Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit a8451cd

Browse files
authored
Merge pull request #245 from microsoft/mjmelone-patch-51
Update Possible Ransomware Related Destruction Activity.md
2 parents 8479bdf + c324e39 commit a8451cd

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

Execution/Possible Ransomware Related Destruction Activity.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ DeviceProcessEvents
2020
or (FileName =~ 'cipher.exe' and ProcessCommandLine contains "/w") // Wiping drive free space
2121
or (FileName =~ 'schtasks.exe' and ProcessCommandLine has "/change" and ProcessCommandLine has @"\Microsoft\Windows\SystemRestore\SR" and ProcessCommandLine has "/disable") // Disabling system restore task
2222
or (FileName =~ 'fsutil.exe' and ProcessCommandLine has "usn" and ProcessCommandLine has "deletejournal" and ProcessCommandLine has "/d") // Deleting USN journal
23-
// If you are receiving too many false positive detections consider enabling \ editing the next line.
24-
//| where InitiatingProcessFileName in~ ('cmd.exe', 'powershell.exe', 'wscript.exe', 'gpscript.exe', 'cmd.exe', "wmiprvse.exe", 'javaw.exe', 'java.exe') or InitiatingProcessFolderPath startswith @"c:\users\" or InitiatingProcessFolderPath startswith @"c:\programdata\" or InitiatingProcessFolderPath contains @"\temp\"
23+
or (FileName =~ 'icacls.exe' and ProcessCommandLine has @'"C:\*"' and ProcessCommandLine contains '/grant Everyone:F') // Attempts to re-ACL all files on the C drive to give everyone full control
24+
or (FileName =~ 'powershell.exe' and (
25+
ProcessCommandLine matches regex @'\s+-((?i)encod?e?d?c?o?m?m?a?n?d?|e|en|enc|ec)\s+' and replace(@'\x00','', base64_decode_tostring(extract("[A-Za-z0-9+/]{50,}[=]{0,2}",0 , ProcessCommandLine))) matches regex @".*(Win32_Shadowcopy).*(.Delete\(\)).*"
26+
) or ProcessCommandLine matches regex @".*(Win32_Shadowcopy).*(.Delete\(\)).*"
27+
) // This query looks for PowerShell-based commands used to delete shadow copies
2528
```
2629
## Category
2730

@@ -48,9 +51,9 @@ This query can be used to detect the following attack techniques and tactics ([s
4851

4952
## Contributor info
5053

51-
**Contributor:** Michael Melone
54+
**Contributor:** Michael Melone, with special thanks to Captain and @kshitijk_
5255

53-
**GitHub alias:** mimelone
56+
**GitHub alias:** mjmelone
5457

5558
**Organization:** Microsoft
5659

0 commit comments

Comments
 (0)