
YAML

title: Suspicious Sysmon as Execution Parent
id: 6d1058a4-407e-4f3a-a144-1968c11dc5c3
status: experimental
description: Detects suspicious process executions in which Sysmon itself is the parent of a process, which could be a sign of exploitation (e.g. CVE-2022-41120)
references:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120
- https://twitter.com/filip_dragovic/status/1590052248260055041
- https://twitter.com/filip_dragovic/status/1590104354727436290
author: Florian Roth, Tim Shelton (fp werfault)
date: 2022/11/10
modified: 2022/12/30
tag:
- attack.privilege_escalation
- attack.t1068
- cve.2022.41120
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage|endswith:
- '\Sysmon.exe'
- '\Sysmon64.exe'
filter:
- Image:
- 'C:\Windows\Sysmon.exe'
- 'C:\Windows\Sysmon64.exe'
- 'C:\Windows\System32\conhost.exe'
- 'wevtutil.exe'
- 'C:\WINDOWS\system32\wevtutil.exe'
- 'C:\Windows\System32\WerFault.exe' # When Sysmon crashes
- Image|endswith: '\AppData\Local\Temp\Sysmon.exe' # When launching Sysmon 32bit version.
condition: selection and not filter
falsepositives:
- Unknown
level: high