Files
blue-team-tools/.github/workflows/known-FPs.csv
T
2022-12-23 20:50:38 +01:00

4.2 KiB

1RuleIdRuleNameMatchString
28e5e38e4-5350-4c0b-895a-e872ce0dd54fMsiexec Initiated Connection.*
3ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94Suspicious WSMAN Provider Image Loads.*
4db809f10-56ce-4420-8c86-d6a7d793c79cRaw Disk Access Using Illegitimate Toolspython-3
5db809f10-56ce-4420-8c86-d6a7d793c79cRaw Disk Access Using Illegitimate Toolstarget\.exe
696f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keyssharepointclient
796f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keysodopen
81277f594-a7d1-4f28-a2d3-73af5cbeab43Windows Shell File Write to Suspicious FolderComputer: Agamemnon
9e28a5a99-da44-436d-b7a0-2afc20a5f413Whoami ExecutionWindowsPowerShell
108ac03a65-6c84-4116-acad-dc1558ff7a77Sysmon Configuration Changesysmon-intense\.xml
118ac03a65-6c84-4116-acad-dc1558ff7a77Sysmon Configuration ChangeComputer: (evtx-PC|Agamemnon)
124358e5a5-7542-4dcb-b9f3-87667371839bISO or Image Mount Indicator in Recent Files_Office_Professional_Plus_
1336480ae1-a1cb-4eaa-a0d6-29801d7e9142Renamed BinaryWinRAR
1473bba97f-a82d-42ce-b315-9182e76c57b1Imports Registry Key From a FileEvernote
156741916F-B4FA-45A0-8BF8-8249C702033AAdded Rule in Windows Firewall with Advanced Security\\Integration\\Integrator\.exe
1600bb5bd5-1379-4fcf-a965-a5b6f7478064Setting Change in Windows Firewall with Advanced SecurityLevel: 4 Task: 0
17162ab1e4-6874-4564-853c-53ec3ab8be01TeamViewer Remote SessionTeamViewer(_Service)?\.exe
18cdc8da7d-c303-42f8-b08c-b4ab47230263Rundll32 Internet Connection20\.49\.150\.241
19bef0bc5a-b9ae-425d-85c6-7b2d705980c6Python Initiated Connection151\.101\.64\.223
209711de76-5d4f-4c50-a94f-21e4e8f8384dInstallation of TeamViewer DesktopTeamViewer_Desktop\.exe
2196f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keystarget\.exe
229494479d-d994-40bf-a8b1-eea890237021Suspicious Add Scheduled Task ParentTeamViewer_\.exe
2381325ce1-be01-4250-944f-b4789644556fSuspicius Schtasks From Env Var FolderTVInstallRestore
246ea3bf32-9680-422d-9f50-e90716b12a66UAC Bypass Via WsresetEventType: DeleteKey
2543f487f0-755f-4c2a-bce7-d6d2eec2fcf8Suspicious Add Scheduled Task From User AppData TempTVInstallRestore
26c187c075-bb3e-4c62-b4fa-beae0ffc211fDeteled Rule in Windows Firewall with Advanced SecurityDropbox.*\\netsh\.exe
2769aeb277-f15f-4d2d-b32a-55e883609563Disabling Windows Event AuditingComputer: .*
28ac175779-025a-4f12-98b0-acdaeb77ea85PowerShell Script Run in AppData\\Evernote-
29cfeed607-6aa4-4bbd-9627-b637deb723c8New or Renamed User Account with '$' in Attribute 'SamAccountName'HomeGroupUser\$
307b449a5e-1db5-4dd0-a2dc-4e3a67282538Hidden Local User CreationHomeGroupUser\$
311f2b5353-573f-4880-8e33-7d04dcf97744Sysmon Configuration ModificationComputer: evtx-PC
32734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8Remote PowerShell Session Host Process (WinRM)WIN-FPV0DSIC9O6
33734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8Remote PowerShell Session Host Process (WinRM)Computer: Agamemnon
34a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in ImageNinite\.exe
35349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command LineNinite\.exe
36a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in Imagetarget\.exe
37349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command Linetarget\.exe
38a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in Imageunzip\.exe
39349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command LineTeamViewer_\.exe
407a02e22e-b885-4404-b38b-1ddc7e65258aSuspicious Schtasks Schedule TypeTeamViewer_\.exe
41949f1ffb-6e85-4f00-ae1e-c3c5b190d605Explorer Process Tree BreakComputer: Agamemnon
42fdbf0b9d-0182-4c43-893b-a1eaab92d085Newly Registered Protocol Handler.*
43100ef69e-3327-481c-8e5c-6d80d9507556System Eventlog ClearedComputer: WIN-06FB45IHQ35
4452a85084-6989-40c3-8f32-091e12e17692Suspicious Usage of CVE_2021_34484 or CVE 2022_21919Computer: Agamemnon
45573df571-a223-43bc-846e-3f98da481ecaCopy a File Downloaded From Internet7z\.exe
4637774c23-25a1-4adb-bb6d-8bb9fd59c0f8Image Load of VSS Dll by Uncommon ExecutableSetupFrontEnd\.exe
471a31b18a-f00c-4061-9900-f735b96c99fcRemote Access Tool Services Have Been Installed - SystemServiceName: TeamViewer
48c8b00925-926c-47e3-beea-298fd563728eRemote Access Tool Services Have Been Installed - SecurityServiceName: TeamViewer