Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_susp_dir.yml
T
Nasreddine Bencherchali 12d187bc91 Update Ref+Selection 2
2022-07-11 17:48:40 +01:00

26 lines
703 B
YAML

title: Suspicious DIR Execution
id: 7c9340a9-e2ee-4e43-94c5-c54ebbea1006
status: experimental
description: Detects usage of the "dir" command that's part of windows batch/cmd to collect information about directories
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1217/T1217.md
author: frack113
date: 2021/12/13
modified: 2022/07/11
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'dir '
- ' /s'
- ' /b'
condition: selection
falsepositives:
- Unknown
level: low
tags:
- attack.discovery
- attack.t1217