11[metadata ]
22creation_date = " 2024/09/06"
3- integration = [" windows" , " system" , " sentinel_one_cloud_funnel" , " m365_defender" ]
3+ integration = [" windows" , " system" , " sentinel_one_cloud_funnel" , " m365_defender" , " crowdstrike " ]
44maturity = " production"
5- updated_date = " 2025/03/20 "
5+ updated_date = " 2025/09/01 "
66
77[rule ]
88author = [" Elastic" ]
@@ -12,12 +12,14 @@ is often observed during malware installation.
1212"""
1313from = " now-9m"
1414index = [
15+ " logs-crowdstrike.fdr*" ,
1516 " logs-m365_defender.event-*" ,
1617 " logs-sentinel_one_cloud_funnel.*" ,
1718 " logs-system.security*" ,
1819 " logs-windows.forwarded*" ,
1920 " logs-windows.sysmon_operational-*" ,
2021 " winlogbeat-*" ,
22+ " endgame-*" ,
2123]
2224language = " eql"
2325license = " Elastic License v2"
@@ -65,76 +67,93 @@ tags = [
6567 " OS: Windows" ,
6668 " Use Case: Threat Detection" ,
6769 " Tactic: Execution" ,
70+ " Resources: Investigation Guide" ,
6871 " Data Source: Windows Security Event Logs" ,
6972 " Data Source: Sysmon" ,
7073 " Data Source: SentinelOne" ,
7174 " Data Source: Microsoft Defender for Endpoint" ,
72- " Resources: Investigation Guide" ,
75+ " Data Source: Elastic Endgame" ,
76+ " Data Source: Crowdstrike" ,
7377]
7478timestamp_override = " event.ingested"
7579type = " eql"
7680
7781query = '''
7882process where host.os.type == "windows" and event.type == "start" and
79- process.name : "cmd.exe" and
80- (
81-
82- process.command_line : ("*).Run(*", "*GetObject*", "* curl*regsvr32*", "*echo*wscript*", "*echo*ZONE.identifier*",
83- "*ActiveXObject*", "*dir /s /b *echo*", "*unescape(*", "*findstr*TVNDRgAAAA*", "*findstr*passw*", "*start*\\\\*\\DavWWWRoot\\*",
84- "* explorer*%CD%*", "*%cd%\\*.js*", "*attrib*%CD%*", "*/?cMD<*", "*/AutoIt3ExecuteScript*..*", "*&cls&cls&cls&cls&cls&*",
85- "*&#*;&#*;&#*;&#*;*", "* &&s^eT*", "*& ChrW(*", "*&explorer /root*", "*start __ & __\\*", "*findstr /V /L *forfiles*",
86- "*=wscri& set *", "*http*!COmpUternaME!*", "*start *.pdf * start /min cmd.exe /c *\\\\*", "*pip install*System.Net.WebClient*",
87- "*Invoke-WebReques*Start-Process*", "*-command (Invoke-webrequest*", "*copy /b *\\\\* ping *-n*", "*echo*.ToCharArray*") or
88-
89- (process.args : "echo" and process.parent.name : ("wscript.exe", "mshta.exe")) or
90-
91- process.args : ("1>?:\\*.vbs", "1>?:\\*.js") or
92-
93- (process.args : "explorer.exe" and process.args : "type" and process.args : ">" and process.args : "start") or
94-
95- (process.parent.name : "explorer.exe" and
96- process.command_line :
97- ("*&&S^eT *",
98- "*&& set *&& set *&& set *&& set *&& set *&& call*",
99- "**\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??*")) or
100-
101- (process.parent.name : "explorer.exe" and process.args : "copy" and process.args : "&&" and process.args : "\\\\*@*\\*")
83+ process.name : "cmd.exe" and
84+ (
85+ process.command_line : (
86+ "*).Run(*", "*GetObject*", "* curl*regsvr32*", "*echo*wscript*", "*echo*ZONE.identifier*",
87+ "*ActiveXObject*", "*dir /s /b *echo*", "*unescape(*", "*findstr*TVNDRgAAAA*", "*findstr*passw*", "*start*\\\\*\\DavWWWRoot\\*",
