|
50 | 50 | - "Image" is a technical term for a compiled binary file like an EXE or DLL. Also, it can match just the filename, or entire path. |
51 | 51 | - "ProcessGuid" and "LoginGuid" are not random, they contain some embedded information. https://gist.github.com/mattifestation/0102042160c9a60b2b847378c0ef70b4 |
52 | 52 |
|
53 | | - FILTERING: Filter conditions available for use are: is,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,less than,more than,image |
| 53 | + FILTERING: Filter conditions available for use are: is,is any,is not,contains,contains any,contains all,excludes,excludes any,excludes all,begin with,end with,not begin with,not end with,less than,more than,image |
54 | 54 | - The "image" filter is usable on any field. Same as "is" but can either match entire string, or only the text after last "\". Credit: @mattifestation |
55 | 55 |
|
56 | 56 | --> |
|
485 | 485 | <!--DATA: UtcTime, SourceProcessGuid, SourceProcessId, SourceThreadId, SourceImage, TargetProcessGuid, TargetProcessId, TargetImage, GrantedAccess, CallTrace--> |
486 | 486 | <RuleGroup name="" groupRelation="or"> |
487 | 487 | <ProcessAccess onmatch="include"> |
488 | | - <CallTrace condition="begin with">UNKNOWN</CallTrace> <!-- CobaltStrike BOF using NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 --> |
| 488 | + <!-- CobaltStrike BOF using OpenProcess/NtOpenProcess Ref: https://medium.com/falconforce/falconfriday-direct-system-calls-and-cobalt-strike-bofs-0xff14-741fa8e1bdd6 --> |
489 | 489 | <Rule groupRelation="and"> |
490 | | - <TargetImage name="lsass.exe access" condition="end with">lsass.exe</TargetImage> |
| 490 | + <CallTrace condition="not begin with">C:\Windows\SYSTEM32\ntdll.dll</CallTrace> |
| 491 | + <CallTrace condition="not begin with">C:\Windows\SYSTEM32\win32u.dll</CallTrace> |
| 492 | + <CallTrace condition="not begin with">C:\Windows\SYSTEM32\wow64win.dll</CallTrace> |
| 493 | + </Rule> |
| 494 | + <CallTrace condition="begin with">UNKNOWN</CallTrace> |
| 495 | + <!-- lsass.exe access with critical permission --> |
| 496 | + <Rule groupRelation="and"> |
| 497 | + <TargetImage condition="end with">lsass.exe</TargetImage> |
491 | 498 | <GrantedAccess condition="contains any">0x40,0x1000,0x1010,0x1038,0x1410,0x1418,0x1438,0x143a,0x100000,0x1f0fff,0x1f1fff,0x1f2fff,0x1f3fff,0x1fffff</GrantedAccess> <!--0x1400 too noisy--> |
492 | 499 | </Rule> |
493 | 500 | </ProcessAccess> |
494 | 501 | </RuleGroup> |
495 | 502 |
|
| 503 | + <RuleGroup name="" groupRelation="or"> |
| 504 | + <ProcessAccess onmatch="exclude"> |
| 505 | + <!-- NOTE: Potentially noisy PorcessAccess Events in your environment can be excluded here --> |
| 506 | + </ProcessAccess> |
| 507 | + </RuleGroup> |
| 508 | + |
496 | 509 | <!--SYSMON EVENT ID 11 : FILE CREATED [FileCreate]--> |
497 | 510 | <!--EVENT 11: "File created"--> |
498 | 511 | <!--NOTE: Other filesystem "minifilters" can make it appear to Sysmon that some files are being written twice. This is not a Sysmon issue, per Mark Russinovich.--> |
|
0 commit comments