This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| event.code:4688 and winlog.event_data.TargetUserSid :"S-1-0-0" and not winlog.event_data.TargetUserName:*$ and | |
| not winlog.event_data.TargetUserName:- and not winlog.event_data.TargetUserName:"defaultuser100000" and | |
| not winlog.event_data.TargetUserName : ("LOCAL SERVICE" or "NETWORK SERVICE") and | |
| not winlog.event_data.TargetDomainName : ("NT Service" or "Font Driver Host") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id, process.entity_id with maxspan=1s | |
| [process where event.code : "10" and process.name : "sihost.exe" and | |
| winlog.event_data.CallTrace : "*CoreShellExtFramework*" and winlog.event_data.GrantedAccess : "0x40"] | |
| [process where event.code : "10" and process.name : "sihost.exe" and | |
| not winlog.event_data.GrantedAccess : ("0x*00", "0x1010", "0x1410", "0x40")] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| process where event.code : "10" and not process.executable : "?:\\Windows\\Explorer.exe" and | |
| winlog.event_data.CallTrace : "?:\\WINDOWS\\System32\\win32u.dll*" and not winlog.event_data.GrantedAccess : ("0x*00", "0x*10", "0x*01") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id with maxspan=5s | |
| [any where event.code : "4703" and winlog.event_data.EnabledPrivilegeList:"SeDebugPrivilege"] by winlog.event_data.ProcessName | |
| [process where event.code : "10" and not process.name in ("Procmon64.exe", "procexp64.exe")] by process.executable |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id with maxspan=5s | |
| [process where event.code : "10" and winlog.event_data.GrantedAccess:"0x1"] by winlog.event_data.TargetProcessGUID | |
| [process where event.code : "5" /* you can add process.name : ("seecurity-proc1", "security-proc2") */] by process.entity_id |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id with maxspan=5m | |
| [authentication where | |
| /* event 4624 need to be logged */ | |
| event.action == "logged-in" and event.outcome == "success" and | |
| /* authenticate locally using relayed kerberos TGS */ | |
| winlog.event_data.AuthenticationPackageName :"Kerberos" and winlog.logon.type == "Network" and | |
| source.ip == "127.0.0.1" and source.port > 0 and |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id with maxspan=1m | |
| [any where event.code : "5379" and winlog.event_data.TargetName : "Microsoft_Windows_Shell_ZipFolder*"] | |
| [process where event.action == "start" and process.executable : "?:\\Users\\*\\Appdata\\Local\\Temp\\Temp?_*" and process.parent.name : "explorer.exe"] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sequence by host.id with maxspan=1m | |
| [process where process.name : ("7zG.exe", "WinRAR.exe") and not process.args : "a"] by process.pid | |
| [registry where process.name : ("7zG.exe", "WinRAR.exe") and registry.value : "ShowPassword" and registry.data.strings : "0"] by process.pid | |
| [process where event.action == "start" and process.parent.name : ("7zG.exe", "WinRAR.exe")] by process.parent.pid |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 76f7247dcb2f7dfb50a21eb9fe35a55a | |
| fea98f3eb09ddfc5686d45c91ed887fd | |
| d3b8822c5107aaeb1704dcdea673eeb0 | |
| d4d738c7d917261c6b504de932fc36ec | |
| d0ee5895a471bdeafcb5a1d759ff3879 | |
| 759e2d7e3820770f2ed1e95f4207242f | |
| e641c2fb4b71b12e4f7abae53d89a5a8 | |
| 9bf5a424d33fc007310d18255e053986 | |
| e3ca32ebe9b538cd74bafeb6aa0440f5 | |
| 2ce0a4bc8db0f54d6b0b8d681f42bb5b |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| process where event.type in ("start", "process_started") and | |
| process.parent.name : ("winword.exe", "excel.exe", "outlook.exe", "powerpnt.exe") and | |
| /* u can add other dir traversal patterns here */ | |
| process.command_line : ("*../../../..*", "*..\\..\\..\\..*", "*..//..//..//..*") and | |
| process.executable : ("?:\\windows\\system32\\*.exe", "?:\\Windows\\SysWOW64\\*.exe") |