Files
blue-team-tools/documentation/logsource-guides/windows/category/process_creation.md
T
2023-04-21 15:00:34 +02:00

4.9 KiB

category: process_creation

ID: 2ff912e8-159f-4789-a2ef-761292b32a23

Content

Expand

Description

This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the process_creation category.

Event Source(s)

This section describes the event source(s) that are required to be collected in order to receive the events used by the process_creation category detection rules

Provider: Microsoft Windows Security Auditing
GUID: {54849625-5478-4994-a5ba-3e3b0328c30d}
Channel: Security
EventID: 4688
Provider: Microsoft-Windows-Sysmon
GUID: {5770385f-c22a-43e0-bf4c-06f5698ffbd9}
Channel: Microsoft-Windows-Sysmon/Operational
EventID: 1

Logging Setup

This section describes how to setup logging in your environment

Microsoft Windows Security Auditing

Process Creation

  • Subcategory GUID: {0CCE922B-69AE-11D9-BED3-505054503030}
  • Provider: Microsoft Windows Security Auditing
  • Channel: Security
  • Event Volume: High
  • EventID(s):
    • 4688

If you're using gpedit.msc or similar you can enable logging for this category by following the structure below

- Computer Configuration
    - Windows Settings
        - Security Settings
            - Advanced Audit Policy Configuration
                - System Audit Policies - Local Group Policy Object
                    - Detailed Tracking
                        - Audit Process Creation
                            - Success and Failure

Alternatively you can enable logging via auditpol using the following command(s):

# Enable Success audit Only
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable

# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable

If you want to learn more about this sub-category. You can do so via MSDN - Learn More

Include Command-Line In Process Creation Events

If you're using gpedit.msc or similar you can enable logging for this category by following the structure below

- Computer Configuration
    - Administrative Templates
        - System
            - Audit Process Creation
                - Include Command Line In Process Creation Events

Microsoft-Windows-Sysmon

Process Creation

  • Provider: Microsoft-Windows-Sysmon
  • Channel: Microsoft-Windows-Sysmon/Operational
  • Event Volume: High
  • EventID(s):
    • 1

To configure Sysmon process creation events you can follow the instructions below

  • Download Sysmon
  • Install Sysmon using an appropriate configuration. The configuration must include a <ProcessCreate> element. We recommend the following configuration sysmonconfig-export.xml.
sysmon -i /path/to/config

Event Fields

Note

For rules using this category in SIGMA. Know that there is a mapping between Sysmon EID 1 fields and Microsoft Windows Security Auditing EID: 4688. While you can use the fields of EID 4688 it's best to use the Sysmon ones.

Provider: Microsoft Windows Security Auditing / EventID: 4688

Expand
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- NewProcessId
- NewProcessName
- TokenElevationType
- ProcessId
- CommandLine
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- ParentProcessName
- MandatoryLabel

Provider: Microsoft-Windows-Sysmon / EventID: 1

Expand
- RuleName
- UtcTime
- ProcessGuid
- ProcessId
- Image
- FileVersion
- Description
- Product
- Company
- OriginalFileName
- CommandLine
- CurrentDirectory
- User
- LogonGuid
- LogonId
- TerminalSessionId
- IntegrityLevel
- Hashes
- ParentProcessGuid
- ParentProcessId
- ParentImage
- ParentCommandLine
- ParentUser