Replies: 4 comments 4 replies
-
This is the rule: https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_dctask64/ Are all of your alerts for the same executable name? You could add a filter to exclude it. |
Beta Was this translation helpful? Give feedback.
-
This is a problem with the rule -- the "Hashes" part is not being properly converted, so it's basically alerting on everything in your logs that doesn't have an image name of dctask64.exe. To see what I mean, use the Convert button at the bottom of Detection Logic to see the EQL query. @defensivedepth - is this one of the mapping changes on your current list? |
Beta Was this translation helpful? Give feedback.
-
If you use this search in Detections: "Hashes|contains" AND so_detection.language : "sigma" AND NOT "imphash" AND NOT "SHA256" There will appear 4 rules (in my case). I have tested all of them I have seen that the are not checking the HASHES. I guess that all the other rules using "Hashes|contains" have a different way to detail the HASH to check. They use this sintax:
I hope this will help. |
Beta Was this translation helpful? Give feedback.
-
In this link: https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_renamed_dctask64/ The Hashes are declared with the comment I have change the rule this way:
What do you think? Could this be the answer? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi again... I'm a bit desperate.
I'm having 100.000 alerts per hour of this alert: "Renamed ZOHO Dctask64 Execution"
I'm investigating and it's supposed to be related to Endpoint and elastic fleet bug.. I guess... but not sure.
I have searched in the forum and all internet and I haven't found an explanation or any solution.
I'll thank any help
Best regards,
Carlos
Beta Was this translation helpful? Give feedback.
All reactions