Files
blue-team-tools/rules/windows/builtin/windefend/win_defender_amsi_trigger.yml
T
2022-03-16 14:16:10 +01:00

24 lines
554 B
YAML

title: Windows Defender AMSI Trigger Detected
id: ea9bf0fa-edec-4fb8-8b78-b119f2528186
description: Detects triggering of AMSI by Windows Defender.
date: 2020/09/14
modified: 2021/10/13
author: Bhabesh Raj
references:
- https://docs.microsoft.com/en-us/windows/win32/amsi/how-amsi-helps
status: stable
logsource:
product: windows
service: windefend
detection:
selection:
EventID: 1116
Source_Name: 'AMSI'
condition: selection
falsepositives:
- Unlikely
level: high
tags:
- attack.execution
- attack.t1059