88+ "* explorer*%CD%*", "*%cd%\\*.js*", "*attrib*%CD%*", "*/?cMD<*", "*/AutoIt3ExecuteScript*..*", "*&cls&cls&cls&cls&cls&*",
89+ "*&#*;&#*;&#*;&#*;*", "* &&s^eT*", "*& ChrW(*", "*&explorer /root*", "*start __ & __\\*", "*findstr /V /L *forfiles*",
90+ "*=wscri& set *", "*http*!COmpUternaME!*", "*start *.pdf * start /min cmd.exe /c *\\\\*", "*pip install*System.Net.WebClient*",
91+ "*Invoke-WebReques*Start-Process*", "*-command (Invoke-webrequest*", "*copy /b *\\\\* ping *-n*", "*echo*.ToCharArray*"
92+ ) or
93+
94+ (process.args : "echo" and process.parent.name : ("wscript.exe", "mshta.exe")) or
95+
96+ process.args : ("1>?:\\*.vbs", "1>?:\\*.js") or
97+
98+ (process.args : "explorer.exe" and process.args : "type" and process.args : ">" and process.args : "start") or
99+
100+ (
101+ process.parent.name : "explorer.exe" and
102+ process.command_line : (
103+ "*&&S^eT *",
104+ "*&& set *&& set *&& set *&& set *&& set *&& call*",
105+ "**\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??\\u00??*"
106+ )
107+ ) or
108+
109+ (process.parent.name : "explorer.exe" and process.args : "copy" and process.args : "&&" and process.args : "\\\\*@*\\*")
102110 ) and
103111
104112 /* false positives */
105113 not (process.args : "%TEMP%\\Spiceworks\\*" and process.parent.name : "wmiprvse.exe") and
106- not process.parent.executable :
107- ("?:\\Perl64\\bin\\perl.exe",
108- "?:\\Program Files\\nodejs\\node.exe",
109- "?:\\Program Files\\HP\\RS\\pgsql\\bin\\pg_dumpall.exe",
110- "?:\\Program Files (x86)\\PRTG Network Monitor\\64 bit\\PRTG Server.exe",
111- "?:\\Program Files (x86)\\Spiceworks\\bin\\spiceworks-finder.exe",
112- "?:\\Program Files (x86)\\Zuercher Suite\\production\\leds\\leds.exe",
113- "?:\\Program Files\\Tripwire\\Agent\\Plugins\\twexec\\twexec.exe",
114- "D:\\Agents\\?\\_work\\_tasks\\*\\SonarScanner.MSBuild.exe",
115- "?:\\Program Files\\Microsoft VS Code\\Code.exe",
116- "?:\\programmiweb\\NetBeans-*\\netbeans\\bin\\netbeans64.exe",
117- "?:\\Program Files (x86)\\Public Safety Suite Professional\\production\\leds\\leds.exe",
118- "?:\\Program Files (x86)\\Tier2Tickets\\button_gui.exe",
119- "?:\\Program Files\\NetBeans-*\\netbeans\\bin\\netbeans*.exe",
120- "?:\\Program Files (x86)\\Public Safety Suite Professional\\production\\leds\\leds.exe",
121- "?:\\Program Files (x86)\\Tier2Tickets\\button_gui.exe",
122- "?:\\Program Files (x86)\\Helpdesk Button\\button_gui.exe",
123- "?:\\VTSPortable\\VTS\\jre\\bin\\javaw.exe",
124- "?:\\Program Files\\Bot Framework Composer\\Bot Framework Composer.exe",
125- "?:\\Program Files\\KMSYS Worldwide\\eQuate\\*\\SessionMgr.exe",
126- "?:\\Program Files (x86)\\Craneware\\Pricing Analyzer\\Craneware.Pricing.Shell.exe",
127- "?:\\Program Files (x86)\\jumpcloud-agent-app\\jumpcloud-agent-app.exe",
128- "?:\\Program Files\\PostgreSQL\\*\\bin\\pg_dumpall.exe",
129- "?:\\Program Files (x86)\\Vim\\vim*\\vimrun.exe") and
114+ not ?process.parent.executable : (
115+ "?:\\Perl64\\bin\\perl.exe",
116+ "?:\\Program Files\\nodejs\\node.exe",
117+ "?:\\Program Files\\HP\\RS\\pgsql\\bin\\pg_dumpall.exe",
