Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 745b608

Browse files
authored
Update Possible Ransomware Related Destruction Activity.csl
1 parent 663df1e commit 745b608

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

Execution/Possible Ransomware Related Destruction Activity.csl

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,5 @@ DeviceProcessEvents
1818
or (FileName =~ 'cipher.exe' and ProcessCommandLine contains "/w") // Wiping drive free space
1919
or (FileName =~ 'schtasks.exe' and ProcessCommandLine has "/change" and ProcessCommandLine has @"\Microsoft\Windows\SystemRestore\SR" and ProcessCommandLine has "/disable") // Disabling system restore task
2020
or (FileName =~ 'fsutil.exe' and ProcessCommandLine has "usn" and ProcessCommandLine has "deletejournal" and ProcessCommandLine has "/d") // Deleting USN journal
21-
| where InitiatingProcessFileName in~ ('cmd.exe', 'powershell.exe', 'wscript.exe', 'gpscript.exe', 'cmd.exe', "wmiprvse.exe", 'javaw.exe', 'java.exe') or InitiatingProcessFolderPath startswith @"c:\users\" or InitiatingProcessFolderPath startswith @"c:\programdata\" or InitiatingProcessFolderPath contains @"\temp\"
21+
// If you are receiving too many false positive detections consider enabling \ editing the next line.
22+
//| where InitiatingProcessFileName in~ ('cmd.exe', 'powershell.exe', 'wscript.exe', 'gpscript.exe', 'cmd.exe', "wmiprvse.exe", 'javaw.exe', 'java.exe') or InitiatingProcessFolderPath startswith @"c:\users\" or InitiatingProcessFolderPath startswith @"c:\programdata\" or InitiatingProcessFolderPath contains @"\temp\"

0 commit comments

Comments
 (0)