Skip to content

Commit 15ab58b

Browse files
committed
updating descirption
1 parent b091109 commit 15ab58b

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

detections/deprecated/known_services_killed_by_ransomware.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-02-07'
55
author: Teoderick Contreras, Splunk
66
status: deprecated
77
type: TTP
8-
description: The following analytic detects the suspicious termination of known services
8+
description: This analytic has been deprecated in favor of a new analytic - Windows Security And Backup Services Stop. The following analytic detects the suspicious termination of known services
99
commonly targeted by ransomware before file encryption. It leverages Windows System
1010
Event Logs (EventCode 7036) to identify when critical services such as Volume Shadow
1111
Copy, backup, and antivirus services are stopped. This activity is significant because

detections/deprecated/suspicious_driver_loaded_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-02-06'
55
author: Teoderick Contreras, Splunk
66
status: deprecated
77
type: TTP
8-
description: The following analytic detects the loading of drivers from suspicious
8+
description: This search has been deprecated in favour of - Windows Suspicious Driver Loaded Path. The following analytic detects the loading of drivers from suspicious
99
paths, which is a technique often used by malicious software such as coin miners
1010
(e.g., xmrig). It leverages Sysmon EventCode 6 to identify drivers loaded from non-standard
1111
directories. This activity is significant because legitimate drivers typically reside

detections/deprecated/suspicious_process_file_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-02-10'
55
author: Teoderick Contreras, Splunk
66
status: deprecated
77
type: TTP
8-
description: The following analytic identifies processes running from file paths not
8+
description: This search has been deprecated in favour of - Windows Suspicious Process File Path. The following analytic identifies processes running from file paths not
99
typically associated with legitimate software. It leverages data from Endpoint Detection
1010
and Response (EDR) agents, focusing on specific process paths within the Endpoint
1111
data model. This activity is significant because adversaries often use unconventional

0 commit comments

Comments
 (0)