Skip to content

Commit 33d832d

Browse files
terrancedejesusSamirbousw0rk3r
authored
[Rule Tuning] Tuning Process Termination followed by Deletion (#4173)
* adding rule tuning * adjusted operators; fixed missing quotes * Update rules/windows/defense_evasion_process_termination_followed_by_deletion.toml * Update defense_evasion_process_termination_followed_by_deletion.toml * Update defense_evasion_process_termination_followed_by_deletion.toml --------- Co-authored-by: Samirbous <[email protected]> Co-authored-by: Jonhnathan <[email protected]>
1 parent 56e61a6 commit 33d832d

File tree

1 file changed

+24
-8
lines changed

1 file changed

+24
-8
lines changed

rules/windows/defense_evasion_process_termination_followed_by_deletion.toml

Lines changed: 24 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/04"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2024/11/04"
66

77
[transform]
88
[[transform.osquery]]
@@ -39,7 +39,7 @@ of these files can occur during an intrusion, or as part of a post-intrusion pro
3939
footprint.
4040
"""
4141
from = "now-9m"
42-
index = ["logs-endpoint.events.process-*", "logs-endpoint.events.file-*", "endgame-*"]
42+
index = ["logs-endpoint.events.process-*", "logs-endpoint.events.file-*"]
4343
language = "eql"
4444
license = "Elastic License v2"
4545
name = "Process Termination followed by Deletion"
@@ -109,22 +109,38 @@ query = '''
109109
sequence by host.id with maxspan=5s
110110
[process where host.os.type == "windows" and event.type == "end" and
111111
process.code_signature.trusted != true and
112-
not process.executable : ("C:\\Windows\\SoftwareDistribution\\*.exe", "C:\\Windows\\WinSxS\\*.exe")
112+
not process.executable like
113+
("C:\\Windows\\SoftwareDistribution\\*.exe",
114+
"C:\\Windows\\WinSxS\\*.exe",
115+
"?:\\Windows\\Postillion\\Office\\*.exe") and
116+
not (
117+
process.name : "infinst.exe" and process.parent.name: "dxsetup.exe" and
118+
process.parent.code_signature.subject_name == "NVIDIA Corporation" and
119+
process.parent.code_signature.status == "trusted"
120+
)
113121
] by process.executable
114-
[file where host.os.type == "windows" and event.type == "deletion" and file.extension : ("exe", "scr", "com") and
115-
not process.executable :
122+
[file where host.os.type == "windows" and event.type == "deletion" and file.extension in~ ("exe", "scr", "com") and
123+
not process.executable like
116124
("?:\\Program Files\\*.exe",
117125
"?:\\Program Files (x86)\\*.exe",
118126
"?:\\Windows\\System32\\svchost.exe",
119-
"?:\\Windows\\System32\\drvinst.exe") and
120-
not file.path : (
127+
"?:\\Windows\\System32\\drvinst.exe",
128+
"?:\\Windows\\Postillion\\Office\\*.exe") and
129+
not file.path like (
121130
"?:\\Program Files\\*.exe",
122131
"?:\\Program Files (x86)\\*.exe",
123132
"?:\\Windows\\Temp\\*\\DismHost.exe",
124133
"?:\\$WINDOWS.~BT\\Work\\*\\DismHost.exe",
125134
"?:\\$WinREAgent\\Scratch\\*\\DismHost.exe",
126135
"?:\\Windows\\tenable_mw_scan_*.exe",
127-
"?:\\Users\\*\\AppData\\Local\\Temp\\LogiUI\\Pak\\uninstall.exe"
136+
"?:\\Users\\*\\AppData\\Local\\Temp\\LogiUI\\Pak\\uninstall.exe",
137+
"?:\\ProgramData\\chocolatey\\*.exe"
138+
) and
139+
not (process.name : "OktaVerifySetup-*.exe" and process.code_signature.subject_name == "Okta, Inc.") and
140+
not (
141+
process.executable : "?:\\Windows\\SysWOW64\\config\\systemprofile\\Citrix\\UpdaterBinaries\\CitrixReceiver\\*" and
142+
process.code_signature.subject_name == "Citrix Systems, Inc." and
143+
file.path : "?:\\Windows\\SysWOW64\\config\\systemprofile\\Citrix\\UpdaterBinaries\\CitrixReceiver\\*\\bootstrapperhelper.exe"
128144
)
129145
] by file.path
130146
'''

0 commit comments

Comments
 (0)