Skip to content

Commit 0d3d628

Browse files
authored
Update defense_evasion_masquerading_as_svchost.toml
1 parent 399aab1 commit 0d3d628

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

rules/windows/defense_evasion_masquerading_as_svchost.toml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,9 @@ query = '''
7272
FROM logs-endpoint.events.process-*, logs-windows.sysmon_operational-*, logs-system.security-*, logs-windows.*, winlogbeat-* metadata _id, _version, _index
7373
| where event.category == "process" and event.type == "start" and
7474
match(process.name, "svchost.exe", { "fuzziness": 1, "max_expansions": 10 }) and
75-
not process.executable in ("C:\\Windows\\SysWOW64\\svchost.exe", "C:\\Windows\\System32\\svchost.exe")
76-
| eval process.executable = to_lower(process.executable)
77-
| where
78-
not process.executable like """\\device\\harddiskvolume*\\windows\\system32\\svchost.exe""" and
79-
not process.executable like """\\device\\harddiskvolume*\\windows\\syswow64\\svchost.exe"""
75+
not to_lower(process.executable) in ("c:\\windows\\syswow64\\svchost.exe", "c:\\windows\\system32\\svchost.exe") and
76+
not to_lower(process.executable) like """\\device\\harddiskvolume*\\windows\\system32\\svchost.exe""" and
77+
not to_lower(process.executable) like """\\device\\harddiskvolume*\\windows\\syswow64\\svchost.exe"""
8078
| keep event.dataset, host.name, host.id, user.id, user.name, process.executable, process.parent.executable, process.command_line, _id, _version, _index
8179
'''
8280

0 commit comments

Comments
 (0)