Skip to content

Commit cb81745

Browse files
committed
introduce new conditions to config and make use of 'not begin with' in ProcessAccess
1 parent 58d6cc5 commit cb81745

1 file changed

Lines changed: 16 additions & 3 deletions

File tree

sysmonconfig-export.xml

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@
5050
- "Image" is a technical term for a compiled binary file like an EXE or DLL. Also, it can match just the filename, or entire path.
5151
- "ProcessGuid" and "LoginGuid" are not random, they contain some embedded information. https://gist.github.com/mattifestation/0102042160c9a60b2b847378c0ef70b4
5252
53-
FILTERING: Filter conditions available for use are: is,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,less than,more than,image
53+
FILTERING: Filter conditions available for use are: is,is any,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,not begin with,not end with,less than,more than,image
5454
- The "image" filter is usable on any field. Same as "is" but can either match entire string, or only the text after last "\". Credit: @mattifestation
5555
5656
-->
@@ -485,14 +485,27 @@
485485
<!--DATA: UtcTime, SourceProcessGuid, SourceProcessId, SourceThreadId, SourceImage, TargetProcessGuid, TargetProcessId, TargetImage, GrantedAccess, CallTrace-->
486486
<RuleGroup name="" groupRelation="or">
487487
<ProcessAccess onmatch="include">
488-
<CallTrace condition="begin with">UNKNOWN</CallTrace> <!-- CobaltStrike BOF using NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 -->
488+
<!-- CobaltStrike BOF using OpenProcess/NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 -->
489489
<Rule groupRelation="and">
490-
<TargetImage name="lsass.exe access" condition="end with">lsass.exe</TargetImage>
490+
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\ntdll.dll</CallTrace>
491+
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\win32u.dll</CallTrace>
492+
<CallTrace condition="not begin with">C:\Windows\SYSTEM32\wow64win.dll</CallTrace>
493+
</Rule>
494+
<CallTrace condition="begin with">UNKNOWN</CallTrace>
495+
<!-- lsass.exe access with critical permission -->
496+
<Rule groupRelation="and">
497+
<TargetImage condition="end with">lsass.exe</TargetImage>
491498
<GrantedAccess condition="contains any">0x40,0x1000,0x1010,0x1038,0x1410,0x1418,0x1438,0x143a,0x100000,0x1f0fff,0x1f1fff,0x1f2fff,0x1f3fff,0x1fffff</GrantedAccess> <!--0x1400 too noisy-->
492499
</Rule>
493500
</ProcessAccess>
494501
</RuleGroup>
495502

503+
<RuleGroup name="" groupRelation="or">
504+
<ProcessAccess onmatch="exclude">
505+
<!-- NOTE: Potentially noisy PorcessAccess Events in your environment can be excluded here -->
506+
</ProcessAccess>
507+
</RuleGroup>
508+
496509
<!--SYSMON EVENT ID 11 : FILE CREATED [FileCreate]-->
497510
<!--EVENT 11: "File created"-->
498511
<!--NOTE: Other filesystem "minifilters" can make it appear to Sysmon that some files are being written twice. This is not a Sysmon issue, per Mark Russinovich.-->

0 commit comments

Comments
 (0)