Skip to content

Commit d4db7a7

Browse files
add regression test
1 parent 864fa81 commit d4db7a7

File tree

4 files changed

+79
-0
lines changed

4 files changed

+79
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"Event": {
3+
"#attributes": {
4+
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
5+
},
6+
"System": {
7+
"Provider": {
8+
"#attributes": {
9+
"Name": "Microsoft-Windows-Sysmon",
10+
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
11+
}
12+
},
13+
"EventID": 1,
14+
"Version": 5,
15+
"Level": 4,
16+
"Task": 1,
17+
"Opcode": 0,
18+
"Keywords": "0x8000000000000000",
19+
"TimeCreated": {
20+
"#attributes": {
21+
"SystemTime": "2025-12-04T07:01:44.982629Z"
22+
}
23+
},
24+
"EventRecordID": 27923,
25+
"Correlation": null,
26+
"Execution": {
27+
"#attributes": {
28+
"ProcessID": 3116,
29+
"ThreadID": 1656
30+
}
31+
},
32+
"Channel": "Microsoft-Windows-Sysmon/Operational",
33+
"Computer": "swachchhanda",
34+
"Security": {
35+
"#attributes": {
36+
"UserID": "S-1-5-18"
37+
}
38+
}
39+
},
40+
"EventData": {
41+
"RuleName": "-",
42+
"UtcTime": "2025-12-04 07:01:44.963",
43+
"ProcessGuid": "0197231E-31D8-6931-7209-000000000900",
44+
"ProcessId": 13752,
45+
"Image": "C:\\Windows\\System32\\cmd.exe",
46+
"FileVersion": "10.0.26100.2454 (WinBuild.160101.0800)",
47+
"Description": "Windows Command Processor",
48+
"Product": "Microsoft® Windows® Operating System",
49+
"Company": "Microsoft Corporation",
50+
"OriginalFileName": "Cmd.Exe",
51+
"CommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\" /c \"start /b /min C:\\Users\\xodih\\Music\\random.vbs\"",
52+
"CurrentDirectory": "C:\\WINDOWS\\system32\\",
53+
"User": "swachchhanda\\xodih",
54+
"LogonGuid": "0197231E-BBFB-692F-3C8C-050000000000",
55+
"LogonId": "0x58c3c",
56+
"TerminalSessionId": 1,
57+
"IntegrityLevel": "Medium",
58+
"Hashes": "MD5=352B525E9C26CB92693899528FE007C2,SHA256=1F1D918EC49E0B7C59B704FF412E1A6E224DA81C08CDA657E1CB482ABAAC146C,IMPHASH=94F3EFC2DF40ECD7229B904540DD83CF",
59+
"ParentProcessGuid": "0197231E-BBFF-692F-8200-000000000900",
60+
"ParentProcessId": 5200,
61+
"ParentImage": "C:\\Windows\\explorer.exe",
62+
"ParentCommandLine": "C:\\WINDOWS\\Explorer.EXE",
63+
"ParentUser": "swachchhanda\\xodih"
64+
}
65+
}
66+
}
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
id: d813db34-f7f0-4713-a419-b491701aa1d1
2+
description: N/A
3+
date: 2025-12-04
4+
author: Swachchhanda Shrawan Poudel (Nextron Systems)
5+
rule_metadata:
6+
- id: 5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d
7+
title: Cmd Launched with Hidden Start Flags to Suspicious Targets
8+
regression_tests_info:
9+
- name: Positive Detection Test
10+
type: evtx
11+
provider: Microsoft-Windows-Sysmon
12+
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.evtx

rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,3 +76,4 @@ falsepositives:
7676
- Legitimate administrative scripts running from temporary folders.
7777
- Niche software updaters utilizing hidden batch files in ProgramData.
7878
level: high
79+
regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/info.yml

0 commit comments

Comments
 (0)