Skip to content

Commit 6f27054

Browse files
fukusuketgithub-actions[bot]
authored andcommitted
Apply changes
1 parent 3f21bb9 commit 6f27054

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

data/Microsoft_Server/UsableRules.csv

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2014,6 +2014,10 @@ However, malicious actors may exploit these tools by renaming them to bypass det
20142014
Attackers may use Kali Linux WSL to leverage its penetration testing tools and capabilities for malicious purposes.
20152015
","3de98820-2d36-1706-4ba6-1dcac6f0a2db"
20162016
"Insecure Transfer Via Curl.EXE","medium","","process_creation","Detects execution of ""curl.exe"" with the ""--insecure"" flag.","4308f710-0e58-712f-6781-9323b7dc779e"
2017+
"OpenEDR Spawning Command Shell","medium","","process_creation","Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities.
2018+
This may indicate remote command execution through OpenEDR's remote management features, which could be legitimate administrative activity or potential abuse of the remote access tool.
2019+
Threat actors may leverage OpenEDR's remote shell capabilities to execute commands on compromised systems, facilitating lateral movement or other command-and-control operations.
2020+
","d171fc00-4320-d070-29e2-5576e7e2dcb0"
20172021
"Potentially Suspicious Execution Of Regasm/Regsvcs With Uncommon Extension","medium","","process_creation","Detects potentially suspicious execution of the Regasm/Regsvcs utilities with an uncommon extension.","ba17b43d-ff78-598e-3e48-6f7f77abce52"
20182022
"Obfuscated PowerShell OneLiner Execution","high","","process_creation","Detects the execution of a specific OneLiner to download and execute powershell modules in memory.","5656cdf4-b7e5-dbcf-3fc4-2d935d5999cd"
20192023
"Interesting Service Enumeration Via Sc.EXE","low","","process_creation","Detects the enumeration and query of interesting and in some cases sensitive services on the system via ""sc.exe"".

data/Microsoft_Server/WELA-Audit-Result.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
"Security Advanced (Account Management)","Security Group Management","12","critical:0, high:5, medium:2, low:5, info:0","Success","Success and Failure","Success and Failure","",""
2222
"Security Advanced (Account Management)","User Account Management","13","critical:0, high:7, medium:4, low:2, info:0","Success","Success and Failure","Success and Failure","",""
2323
"Security Advanced (Detailed Tracking)","Plug and Play Events","2","critical:0, high:0, medium:1, low:1, info:0","No Auditing","No Auditing","","",""
24-
"Security Advanced (Detailed Tracking)","Process Creation","1388","critical:69, high:678, medium:552, low:86, info:3","No Auditing","Success and Failure","Success","","Include command line in process creation events"
24+
"Security Advanced (Detailed Tracking)","Process Creation","1389","critical:69, high:678, medium:553, low:86, info:3","No Auditing","Success and Failure","Success","","Include command line in process creation events"
2525
"Security Advanced (Detailed Tracking)","Process Termination","1","critical:0, high:1, medium:0, low:0, info:0","No Auditing","No Auditing","","",""
2626
"Security Advanced (Detailed Tracking)","RPC Events","0","critical:0, high:0, medium:0, low:0, info:0","No Auditing","No Auditing","","",""
2727
"Security Advanced (Detailed Tracking)","Token Right Adjusted Events","0","critical:0, high:0, medium:0, low:0, info:0","No Auditing","No Auditing","","",""

0 commit comments

Comments
 (0)