File tree Expand file tree Collapse file tree 2 files changed +23
-23
lines changed Expand file tree Collapse file tree 2 files changed +23
-23
lines changed Original file line number Diff line number Diff line change @@ -17,32 +17,32 @@ data_source:
17
17
- Sysmon EventID 17
18
18
- Sysmon EventID 18
19
19
search : |
20
- `sysmon` EventID=17 OR EventID=18
20
+ `sysmon` ( EventID=17 OR EventID=18)
21
21
PipeName IN (
22
- \\DserNamePipe*,
23
- \\interprocess_*,
24
- \\lsarpc_*,
25
- \\mojo_*,
26
- \\msagent_*,
27
- \\MSSE-*,
28
- \\netlogon_*,
29
- \\ntsvcs*,
30
- \\postex_*,
31
- \\samr_*,
32
- \\spoolss_*,
33
- \\srvsvc_*,
34
- \\status_*,
35
- \\UIA_PIPE*
36
- \\win_svc*,
37
- \\winsock*,
38
- \\wkssvc_*,
22
+ " \\DserNamePipe*",
23
+ " \\interprocess_*" ,
24
+ " \\lsarpc_*" ,
25
+ " \\mojo_*" ,
26
+ " \\msagent_*",
27
+ " \\MSSE-*",
28
+ " \\netlogon_*" ,
29
+ " \\ntsvcs*" ,
30
+ " \\postex_*",
31
+ " \\samr_*" ,
32
+ " \\spoolss_*",
33
+ " \\srvsvc_*",
34
+ " \\status_*",
35
+ " \\UIA_PIPE" *
36
+ " \\win_svc*",
37
+ " \\winsock*",
38
+ " \\wkssvc_*" ,
39
39
)
40
40
| stats count min(_time) as firstTime max(_time) as lastTime
41
41
by dest dvc pipe_name process_exec process_guid process_id process_name process_path
42
- signature signature_id user_id vendor_product Image PipeName
42
+ signature signature_id user_id vendor_product Image PipeName
43
43
| `security_content_ctime(firstTime)`
44
- | `security_content_ctime(lastTime)`
45
- | `cobalt_strike_named_pipes_filter`'
44
+ | `security_content_ctime(lastTime)`
45
+ | `cobalt_strike_named_pipes_filter`
46
46
how_to_implement : To successfully implement this search, you need to be ingesting
47
47
logs with the process name, parent process, and command-line executions from your
48
48
endpoints. If you are using Sysmon, you must have at least version 6.0.4 of the
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ search: |
31
31
"sqltoolsps.exe"
32
32
)
33
33
`process_copy`
34
- Processes.process IN(
34
+ Processes.process IN (
35
35
"* \"C:\\Windows\\System32\\*",
36
36
"* \'C:\\Windows\\System32\\*",
37
37
"* C:\\Windows\\System32\\*",
@@ -48,7 +48,7 @@ search: |
48
48
| `drop_dm_object_name(Processes)`
49
49
| `security_content_ctime(firstTime)`
50
50
| `security_content_ctime(lastTime)`
51
- | `suspicious_copy_on_system32_filter`'
51
+ | `suspicious_copy_on_system32_filter`
52
52
how_to_implement : |
53
53
The detection is based on data that originates from Endpoint Detection
54
54
and Response (EDR) agents. These agents are designed to provide security-related
You can’t perform that action at this time.
0 commit comments