4.9 KiB
category: process_creation
ID: 2ff912e8-159f-4789-a2ef-761292b32a23
Content
Description
This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the process_creation category.
Event Source(s)
This section describes the event source(s) that are required to be collected in order to receive the events used by the process_creation category detection rules
Provider: Microsoft Windows Security Auditing
GUID: {54849625-5478-4994-a5ba-3e3b0328c30d}
Channel: Security
EventID: 4688
Provider: Microsoft-Windows-Sysmon
GUID: {5770385f-c22a-43e0-bf4c-06f5698ffbd9}
Channel: Microsoft-Windows-Sysmon/Operational
EventID: 1
Logging Setup
This section describes how to setup logging in your environment
Microsoft Windows Security Auditing
Process Creation
- Subcategory GUID:
{0CCE922B-69AE-11D9-BED3-505054503030} - Provider:
Microsoft Windows Security Auditing - Channel:
Security - Event Volume:
High - EventID(s):
4688
If you're using gpedit.msc or similar you can enable logging for this category by following the structure below
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit Process Creation
- Success and Failure
Alternatively you can enable logging via auditpol using the following command(s):
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
If you want to learn more about this sub-category. You can do so via MSDN - Learn More
Include Command-Line In Process Creation Events
If you're using gpedit.msc or similar you can enable logging for this category by following the structure below
- Computer Configuration
- Administrative Templates
- System
- Audit Process Creation
- Include Command Line In Process Creation Events
Microsoft-Windows-Sysmon
Process Creation
- Provider:
Microsoft-Windows-Sysmon - Channel:
Microsoft-Windows-Sysmon/Operational - Event Volume:
High - EventID(s):
1
To configure Sysmon process creation events you can follow the instructions below
- Download Sysmon
- Install Sysmon using an appropriate configuration. The configuration must include a
<ProcessCreate>element. We recommend the following configuration sysmonconfig-export.xml.
sysmon -i /path/to/config
Event Fields
Note
For rules using this category in SIGMA. Know that there is a mapping between
Sysmon EID 1fields andMicrosoft Windows Security Auditing EID: 4688. While you can use the fields ofEID 4688it's best to use the Sysmon ones.
Provider: Microsoft Windows Security Auditing / EventID: 4688
Expand
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- NewProcessId
- NewProcessName
- TokenElevationType
- ProcessId
- CommandLine
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- ParentProcessName
- MandatoryLabel
Provider: Microsoft-Windows-Sysmon / EventID: 1
Expand
- RuleName
- UtcTime
- ProcessGuid
- ProcessId
- Image
- FileVersion
- Description
- Product
- Company
- OriginalFileName
- CommandLine
- CurrentDirectory
- User
- LogonGuid
- LogonId
- TerminalSessionId
- IntegrityLevel
- Hashes
- ParentProcessGuid
- ParentProcessId
- ParentImage
- ParentCommandLine
- ParentUser