-
Notifications
You must be signed in to change notification settings - Fork 453
Improved detections based on telemetry data #4011
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Changes from all commits
4de6ada
7b544d4
22b504f
fc669a2
174b630
fb66723
e90dcef
775e5f8
7cfe367
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -14,7 +14,7 @@ search: |- | |
| | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes | ||
| WHERE `process_regsvr32` | ||
| AND | ||
| Processes.process="*/i*" | ||
| Processes.process="*/i*" AND NOT Processes.process="*Microsoft\\TeamsMeetingAddin*" | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Please add a note in the FP section about this and teams |
||
| BY Processes.action Processes.dest Processes.original_file_name | ||
| Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid | ||
| Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -4,15 +4,15 @@ version: 14 | |
| date: '2026-04-15' | ||
| author: Michael Haag, Splunk | ||
| status: production | ||
| type: TTP | ||
| type: Anomaly | ||
| description: The following analytic detects MSIExec spawning multiple discovery commands, such as Cmd.exe or PowerShell.exe. This behavior is identified using data from Endpoint Detection and Response (EDR) agents, focusing on process creation events where MSIExec is the parent process. This activity is significant because MSIExec typically does not spawn child processes other than itself, making this behavior highly suspicious. If confirmed malicious, an attacker could use these discovery commands to gather system information, potentially leading to further exploitation or lateral movement within the network. | ||
| data_source: | ||
| - Sysmon EventID 1 | ||
| - Windows Event Log Security 4688 | ||
| - CrowdStrike ProcessRollup2 | ||
| search: |- | ||
| | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes | ||
| WHERE Processes.parent_process_name=msiexec.exe Processes.process_name IN ("powershell.exe", "pwsh.exe","cmd.exe", "nltest.exe","ipconfig.exe","systeminfo.exe") | ||
| WHERE Processes.parent_process_name=msiexec.exe Processes.process_name IN ("powershell.exe", "pwsh.exe", "nltest.exe","ipconfig.exe","systeminfo.exe") | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can you add reasoning for the filter, so that people do not add it in the future without consideration. |
||
| BY Processes.action Processes.dest Processes.original_file_name | ||
| Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid | ||
| Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path | ||
|
|
@@ -43,10 +43,10 @@ rba: | |
| risk_objects: | ||
| - field: user | ||
| type: user | ||
| score: 50 | ||
| score: 30 | ||
| - field: dest | ||
| type: system | ||
| score: 50 | ||
| score: 30 | ||
| threat_objects: | ||
| - field: parent_process_name | ||
| type: parent_process_name | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -43,6 +43,7 @@ search: |- | |
| "*;LS*", | ||
| "*;S-1-5-19*" | ||
| ) | ||
| NOT Processes.process IN ("*McAfeeFramework*", "*mfefire*", "*mfemms*", "*mfevtp*", "*macmnsvc*", "*masvc*") | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Please add a note in the rule to make people aware about this filter. So for those who do not use McAfee products make the necessary changes if they want |
||
| BY Processes.action Processes.dest Processes.original_file_name | ||
| Processes.parent_process Processes.parent_process_exec | ||
| Processes.parent_process_guid Processes.parent_process_id | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did you want to keep the score 50 for this?