Skip to content

Commit 3658370

Browse files
Update sentinel_attack_rules.json
"and" instead of "or". Added required spaces as well.
1 parent 115cb99 commit 3658370

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

detections/sentinel_attack_rules.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -863,7 +863,7 @@
863863
"description": "Checks for execution of MITRE ATT&CK T1093",
864864
"severity": "High",
865865
"enabled": "true",
866-
"query": "Sysmon | where EventID == 1 and ((process_path contains \"smss.exe\" andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"csrss.exe\" and (process_parent_command_line !contains \"smss.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"wininit.exe\"andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"winlogon.exe\" andprocess_parent_command_line !contains \"smss.exe\") or (process_path contains \"lsass.exe\" andprocess_parent_command_line !contains \"wininit.exe\") or (process_path contains \"LogonUI.exe\" and (process_parent_command_line !contains \"winlogon.exe\" andprocess_parent_command_line !contains \"wininit.exe\")) or (process_path contains \"services.exe\" andprocess_parent_command_line !contains \"wininit.exe\") or (process_path contains \"spoolsv.exe\" andprocess_parent_command_line !contains \"services.exe\") or (process_path contains \"taskhost.exe\" and (process_parent_command_line !contains \"services.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"taskhostw.exe\" and (process_parent_command_line !contains \"services.exe\" andprocess_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"userinit.exe\" and (process_parent_command_line !contains \"dwm.exe\" orprocess_parent_command_line !contains \"winlogon.exe\"))) | extend AccountCustomEntity = UserName | extend HostCustomEntity = Computer | extend FileHashCustomEntity = hash_sha256",
866+
"query": "Sysmon | where EventID == 1 and ((process_path contains \"smss.exe\" and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"csrss.exe\" and (process_parent_command_line !contains \"smss.exe\" and process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"wininit.exe\" and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"winlogon.exe\" and process_parent_command_line !contains \"smss.exe\") or (process_path contains \"lsass.exe\" and process_parent_command_line !contains \"wininit.exe\") or (process_path contains \"LogonUI.exe\" and (process_parent_command_line !contains \"winlogon.exe\" and process_parent_command_line !contains \"wininit.exe\")) or (process_path contains \"services.exe\" and process_parent_command_line !contains \"wininit.exe\") or (process_path contains \"spoolsv.exe\" and process_parent_command_line !contains \"services.exe\") or (process_path contains \"taskhost.exe\" and (process_parent_command_line !contains \"services.exe\" and process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"taskhostw.exe\" and (process_parent_command_line !contains \"services.exe\" and process_parent_command_line !contains \"svchost.exe\")) or (process_path contains \"userinit.exe\" and (process_parent_command_line !contains \"dwm.exe\" and process_parent_command_line !contains \"winlogon.exe\"))) | extend AccountCustomEntity = UserName | extend HostCustomEntity = Computer | extend FileHashCustomEntity = hash_sha256",
867867
"queryFrequency": "1H",
868868
"queryPeriod": "1H",
869869
"triggerOperator": "GreaterThan",
@@ -1522,4 +1522,4 @@
15221522
"suppressionEnabled": "false"
15231523
}
15241524
]
1525-
}
1525+
}

0 commit comments

Comments
 (0)