Files
blue-team-tools/.github/workflows/known-FPs.csv
T
Nasreddine Bencherchali 35f102f8a0 Update known-FPs.csv
2022-08-31 11:40:39 +02:00

3.3 KiB

1RuleIdRuleNameMatchString
28e5e38e4-5350-4c0b-895a-e872ce0dd54fMsiexec Initiated Connection.*
3ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94Suspicious WSMAN Provider Image Loads.*
4db809f10-56ce-4420-8c86-d6a7d793c79cRaw Disk Access Using Illegitimate Toolspython-3
5db809f10-56ce-4420-8c86-d6a7d793c79cRaw Disk Access Using Illegitimate Toolstarget\.exe
696f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keyssharepointclient
796f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keysodopen
8e28a5a99-da44-436d-b7a0-2afc20a5f413Whoami ExecutionWindowsPowerShell
98ac03a65-6c84-4116-acad-dc1558ff7a77Sysmon Configuration Changesysmon-intense\.xml
108ac03a65-6c84-4116-acad-dc1558ff7a77Sysmon Configuration ChangeComputer: evtx-PC
114358e5a5-7542-4dcb-b9f3-87667371839bISO or Image Mount Indicator in Recent Files_Office_Professional_Plus_
1236480ae1-a1cb-4eaa-a0d6-29801d7e9142Renamed BinaryWinRAR
1373bba97f-a82d-42ce-b315-9182e76c57b1Imports Registry Key From a FileEvernote
146741916F-B4FA-45A0-8BF8-8249C702033AAdded Rule in Windows Firewall with Advanced Security\\Integration\\Integrator\.exe
1500bb5bd5-1379-4fcf-a965-a5b6f7478064Setting Change in Windows Firewall with Advanced SecurityLevel: 4 Task: 0
16162ab1e4-6874-4564-853c-53ec3ab8be01TeamViewer Remote SessionTeamViewer_Service\.exe
17cdc8da7d-c303-42f8-b08c-b4ab47230263Rundll32 Internet Connection20.49.150.241
18bef0bc5a-b9ae-425d-85c6-7b2d705980c6Python Initiated Connection151.101.64.223
199711de76-5d4f-4c50-a94f-21e4e8f8384dInstallation of TeamViewer DesktopTeamViewer_Desktop\.exe
2096f697b0-b499-4e5d-9908-a67bec11cdb6Removal of Potential COM Hijacking Registry Keystarget\.exe
219494479d-d994-40bf-a8b1-eea890237021Suspicious Add Scheduled Task ParentTeamViewer_\.exe
2281325ce1-be01-4250-944f-b4789644556fSuspicius Schtasks From Env Var FolderTVInstallRestore
236ea3bf32-9680-422d-9f50-e90716b12a66UAC Bypass Via WsresetEventType: DeleteKey
2443f487f0-755f-4c2a-bce7-d6d2eec2fcf8Suspicious Add Scheduled Task From User AppData TempTVInstallRestore
25c187c075-bb3e-4c62-b4fa-beae0ffc211fDeteled Rule in Windows Firewall with Advanced SecurityDropbox.*\\netsh\.exe
2669aeb277-f15f-4d2d-b32a-55e883609563Disabling Windows Event AuditingComputer: .*
27ac175779-025a-4f12-98b0-acdaeb77ea85PowerShell Script Run in AppData\\Evernote-
28cfeed607-6aa4-4bbd-9627-b637deb723c8New or Renamed User Account with '$' in Attribute 'SamAccountName'HomeGroupUser\$
297b449a5e-1db5-4dd0-a2dc-4e3a67282538Hidden Local User CreationHomeGroupUser\$
301f2b5353-573f-4880-8e33-7d04dcf97744Sysmon Configuration ModificationComputer: evtx-PC
31734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8Remote PowerShell Session Host Process (WinRM)WIN-FPV0DSIC9O6
32a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in ImageNinite\.exe
33349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command LineNinite\.exe
34a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in Imagetarget\.exe
35349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command Linetarget\.exe
36a96970af-f126-420d-90e1-d37bf25e50e1Use Short Name Path in Imageunzip\.exe
37349d891d-fef0-4fe4-bc53-eee623a15969Use Short Name Path in Command LineTeamViewer_\.exe
387a02e22e-b885-4404-b38b-1ddc7e65258aSuspicious Schtasks Schedule TypeTeamViewer_\.exe