118+ "?:\\Program Files (x86)\\PRTG Network Monitor\\64 bit\\PRTG Server.exe",
119+ "?:\\Program Files (x86)\\Spiceworks\\bin\\spiceworks-finder.exe",
120+ "?:\\Program Files (x86)\\Zuercher Suite\\production\\leds\\leds.exe",
121+ "?:\\Program Files\\Tripwire\\Agent\\Plugins\\twexec\\twexec.exe",
122+ "D:\\Agents\\?\\_work\\_tasks\\*\\SonarScanner.MSBuild.exe",
123+ "?:\\Program Files\\Microsoft VS Code\\Code.exe",
124+ "?:\\programmiweb\\NetBeans-*\\netbeans\\bin\\netbeans64.exe",
125+ "?:\\Program Files (x86)\\Public Safety Suite Professional\\production\\leds\\leds.exe",
126+ "?:\\Program Files (x86)\\Tier2Tickets\\button_gui.exe",
127+ "?:\\Program Files\\NetBeans-*\\netbeans\\bin\\netbeans*.exe",
128+ "?:\\Program Files (x86)\\Public Safety Suite Professional\\production\\leds\\leds.exe",
129+ "?:\\Program Files (x86)\\Tier2Tickets\\button_gui.exe",
130+ "?:\\Program Files (x86)\\Helpdesk Button\\button_gui.exe",
131+ "?:\\VTSPortable\\VTS\\jre\\bin\\javaw.exe",
132+ "?:\\Program Files\\Bot Framework Composer\\Bot Framework Composer.exe",
133+ "?:\\Program Files\\KMSYS Worldwide\\eQuate\\*\\SessionMgr.exe",
134+ "?:\\Program Files (x86)\\Craneware\\Pricing Analyzer\\Craneware.Pricing.Shell.exe",
135+ "?:\\Program Files (x86)\\jumpcloud-agent-app\\jumpcloud-agent-app.exe",
136+ "?:\\Program Files\\PostgreSQL\\*\\bin\\pg_dumpall.exe",
137+ "?:\\Program Files (x86)\\Vim\\vim*\\vimrun.exe") and
138+ not (
139+ /* Crowdstrike doesn't populate process.parent.executable */
140+ event.dataset == "crowdstrike.fdr" and
141+ process.parent.name : (
142+ "perl.exe", "node.exe", "pg_dumpall.exe", "PRTG Server.exe", "spiceworks-finder.exe", "leds.exe", "twexec.exe",
143+ "SonarScanner.MSBuild.exe", "Code.exe", "netbeans64.exe", "javaw.exe", "Bot Framework Composer.exe", "SessionMgr.exe",
144+ "Craneware.Pricing.Shell.exe", "jumpcloud-agent-app.exe", "vimrun.exe"
145+ )
146+ ) and
130147 not (process.args : "?:\\Program Files\\Citrix\\Secure Access Client\\nsauto.exe" and process.parent.name : "userinit.exe") and
131- not process.args :
132- ("?:\\Program Files (x86)\\PCMatic\\PCPitstopScheduleService.exe",
133- "?:\\Program Files (x86)\\AllesTechnologyAgent\\*",
134- "https://auth.axis.com/oauth2/oauth-authorize*") and
135- not process.command_line :
136- ("\"cmd\" /c %NETBEANS_MAVEN_COMMAND_LINE%",
137- "?:\\Windows\\system32\\cmd.exe /q /d /s /c \"npm.cmd ^\"install^\" ^\"--no-bin-links^\" ^\"--production^\"\"") and
148+ not process.args : (
149+ "?:\\Program Files (x86)\\PCMatic\\PCPitstopScheduleService.exe",
150+ "?:\\Program Files (x86)\\AllesTechnologyAgent\\*",
151+ "https://auth.axis.com/oauth2/oauth-authorize*"
152+ ) and
153+ not process.command_line : (
154+ "\"cmd\" /c %NETBEANS_MAVEN_COMMAND_LINE%",
155+ "?:\\Windows\\system32\\cmd.exe /q /d /s /c \"npm.cmd ^\"install^\" ^\"--no-bin-links^\" ^\"--production^\"\""
156+ ) and
138157 not (process.name : "cmd.exe" and process.args : "%TEMP%\\Spiceworks\\*" and process.args : "http*/dataloader/persist_netstat_data") and
139158 not (process.args == "echo" and process.args == "GEQ" and process.args == "1073741824")
140159'''
0 commit comments