You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -58,9 +59,9 @@ DLL side-loading exploits the DLL search order to load malicious code into trust
58
59
- Update and patch all software on the affected system, focusing on the trusted Microsoft programs identified in the alert, to mitigate vulnerabilities exploited by DLL side-loading.
59
60
- Monitor the network for any signs of lateral movement or additional compromised systems, using the indicators of compromise identified during the investigation.
60
61
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional systems or data have been affected."""
61
-
risk_score = 73
62
+
risk_score = 47
62
63
rule_id = "1160dcdb-0a0a-4a79-91d8-9b84616edebd"
63
-
severity = "high"
64
+
severity = "medium"
64
65
tags = [
65
66
"Domain: Endpoint",
66
67
"OS: Windows",
@@ -73,35 +74,47 @@ tags = [
73
74
"Data Source: Microsoft Defender for Endpoint",
74
75
"Resources: Investigation Guide",
75
76
"Data Source: Crowdstrike",
77
+
"Data Source: SentinelOne",
76
78
]
77
79
timestamp_override = "event.ingested"
78
80
type = "eql"
79
81
80
82
query = '''
81
83
process where host.os.type == "windows" and event.type == "start" and
82
-
process.pe.original_file_name in ("WinWord.exe", "EXPLORER.EXE", "w3wp.exe", "DISM.EXE") and
83
-
not process.executable : ("?:\\Windows\\explorer.exe",
0 commit comments