Skip to content

Commit f4dafc2

Browse files
51: Add tor.exe
Change list: - Add tor.exe for network monitoring
1 parent cc2d839 commit f4dafc2

File tree

1 file changed

+7
-10
lines changed

1 file changed

+7
-10
lines changed

sysmonconfig-export.xml

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<!--
22
sysmon-config | A sysmon configuration focused on default high-quality event tracing and easy customization by the community
3-
Master version: 50 | Date: 2017-03-02
4-
Master author: @SwiftOnSecurity, with contributors also credited in-line or on Git.
3+
Master version: 51 | Date: 2017-03-14
4+
Master author: @SwiftOnSecurity, other contributors also credited in-line or on Git.
55
Master project: https://github.com/SwiftOnSecurity/sysmon-config
66
Master license: Creative Commons Attribution 4.0 | You may privatize, fork, edit, teach, publish, or deploy for commercial use - with attribution in the text.
77
@@ -186,18 +186,18 @@
186186
<Image condition="image">sc.exe</Image> <!--Microsoft:Windows: Remotely change Windows service settings from command line | Credit @ion-storm -->
187187
<Image condition="image">wmic.exe</Image> <!--Microsoft:WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
188188
<Image condition="image">wscript.exe</Image> <!--Microsoft:WindowsScriptingHost: | Credit @arekfurt -->
189-
<Image condition="image">powershell.exe</Image> <!--Microsoft:WindowsPowerShell: | Credit @Cyb3rOps -->
189+
<Image condition="image">tor.exe</Image> <!--Tor [ https://www.hybrid-analysis.com/sample/800bf028a23440134fc834efc5c1e02cc70f05b2e800bbc285d7c92a4b126b1c?environmentId=100 ] -->
190190
<!--Ports: Suspicious-->
191191
<DestinationPort condition="is">22</DestinationPort> <!--SSH protocol-->
192192
<DestinationPort condition="is">23</DestinationPort> <!--Telnet protocol-->
193-
<DestinationPort condition="is">25</DestinationPort> <!--SMTP email-->
193+
<DestinationPort condition="is">25</DestinationPort> <!--SMTP mail protocol-->
194194
<DestinationPort condition="is">3389</DestinationPort> <!--Microsoft:Windows:RDP-->
195195
<DestinationPort condition="is">5800</DestinationPort> <!--VNC protocol-->
196196
<DestinationPort condition="is">5900</DestinationPort> <!--VNC protocol-->
197197
<!--Ports: Proxy-->
198198
<DestinationPort condition="is">1080</DestinationPort> <!--Socks proxy port | Credit @ion-storm-->
199-
<DestinationPort condition="is">8080</DestinationPort> <!--Socks proxy port | Credit @ion-storm-->
200199
<DestinationPort condition="is">3128</DestinationPort> <!--Socks proyx port | Credit @ion-storm-->
200+
<DestinationPort condition="is">8080</DestinationPort> <!--Socks proxy port | Credit @ion-storm-->
201201
<!--Ports: Tor-->
202202
<DestinationPort condition="is">1723</DestinationPort> <!--Tor protocol | Credit @ion-storm-->
203203
<DestinationPort condition="is">4500</DestinationPort> <!--Tor protocol | Credit @ion-storm-->
@@ -270,10 +270,7 @@
270270
<!--SYSMON EVENT ID 10 : INTER-PROCESS ACCESS-->
271271
<!--DATA: UtcTime, SourceProcessGuid, SourceProcessId, SourceThreadId, SourceImage, TargetProcessGuid, TargetProcessId, TargetImage, GrantedAccess, CallTrace-->
272272
<ProcessAccess onmatch="include">
273-
<!--COMMENT: Monitor for processes accessing other process' memory. This can be valuable, but can cause massive event glut.
274-
Disabled by default since including even one entry here activates this component. Reward/performance decision.
275-
Encourage you to experiment with this feature yourself.-->
276-
<!--FUTURE WORK: Include mimikatz-specific events.-->
273+
<!--COMMENT: Monitor for processes accessing other process' memory. This can be valuable, but can cause a huge number of events.-->
277274
</ProcessAccess>
278275

279276
<!--SYSMON EVENT ID 11 : FILE CREATED-->
@@ -333,7 +330,6 @@
333330
<!--NOTE: "contains" works by finding the first letter, then matching the second, etc, so the first letters should be as low-occurance as possible.-->
334331
<!--NOTE: Windows writes hundreds or thousands of registry keys a minute, so just because you're not changing stuff, doesn't mean these rules aren't being run.-->
335332
<!--NOTE: You don't have to spend a lot of time worrying about this, CPUs are fast, but it's something to consider. Every rule and condition type has a cost.-->
336-
337333
<!--DATA: EventType, UtcTime, ProcessGuid, ProcessId, Image, TargetObject, Details, NewName-->
338334
<!--TECHNICAL: Possible prefixes are HKLM, HKCR, and HKEY_USERS-->
339335
<!--CRITICAL: Schema version 3.30 and higher use HKLM and HKEY_USERS and HKCR and CurrentControlSet instead of REGISTRY\MACHINE\ and \REGISTRY\USER\ and ControlSet001-->
@@ -417,6 +413,7 @@
417413
<TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify</TargetObject>
418414
<!--Windows Defender tampering | Credit @ion-storm -->
419415
<TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware</TargetObject>
416+
<TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiVirus</TargetObject>
420417
<TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring</TargetObject>
421418
<TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection</TargetObject>
422419
<TargetObject condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable</TargetObject>

0 commit comments

Comments
 (0)