Files
blue-team-tools/rules/windows/sysmon/sysmon_file_block_executable.yml
T
github-actions[bot] 6b78144668 Merge PR #4942 from @nasbench - promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:14 +02:00

22 lines
659 B
YAML

title: Sysmon Blocked Executable
id: 23b71bc5-953e-4971-be4c-c896cda73fc2
status: test
description: Triggers on any Sysmon "FileBlockExecutable" event, which indicates a violation of the configured block policy
references:
- https://medium.com/@olafhartong/sysmon-14-0-fileblockexecutable-13d7ba3dff3e
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/08/16
modified: 2023/09/16
tags:
- attack.defense_evasion
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 27 # this is fine, we want to match any FileBlockExecutable event
condition: selection
falsepositives:
- Unlikely
level: high