Skip to content

Commit 73aaad9

Browse files
[Rule Tuning] MsBuild Making Network Connections (#4479)
* [Rule Tuning] MsBuild Making Network Connections * Remove Minstack * Revert MMinstack removal --------- Co-authored-by: Shashank K S <[email protected]>
1 parent bc3e12d commit 73aaad9

File tree

1 file changed

+16
-22
lines changed

1 file changed

+16
-22
lines changed

rules/windows/defense_evasion_msbuild_making_network_connections.toml

Lines changed: 16 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/02/03"
5+
updated_date = "2025/02/21"
66
min_stack_version = "8.14.0"
77
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
88

@@ -39,12 +39,7 @@ Identifies MsBuild.exe making outbound network connections. This may indicate ad
3939
leveraged by adversaries to execute code and evade detection.
4040
"""
4141
from = "now-9m"
42-
index = [
43-
"winlogbeat-*",
44-
"logs-endpoint.events.process-*",
45-
"logs-endpoint.events.network-*",
46-
"logs-windows.sysmon_operational-*",
47-
]
42+
index = ["logs-endpoint.events.process-*", "logs-endpoint.events.network-*"]
4843
language = "eql"
4944
license = "Elastic License v2"
5045
name = "MsBuild Making Network Connections"
@@ -118,7 +113,6 @@ tags = [
118113
"Tactic: Defense Evasion",
119114
"Resources: Investigation Guide",
120115
"Data Source: Elastic Defend",
121-
"Data Source: Sysmon",
122116
]
123117
type = "eql"
124118

@@ -127,22 +121,22 @@ sequence by process.entity_id with maxspan=30s
127121
128122
/* Look for MSBuild.exe process execution */
129123
/* The events for this first sequence may be noisy, consider adding exceptions */
130-
[process where host.os.type == "windows"
131-
and (
132-
process.pe.original_file_name: "MSBuild.exe" or
133-
process.name: "MSBuild.exe"
134-
)
135-
and event.type == "start" and user.id != "S-1-5-18"]
124+
[process where host.os.type == "windows" and event.type == "start" and
125+
(
126+
process.pe.original_file_name: "MSBuild.exe" or
127+
process.name: "MSBuild.exe"
128+
) and
129+
not user.id == "S-1-5-18"]
136130
137131
/* Followed by a network connection to an external address */
138132
/* Exclude domains that are known to be benign */
139-
[network where host.os.type == "windows"
140-
and event.action: ("connection_attempted", "lookup_requested")
141-
and (
142-
process.pe.original_file_name: "MSBuild.exe" or
143-
process.name: "MSBuild.exe"
144-
)
145-
and not user.id != "S-1-5-18" and
133+
[network where host.os.type == "windows" and
134+
event.action: ("connection_attempted", "lookup_requested") and
135+
(
136+
process.pe.original_file_name: "MSBuild.exe" or
137+
process.name: "MSBuild.exe"
138+
) and
139+
not user.id == "S-1-5-18" and
146140
not cidrmatch(destination.ip, "127.0.0.1", "::1") and
147141
not dns.question.name : (
148142
"localhost",

0 commit comments

Comments
 (0)