Skip to content

Commit 42107ee

Browse files
authored
Update windows_detect_process_executed_from_removable_media.yml
update search yaml for better readability / remove single quote in SPL issues
1 parent 3175bad commit 42107ee

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

detections/endpoint/windows_detect_process_executed_from_removable_media.yml

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,18 +12,19 @@ data_source:
1212
- Sysmon Event ID 12
1313
- Sysmon Event ID 13
1414
- CrowdStrike ProcessRollup2
15-
search: '| tstats `security_content_summariesonly` count values(Processes.process) as process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process_current_directory=* AND NOT Processes.process_current_directory IN ("C:\\*","*\\sysvol\\*") by Processes.dest Processes.user Processes.process_name Processes.parent_process_name Processes.process_current_directory
16-
| `drop_dm_object_name(Processes)`
17-
| rex field=process_current_directory "^(?<object_handle>[^\\\]+\\\)"
18-
| where isnotnull(object_handle)
19-
| `security_content_ctime(firstTime)`
20-
| `security_content_ctime(lastTime)`
21-
| join dest,object_handle
15+
search: |-
16+
| tstats `security_content_summariesonly` count values(Processes.process) as process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process_current_directory=* AND NOT Processes.process_current_directory IN ("C:\\*","*\\sysvol\\*") by Processes.dest Processes.user Processes.process_name Processes.parent_process_name Processes.process_current_directory
17+
| `drop_dm_object_name(Processes)`
18+
| rex field=process_current_directory "^(?<object_handle>[^\\\]+\\\)"
19+
| where isnotnull(object_handle)
20+
| `security_content_ctime(firstTime)`
21+
| `security_content_ctime(lastTime)`
22+
| join dest,object_handle
2223
[| tstats `security_content_summariesonly` count from datamodel=Endpoint.Registry where Registry.registry_value_data="*:\\*" AND Registry.registry_path="*USBSTOR*" AND Registry.registry_path IN ("HKLM\\SOFTWARE\\Microsoft\\Windows Portable Devices\\Devices\\*","HKLM\\System\\CurrentControlSet\\Enum\\SWD\\WPDBUSENUM\\*") by Registry.dest,Registry.registry_value_data,Registry.registry_path
2324
| `drop_dm_object_name(Registry)`
2425
| eval object_handle = registry_value_data, object_name = replace(mvindex(split(mvindex(split(registry_path, "??"),1),"&amp;"),2),"PROD_","")
25-
]
26-
| `windows_detect_process_executed_from_removable_media_filter`'
26+
]
27+
| `windows_detect_process_executed_from_removable_media_filter`
2728
how_to_implement: To successfully implement this search, you must ingest endpoint logging that tracks changes to the HKLM\SOFTWARE\Microsoft\Windows Portable Devices\Devices\ or HKLM\System\CurrentControlSet\Enum\SWD\WPDBUSENUM\ registry keys as well as Process Execution commands. Ensure that the field from the event logs is being mapped to the proper fields in the Endpoint.Registry data model.
2829
known_false_positives: Legitimate USB activity will also be detected. Please verify and investigate as appropriate.
2930
references:

0 commit comments

Comments
 (0)