Skip to content

Commit 5baa0e7

Browse files
sentinel json file updated with new rule logic for process hollowing.
1 parent f0f1c1f commit 5baa0e7

File tree

2 files changed

+1
-66
lines changed

2 files changed

+1
-66
lines changed

detections/T1093_Process_Holoowing.txt

Lines changed: 0 additions & 65 deletions
This file was deleted.

detections/sentinel_attack_rules.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -863,7 +863,7 @@
863863
"description": "Checks for execution of MITRE ATT&CK T1093",
864864
"severity": "High",
865865
"enabled": "true",
866-
"query": "Sysmon | where EventID == 1 and (process_path contains \"smss.exe\" and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"csrss.exe\" and (process_parent_command_line !contains \"smss.exe\" or process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"wininit.exe\"and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"winlogon.exe\" and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"lsass.exe\" and process_parent_command_line !contains \"wininit.exe\") or (process_path contains \"LogonUI.exe\" and (process_parent_command_line !contains \"winlogon.exe\" or process_parent_command_line !contains \"wininit.exe\")) or (process_path contains \"services.exe\" and process_parent_command_line !contains \"wininit.exe\") or (process_path contains \"spoolsv.exe\" and process_parent_command_line !contains \"services.exe\") or (process_path contains \"taskhost.exe\" and (process_parent_command_line !contains \"services.exe\" or process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"taskhostw.exe\" and (process_parent_command_line !contains \"services.exe\" or process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"userinit.exe\" and (process_parent_command_line !contains \"dwm.exe\" or process_parent_command_line !contains \"winlogon.exe\"))",
866+
"query": "Sysmon | where EventID == 1 and ((process_path contains \"smss.exe\" andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"csrss.exe\" and (process_parent_command_line !contains \"smss.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"wininit.exe\"andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"winlogon.exe\" andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"lsass.exe\" andprocess_parent_command_line !contains \"wininit.exe\") or (process_path contains \"LogonUI.exe\" and (process_parent_command_line !contains \"winlogon.exe\" andprocess_parent_command_line !contains \"wininit.exe\")) or (process_path contains \"services.exe\" andprocess_parent_command_line !contains \"wininit.exe\") or (process_path contains \"spoolsv.exe\" andprocess_parent_command_line !contains \"services.exe\") or (process_path contains \"taskhost.exe\" and (process_parent_command_line !contains \"services.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"taskhostw.exe\" and (process_parent_command_line !contains \"services.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"userinit.exe\" and (process_parent_command_line !contains \"dwm.exe\" orprocess_parent_command_line !contains \"winlogon.exe\"))) | extend AccountCustomEntity = UserName | extend HostCustomEntity = Computer | extend FileHashCustomEntity = hash_sha256",
867867
"queryFrequency": "1H",
868868
"queryPeriod": "1H",
869869
"triggerOperator": "GreaterThan",

0 commit comments

Comments
 (0)