Skip to content

Commit d4132f7

Browse files
Merge pull request #20 from Neo23x0/patch-2
Removed duplicate, added new network rules
2 parents f4dafc2 + ac67f07 commit d4132f7

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

sysmonconfig-export.xml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,19 @@
186186
<Image condition="image">sc.exe</Image> <!--Microsoft:Windows: Remotely change Windows service settings from command line | Credit @ion-storm -->
187187
<Image condition="image">wmic.exe</Image> <!--Microsoft:WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
188188
<Image condition="image">wscript.exe</Image> <!--Microsoft:WindowsScriptingHost: | Credit @arekfurt -->
189-
<Image condition="image">tor.exe</Image> <!--Tor [ https://www.hybrid-analysis.com/sample/800bf028a23440134fc834efc5c1e02cc70f05b2e800bbc285d7c92a4b126b1c?environmentId=100 ] -->
189+
<!--Relevant 3rd Party Tools: Remote Access-->
190+
<Image condition="image">psexec.exe</Image> <!--Sysinternals:PsExec client side | Credit @Cyb3rOps -->
191+
<Image condition="image">psexesvc.exe</Image> <!--Sysinternals:PsExec server side | Credit @Cyb3rOps -->
192+
<Image condition="image">vnc.exe</Image> <!-- VNC client | Credit @Cyb3rOps -->
193+
<Image condition="image">vncviewer.exe</Image> <!-- VNC client | Credit @Cyb3rOps -->
194+
<Image condition="image">vncservice.exe</Image> <!-- VNC server | Credit @Cyb3rOps -->
195+
<Image condition="image">winexesvc.exe</Image> <!-- Winexe service executable | Credit @Cyb3rOps -->
196+
<Image condition="image">\AA_v</Image> <!-- Ammy Admin service executable (e.g. AA_v3.0.exe AA_v3.5.exe ) | Credit @Cyb3rOps -->
197+
<!-- Often exploited services -->
198+
<Image condition="image">omniinet.exe</Image> <!-- HP Data Protector https://www.cvedetails.com/vulnerability-list/vendor_id-10/product_id-20499/HP-Data-Protector.html | Credit @Cyb3rOps -->
199+
<Image condition="image">hpsmhd.exe</Image> <!-- HP System Management Homepage https://www.cvedetails.com/vulnerability-list/vendor_id-10/product_id-7244/HP-System-Management-Homepage.html | Credit @Cyb3rOps -->
200+
<!--Malware related-->
201+
<Image condition="image">tor.exe</Image> <!--Tor [ https://www.hybrid-analysis.com/sample/800bf028a23440134fc834efc5c1e02cc70f05b2e800bbc285d7c92a4b126b1c?environmentId=100 ] -->
190202
<!--Ports: Suspicious-->
191203
<DestinationPort condition="is">22</DestinationPort> <!--SSH protocol-->
192204
<DestinationPort condition="is">23</DestinationPort> <!--Telnet protocol-->

0 commit comments

Comments
 (0)