11[metadata ]
22creation_date = " 2020/12/04"
3- integration = [" endpoint" , " windows" ]
3+ integration = [" endpoint" , " windows" , " m365_defender " , " sentinel_one_cloud_funnel " , " crowdstrike " ]
44maturity = " production"
5- updated_date = " 2024/10/15 "
5+ updated_date = " 2024/11/02 "
66min_stack_version = " 8.14.0"
77min_stack_comments = " Breaking change at 8.14.0 for the Windows Integration."
88
@@ -13,7 +13,15 @@ Identifies use of WinRar or 7z to create an encrypted files. Adversaries will of
1313preparation for exfiltration.
1414"""
1515from = " now-9m"
16- index = [" logs-endpoint.events.process-*" , " winlogbeat-*" , " logs-windows.*" , " endgame-*" ]
16+ index = [
17+ " logs-endpoint.events.process-*" ,
18+ " winlogbeat-*" ,
19+ " logs-windows.sysmon_operational-*" ,
20+ " endgame-*" ,
21+ " logs-m365_defender.event-*" ,
22+ " logs-sentinel_one_cloud_funnel.*" ,
23+ " logs-crowdstrike.fdr*"
24+ ]
1725language = " eql"
1826license = " Elastic License v2"
1927name = " Encrypting Files with WinRar or 7z"
@@ -72,6 +80,10 @@ tags = [
7280 " Resources: Investigation Guide" ,
7381 " Data Source: Elastic Endgame" ,
7482 " Data Source: Elastic Defend" ,
83+ " Data Source: Sysmon" ,
84+ " Data Source: Microsoft Defender for Endpoint" ,
85+ " Data Source: SentinelOne" ,
86+ " Data Source: Crowdstrike" ,
7587]
7688timestamp_override = " event.ingested"
7789type = " eql"
@@ -87,15 +99,19 @@ process where host.os.type == "windows" and event.type == "start" and
8799 process.args == "a" and process.args : ("-hp*", "-p*", "/hp*", "/p*")
88100 ) or
89101 (
90- ?process.pe.original_file_name in ("7z.exe", "7za.exe") and
102+ (process.name : ("7z.exe", "7za.exe") or ?process.pe.original_file_name in ("7z.exe", "7za.exe") ) and
91103 process.args == "a" and process.args : "-p*"
92104 )
93105) and
94106 not process.parent.executable : (
95107 "C:\\Program Files\\*.exe",
96108 "C:\\Program Files (x86)\\*.exe",
97109 "?:\\ManageEngine\\*\\jre\\bin\\java.exe",
98- "?:\\Nox\\bin\\Nox.exe"
110+ "?:\\Nox\\bin\\Nox.exe",
111+ "\\Device\\HarddiskVolume?\\Program Files\\*.exe",
112+ "\\Device\\HarddiskVolume?\\Program Files (x86)\\*.exe",
113+ "\\Device\\HarddiskVolume?\\ManageEngine\\*\\jre\\bin\\java.exe",
114+ "\\Device\\HarddiskVolume?\\Nox\\bin\\Nox.exe"
99115 )
100116'''
101117
0 commit comments