[Rule Tuning] Suspicious Process Execution via Renamed PsExec Executable (#502)

* Converted suspicious execution via psexec to EQL

* adjusted procname

* eql syntax

* ecs_version
This commit is contained in:
Samirbous
2020-12-08 17:27:16 +01:00
committed by GitHub
parent 63759a4bf4
commit 35ee818854
@@ -11,20 +11,18 @@ evade detection.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-endpoint.events.*"]
language = "kuery"
language = "eql"
license = "Elastic License"
name = "Suspicious Process Execution via Renamed PsExec Executable"
risk_score = 47
rule_id = "e2f9fdf5-8076-45ad-9427-41e0e03dc9c2"
severity = "medium"
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Execution"]
type = "query"
type = "eql"
query = '''
event.category:process and event.type:(start or process_started) and
process.pe.original_file_name:(psexesvc.exe or PSEXESVC.exe) and
process.parent.name:services.exe and
not process.name:(psexesvc.exe or PSEXESVC.exe)
process where event.type in ("start", "process_started", "info") and
process.pe.original_file_name : "psexesvc.exe" and not process.name : "PSEXESVC.exe"
'''