You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/endpoint/windows_detect_process_executed_from_removable_media.yml
+10-9Lines changed: 10 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -12,18 +12,19 @@ data_source:
12
12
- Sysmon Event ID 12
13
13
- Sysmon Event ID 13
14
14
- CrowdStrike ProcessRollup2
15
-
search: '| tstats `security_content_summariesonly` count values(Processes.process) as process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process_current_directory=* AND NOT Processes.process_current_directory IN ("C:\\*","*\\sysvol\\*") by Processes.dest Processes.user Processes.process_name Processes.parent_process_name Processes.process_current_directory
16
-
| `drop_dm_object_name(Processes)`
17
-
| rex field=process_current_directory "^(?<object_handle>[^\\\]+\\\)"
18
-
| where isnotnull(object_handle)
19
-
| `security_content_ctime(firstTime)`
20
-
| `security_content_ctime(lastTime)`
21
-
| join dest,object_handle
15
+
search: |-
16
+
| tstats `security_content_summariesonly` count values(Processes.process) as process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process_current_directory=* AND NOT Processes.process_current_directory IN ("C:\\*","*\\sysvol\\*") by Processes.dest Processes.user Processes.process_name Processes.parent_process_name Processes.process_current_directory
17
+
| `drop_dm_object_name(Processes)`
18
+
| rex field=process_current_directory "^(?<object_handle>[^\\\]+\\\)"
19
+
| where isnotnull(object_handle)
20
+
| `security_content_ctime(firstTime)`
21
+
| `security_content_ctime(lastTime)`
22
+
| join dest,object_handle
22
23
[| tstats `security_content_summariesonly` count from datamodel=Endpoint.Registry where Registry.registry_value_data="*:\\*" AND Registry.registry_path="*USBSTOR*" AND Registry.registry_path IN ("HKLM\\SOFTWARE\\Microsoft\\Windows Portable Devices\\Devices\\*","HKLM\\System\\CurrentControlSet\\Enum\\SWD\\WPDBUSENUM\\*") by Registry.dest,Registry.registry_value_data,Registry.registry_path
how_to_implement: To successfully implement this search, you must ingest endpoint logging that tracks changes to the HKLM\SOFTWARE\Microsoft\Windows Portable Devices\Devices\ or HKLM\System\CurrentControlSet\Enum\SWD\WPDBUSENUM\ registry keys as well as Process Execution commands. Ensure that the field from the event logs is being mapped to the proper fields in the Endpoint.Registry data model.
28
29
known_false_positives: Legitimate USB activity will also be detected. Please verify and investigate as appropriate.
0 commit comments