Skip to content

Commit ca24571

Browse files
author
Patrick Bareiss
committed
bug fix
1 parent 47fdfe1 commit ca24571

3 files changed

+2
-11
lines changed

data_sources/powershell_script_block_logging_4104.yml

-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,6 @@ output_fields:
7070
- signature_id
7171
- user_id
7272
- vendor_product
73-
- EventID
7473
- Guid
7574
- Opcode
7675
- Name

detections/endpoint/windows_known_abused_dll_loaded_suspiciously.yml

-3
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,6 @@ rba:
6161
- field: dest
6262
type: system
6363
score: 10
64-
- field: user
65-
type: user
66-
score: 10
6764
threat_objects: []
6865
tags:
6966
analytic_story:

detections/endpoint/windows_powershell_script_block_with_malicious_string.yml

+2-7
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ description: The following analytic detects the execution of multiple offensive
99
data_source:
1010
- Powershell Script Block Logging 4104
1111
search: |-
12-
`powershell` ScriptBlockText EventCode=4104
13-
| stats count min(_time) as firstTime max(_time) as lastTime list(ScriptBlockText) as command by dest signature
14-
signature_id user_id vendor_product EventID Guid Opcode Name Path ProcessID ScriptBlockId ScriptBlockText
12+
`powershell` ScriptBlockText=* EventCode=4104
13+
| stats count min(_time) as firstTime max(_time) as lastTime list(ScriptBlockText) as command values(Guid) as Guid values(Opcode) as Opcode values(Name) as Name values(Path) as Path values(ProcessID) as ProcessID values(ScriptBlockId) as ScriptBlockId values(ScriptBlockText) as ScriptBlockText by dest signature signature_id user_id vendor_product
1514
| eval command = mvjoin(command,"\n")
1615
| lookup malicious_powershell_strings command
1716
| where isnotnull(match)
@@ -34,10 +33,6 @@ drilldown_searches:
3433
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
3534
earliest_offset: $info_min_time$
3635
latest_offset: $info_max_time$
37-
- name: Investigate PowerShell on $dest$
38-
search: '`powershell` ScriptBlockText EventCode=4104 Computer=$dest|s$ "*$match$*"'
39-
earliest_offset: $info_min_time$
40-
latest_offset: $info_max_time$
4136
rba:
4237
message: The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
4338
risk_objects:

0 commit comments

Comments
 (0)