Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_sysmon_exploitation.yml
T
Florian Roth 3278292559 fix: FPs
2022-11-10 15:01:09 +01:00

32 lines
984 B
YAML

title: Suspicious Sysmon as Execution Parent
id: 6d1058a4-407e-4f3a-a144-1968c11dc5c3
status: experimental
description: Detects suspicious process executions in which Sysmon itself is the parent of a process, which could be a sign of exploitation (e.g. CVE-2022-41120)
references:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120
- https://twitter.com/filip_dragovic/status/1590052248260055041
- https://twitter.com/filip_dragovic/status/1590104354727436290
author: Florian Roth
date: 2022/11/10
tag:
- attack.privilege_escalation
- attack.t1068
- cve.2022.41120
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage|endswith:
- '\Sysmon.exe'
- '\Sysmon64.exe'
filter:
Image:
- 'C:\Windows\Sysmon64.exe'
- 'C:\Windows\System32\conhost.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high