22creation_date = " 2021/01/21"
33integration = [" endpoint" , " windows" , " m365_defender" , " sentinel_one_cloud_funnel" ]
44maturity = " production"
5- updated_date = " 2025/03/20 "
5+ updated_date = " 2025/05/08 "
66
77[transform ]
88[[transform .osquery ]]
@@ -104,9 +104,9 @@ Attackers can abuse these alternate data streams to hide malicious files, string
104104- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
105105- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
106106"""
107- risk_score = 47
107+ risk_score = 21
108108rule_id = " 71bccb61-e19b-452f-b104-79a60e546a95"
109- severity = " medium "
109+ severity = " low "
110110tags = [
111111 " Domain: Endpoint" ,
112112 " OS: Windows" ,
@@ -146,6 +146,7 @@ file where host.os.type == "windows" and event.type == "creation" and
146146 "?:\\Program Files\\Microsoft Office\\root\\*\\POWERPNT.EXE",
147147 "?:\\Program Files\\Microsoft Office\\root\\*\\WINWORD.EXE",
148148 "?:\\Program Files\\Mozilla Firefox\\firefox.exe",
149+ "?:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe",
149150 "?:\\Program Files\\Rivet Networks\\SmartByte\\SmartByteNetworkService.exe",
150151 "?:\\Windows\\explorer.exe",
151152 "?:\\Windows\\System32\\DataExchangeHost.exe",
@@ -156,7 +157,8 @@ file where host.os.type == "windows" and event.type == "creation" and
156157 "?:\\Windows\\System32\\RuntimeBroker.exe",
157158 "?:\\Windows\\System32\\SearchProtocolHost.exe",
158159 "?:\\Windows\\System32\\sihost.exe",
159- "?:\\windows\\System32\\svchost.exe"
160+ "?:\\windows\\System32\\svchost.exe",
161+ "?:\\Windows\\System32\\WFS.exe"
160162 ) and
161163
162164 file.extension :
0 commit comments