Skip to content

Commit 78366a2

Browse files
authored
Update defense_evasion_masquerading_as_svchost.toml
1 parent b8aedcd commit 78366a2

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

rules/windows/defense_evasion_masquerading_as_svchost.toml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2025/11/12"
3-
integration = ["windows"]
3+
integration = ["endpoint", "windows", "system"]
44
maturity = "production"
5-
updated_date = "2025/11/12"
5+
updated_date = "2025/12/05"
66
min_stack_version = "9.1.0"
77
min_stack_comments = "The esql match operator was introduced in version 9.1.0"
88

@@ -60,13 +60,16 @@ tags = [
6060
"OS: Windows",
6161
"Use Case: Threat Detection",
6262
"Tactic: Defense Evasion",
63-
"Resources: Investigation Guide"
63+
"Resources: Investigation Guide",
64+
"Data Source: Elastic Defend",
65+
"Data Source: Windows Security Event Logs",
66+
"Data Source: Sysmon"
6467
]
6568
timestamp_override = "event.ingested"
6669
type = "esql"
6770

6871
query = '''
69-
FROM logs-* metadata _id, _version, _index
72+
FROM logs-endpoint.events.process-*, logs-windows.sysmon_operational-*, logs-system.security-*, logs-windows.*, winlogbeat-* metadata _id, _version, _index
7073
| where event.category == "process" and event.type == "start" and
7174
match(process.name, "svchost.exe", { "fuzziness": 1, "max_expansions": 10 }) and
7275
not process.executable in ("C:\\Windows\\SysWOW64\\svchost.exe", "C:\\Windows\\System32\\svchost.exe") and

0 commit comments

Comments
 (0)