Skip to content

Commit 7f7724c

Browse files
committed
Updated default detection
1 parent b294765 commit 7f7724c

File tree

1 file changed

+16
-0
lines changed

1 file changed

+16
-0
lines changed

contentctl/templates/detections/endpoint/anomalous_usage_of_7zip.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,22 @@ drilldown_searches:
3838
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ($user$, $dest$) starthoursago=168 endhoursago=1 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
3939
earliest_offset: $info_min_time$
4040
latest_offset: $info_max_time$
41+
rba:
42+
message: An instance of $parent_process_name$ spawning $process_name$ was identified
43+
on endpoint $dest$ by user $user$. This behavior is indicative of suspicious loading
44+
of 7zip.
45+
risk_objects:
46+
- field: user
47+
type: user
48+
score: 56
49+
- field: dest
50+
type: system
51+
score: 60
52+
threat_objects:
53+
- field: parent_process_name
54+
type: parent_process_name
55+
- field: process_name
56+
type: process_name
4157
tags:
4258
analytic_story:
4359
- Cobalt Strike

0 commit comments

Comments
 (0)