|
50 | 50 | - "Image" is a technical term for a compiled binary file like an EXE or DLL. Also, it can match just the filename, or entire path. |
51 | 51 | - "ProcessGuid" and "LoginGuid" are not random, they contain some embedded information. https://gist.github.com/mattifestation/0102042160c9a60b2b847378c0ef70b4 |
52 | 52 |
|
53 | | - FILTERING: Filter conditions available for use are: is,is any,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,not begin with,not end with,less than,more than,image |
| 53 | + FILTERING: Filter conditions available for use are: is,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,less than,more than,image |
54 | 54 | - The "image" filter is usable on any field. Same as "is" but can either match entire string, or only the text after last "\". Credit: @mattifestation |
55 | 55 |
|
56 | 56 | --> |
57 | 57 |
|
58 | | -<Sysmon schemaversion="4.70"> |
| 58 | +<Sysmon schemaversion="4.50"> |
59 | 59 | <!--SYSMON META CONFIG--> |
60 | 60 | <HashAlgorithms>md5,sha256,IMPHASH</HashAlgorithms> <!-- Both MD5 and SHA256 are the industry-standard algorithms. Remove IMPHASH if you do not use DLL import fingerprinting. --> |
61 | 61 | <CheckRevocation/> <!-- Check loaded drivers, log if their code-signing certificate has been revoked, in case malware stole one to sign a kernel driver --> |
|
486 | 486 | <RuleGroup name="" groupRelation="or"> |
487 | 487 | <ProcessAccess onmatch="include"> |
488 | 488 | <!-- CobaltStrike BOF using OpenProcess/NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 --> |
489 | | - <Rule groupRelation="and"> |
490 | | - <CallTrace condition="not begin with">C:\Windows\SYSTEM32\ntdll.dll</CallTrace> |
491 | | - <CallTrace condition="not begin with">C:\Windows\SYSTEM32\win32u.dll</CallTrace> |
492 | | - <CallTrace condition="not begin with">C:\Windows\SYSTEM32\wow64win.dll</CallTrace> |
493 | | - </Rule> |
494 | 489 | <CallTrace condition="begin with">UNKNOWN</CallTrace> |
495 | | - <!-- Inject AMSI Bypass via CobaltStrike BOF Ref: https://github.com/boku7/injectAmsiBypass --> |
| 490 | + <!-- Typical ProcessAccess Pattern of CobaltStrike BOF Ref: e.g. https://github.com/boku7/injectAmsiBypass --> |
496 | 491 | <Rule groupRelation="and"> |
497 | 492 | <CallTrace condition="contains">UNKNOWN</CallTrace> |
498 | | - <GrantedAccess condition="contains any">0x1028</GrantedAccess> |
| 493 | + <GrantedAccess condition="contains any">0x1028;0x1fffff</GrantedAccess> |
499 | 494 | </Rule> |
500 | 495 | <!-- lsass.exe access with critical permission --> |
501 | 496 | <Rule groupRelation="and"> |
502 | 497 | <TargetImage condition="end with">lsass.exe</TargetImage> |
503 | | - <GrantedAccess condition="contains any">0x40,0x1000,0x1010,0x1038,0x1410,0x1418,0x1438,0x143a,0x100000,0x1f0fff,0x1f1fff,0x1f2fff,0x1f3fff,0x1fffff</GrantedAccess> <!--0x1400 too noisy--> |
| 498 | + <GrantedAccess condition="contains any">0x40;0x1000;0x1010;0x1038;0x1410;0x1418;0x1438;0x143a;0x100000;0x1f0fff;0x1f1fff;0x1f2fff;0x1f3fff;0x1fffff</GrantedAccess> <!--0x1400 too noisy--> |
504 | 499 | </Rule> |
505 | 500 | <!-- LittleCorporal generated MalDoc Ref: https://github.com/connormcgarr/LittleCorporal --> |
506 | 501 | <Rule groupRelation="and"> |
|
0 commit comments