Skip to content

Commit 95aed8f

Browse files
w0rk3rtradebot-elastic
authored andcommitted
[Rule Tuning] Windows High Severity - 3 (#5094)
* [Rule Tuning] Windows High Severity - 3 * Update execution_pdf_written_file.toml * Update execution_pdf_written_file.toml * Update execution_pdf_written_file.toml (cherry picked from commit d69ede2)
1 parent 83a2a15 commit 95aed8f

5 files changed

+26
-16
lines changed

rules/windows/discovery_host_public_ip_address_lookup.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/08/20"
33
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/09/05"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -72,7 +72,7 @@ timestamp_override = "event.ingested"
7272
type = "eql"
7373

7474
query = '''
75-
network where host.os.type == "windows" and dns.question.name != null and
75+
network where host.os.type == "windows" and dns.question.name != null and process.name != null and
7676
(
7777
process.name : ("MSBuild.exe", "mshta.exe", "wscript.exe", "powershell.exe", "pwsh.exe", "msiexec.exe", "rundll32.exe",
7878
"bitsadmin.exe", "InstallUtil.exe", "RegAsm.exe", "vbc.exe", "RegSvcs.exe", "python.exe", "regsvr32.exe", "dllhost.exe",
@@ -82,7 +82,7 @@ network where host.os.type == "windows" and dns.question.name != null and
8282
8383
?process.code_signature.subject_name : ("AutoIt Consulting Ltd", "OpenJS Foundation", "Python Software Foundation") or
8484
85-
?process.executable : ("?:\\Users\\*.exe", "?:\\ProgramData\\*.exe", "?\\Device\\HarddiskVolume?\\Users\\*.exe", "?\\Device\\HarddiskVolume?\\ProgramData\\*.exe")
85+
?process.executable : ("?:\\Users\\*.exe", "?:\\ProgramData\\*.exe")
8686
) and
8787
dns.question.name :
8888
(

rules/windows/execution_pdf_written_file.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/09/02"
33
integration = ["endpoint", "windows"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/09/12"
66

77
[rule]
88
author = ["Elastic"]
@@ -21,10 +21,10 @@ index = [
2121
interval = "60m"
2222
language = "eql"
2323
license = "Elastic License v2"
24-
name = "Execution of File Written or Modified by PDF Reader"
24+
name = "Deprecated - Execution of File Written or Modified by PDF Reader"
2525
note = """## Triage and analysis
2626
27-
### Investigating Execution of File Written or Modified by PDF Reader
27+
### Investigating Deprecated - Execution of File Written or Modified by PDF Reader
2828
2929
PDF is a common file type used in corporate environments and most machines have software to handle these files. This creates a vector where attackers can exploit the engines and technology behind this class of software for initial access or privilege escalation.
3030
@@ -69,9 +69,9 @@ This rule searches for executable files written by PDF reader software and execu
6969
- Consider improvements to the security awareness program.
7070
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
7171
"""
72-
risk_score = 73
72+
risk_score = 21
7373
rule_id = "1defdd62-cd8d-426e-a246-81a37751bb2b"
74-
severity = "high"
74+
severity = "low"
7575
tags = [
7676
"Domain: Endpoint",
7777
"OS: Windows",

rules/windows/execution_powershell_susp_args_via_winscript.toml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/09/09"
33
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/26"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -76,7 +76,11 @@ type = "eql"
7676

7777
query = '''
7878
process where host.os.type == "windows" and event.type == "start" and
79-
process.name : ("powershell.exe", "pwsh.exe", "cmd.exe") and
79+
process.command_line != null and
80+
(
81+
process.name : ("powershell.exe", "pwsh.exe", "powershell_ise.exe", "cmd.exe") or
82+
?process.pe.original_file_name : ("powershell.exe", "pwsh.dll", "powershell_ise.exe", "Cmd.Exe")
83+
) and
8084
process.parent.name : ("wscript.exe", "mshta.exe")
8185
'''
8286

rules/windows/execution_via_mmc_console_file_unusual_path.toml

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/19"
33
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender", "system", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/08/28"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -60,9 +60,9 @@ Microsoft Management Console (MMC) is a Windows utility that provides a framewor
6060
- Update and patch the system to the latest security standards to close any vulnerabilities that may have been exploited.
6161
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine if additional systems are affected."""
6262
references = ["https://www.elastic.co/security-labs/grimresource"]
63-
risk_score = 73
63+
risk_score = 47
6464
rule_id = "7e23dfef-da2c-4d64-b11d-5f285b638853"
65-
severity = "high"
65+
severity = "medium"
6666
tags = [
6767
"Domain: Endpoint",
6868
"OS: Windows",
@@ -93,7 +93,13 @@ process where host.os.type == "windows" and event.type == "start" and
9393
"?:\\Windows\\System32\\*.msc",
9494
"?:\\Windows\\SysWOW64\\*.msc",
9595
"?:\\Program files\\*.msc",
96-
"?:\\Program Files (x86)\\*.msc"
96+
"?:\\Program Files (x86)\\*.msc",
97+
"?:\\Windows\\ADFS\\Microsoft.IdentityServer.msc"
98+
) and
99+
not process.command_line : (
100+
"C:\\Windows\\system32\\mmc.exe eventvwr.msc /s",
101+
"mmc.exe eventvwr.msc /s",
102+
"\"C:\\Windows\\System32\\mmc.exe\" CompMgmt.msc*"
97103
)
98104
'''
99105

rules/windows/impact_mod_critical_os_files.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/09/01"
33
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/09/01"
5+
updated_date = "2025/09/11"
66

77
[rule]
88
author = ["Elastic"]
@@ -77,7 +77,7 @@ query = '''
7777
file where host.os.type == "windows" and event.type in ("change", "deletion") and
7878
file.name : ("winload.exe", "winlod.efi", "ntoskrnl.exe", "bootmgr") and
7979
file.path : ("?:\\Windows\\*", "\\Device\\HarddiskVolume*\\Windows\\*") and
80-
not process.executable : ("?:\\Windows\\System32\\poqexec.exe", "?\\Device\\HarddiskVolume*\\Windows\\System32\\poqexec.exe")
80+
not process.executable : ("?:\\Windows\\System32\\poqexec.exe", "\\Device\\HarddiskVolume*\\Windows\\System32\\poqexec.exe")
8181
'''
8282

8383

0 commit comments

Comments
 (0)