持续性可疑程序的执行编辑

通过查看进程谱系和命令行使用情况,识别可疑持久性程序(脚本、rundll32 等)的执行。

规则类型:eql

规则索引:

  • winlogbeat-*
  • logs-endpoint.events.process-*
  • logs-windows.sysmon_operational-*
  • endgame-*

严重程度:中等

风险评分: 47

运行频率:5 分钟

搜索索引的时间范围:now-9m(日期数学格式,另请参阅 其他回溯时间

每次执行的最大警报数: 100

参考:无

标签:

  • 域:终端
  • 操作系统:Windows
  • 用例:威胁检测
  • 战术:持久化
  • 数据源:Elastic Endgame
  • 数据源:Elastic Defend
  • 数据源:Sysmon

版本: 107

规则作者:

  • Elastic

规则许可证:Elastic 许可证 v2

规则查询编辑

/* userinit followed by explorer followed by early child process of explorer (unlikely to be launched interactively) within 1m */
sequence by host.id, user.name with maxspan=1m
  [process where host.os.type == "windows" and event.type == "start" and process.name : "userinit.exe" and process.parent.name : "winlogon.exe"]
  [process where host.os.type == "windows" and event.type == "start" and process.name : "explorer.exe"]
  [process where host.os.type == "windows" and event.type == "start" and process.parent.name : "explorer.exe" and
   /* add suspicious programs here */
   process.pe.original_file_name in ("cscript.exe",
                                     "wscript.exe",
                                     "PowerShell.EXE",
                                     "MSHTA.EXE",
                                     "RUNDLL32.EXE",
                                     "REGSVR32.EXE",
                                     "RegAsm.exe",
                                     "MSBuild.exe",
                                     "InstallUtil.exe") and
    /* add potential suspicious paths here */
    process.args : ("C:\\Users\\*", "C:\\ProgramData\\*", "C:\\Windows\\Temp\\*", "C:\\Windows\\Tasks\\*", "C:\\PerfLogs\\*", "C:\\Intel\\*")
   ]

框架:MITRE ATT&CKTM