Skip to content

Commit 619c174

Browse files
authored
Update credential_access_lsass_openprocess_api.toml
1 parent e2222c2 commit 619c174

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

rules/windows/credential_access_lsass_openprocess_api.toml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ authenticode.path JOIN hash ON services.path = hash.path WHERE authenticode.resu
3232

3333
[rule]
3434
author = ["Elastic"]
35-
description = "Identifies access attempts to the LSASS handle, which may indicate an attempt to dump credentials from LSASS memory.\n"
35+
description = "Identifies access attempts to the LSASS handle, which may indicate an attempt to dump credentials from LSASS memory."
3636
from = "now-30m"
3737
interval = "15m"
3838
language = "esql"
@@ -129,8 +129,7 @@ from logs-endpoint.events.api-*, logs-m365_defender.event-* metadata _id, _versi
129129
not to_lower(process.executable) like """c:\\program files\\*.exe""" and
130130
not to_lower(process.executable) like """c:\\program files (x86)\\*.exe""" and
131131
not process.executable like """C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\MsMpEng.exe""" and
132-
not process.executable like """C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe""" and
133-
not process.executable like """C:\\Program Files\\*.exe""" and not process.executable like """C:\\Program Files (x86)\\*.exe"""
132+
not process.executable like """C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe"""
134133
135134
/* normalize process paths to reduce known random patterns in process.executable */
136135
| eval Esql.process_path = replace(process.executable, """([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}|ns[a-z][A-Z0-9]{3,4}\.tmp|DX[A-Z0-9]{3,4}\.tmp|7z[A-Z0-9]{3,5}\.tmp|[0-9\.\-\_]{3,})""", "")

0 commit comments

Comments
 (0)