Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_susp_cmd.yml
T
frack113 4b82b00ae9 Sysmoneop CMd shell (#3760)
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2022-12-06 12:12:43 +01:00

36 lines
969 B
YAML

title: Suspicious Elevated System Shell
id: 178e615d-e666-498b-9630-9ed363038101
status: experimental
description: Detects when a shell program such as the windows Command Prompt or PowerShell is launched with system privileges.
references:
- https://github.com/Wh04m1001/SysmonEoP
author: frack113
date: 2022/12/05
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.execution
- attack.t1059
logsource:
product: windows
category: process_creation
detection:
selection_shell:
- Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
- '\cmd.exe'
- OriginalFileName:
- 'PowerShell.EXE'
- 'pwsh.dll'
- 'Cmd.Exe'
selection_user:
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
LogonId: '0x3e7'
condition: all of selection_*
falsepositives:
- Unknown
level: high