Skip to content

Commit 662b542

Browse files
authored
Apply suggestions from code review
1 parent 263db16 commit 662b542

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

detections/endpoint/windows_process_with_netexec_command_line_parameters.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ description: The following analytic detects the use of NetExec (formally Crackma
99
data_source:
1010
- Windows Security Event ID 4688
1111
- Sysmon Event ID 1
12+
- CrowdStrike ProcessRollup2
1213
search: '| tstats `security_content_summariesonly` values(Processes.parent_process) as Processes.parent_process, values(Processes.process) as Processes.process values(Processes.process_current_directory) AS process_current_directory, values(Processes.process_id) as Processes.process_id, values(Processes.process_guid) as Processes.process_guid, count min(_time) AS firstTime, max(_time) AS lastTime FROM datamodel=Endpoint.Processes where Processes.process_name IN ("nxc.exe") OR Processes.original_file_name IN ("nxc.exe") OR (Processes.process IN ("* smb *","* ssh *","* ldap *","* ftp *","* wmi *","* winrm *","* rdp *","* vnc *","* mssql *","* nfs *") AND ((Processes.process = "* -p *" AND Processes.process = "* -u *") OR Processes.process IN ("* -x *","* -M *","* --*"))) BY _time span=1h Processes.user Processes.dest Processes.process_name Processes.parent_process_name
1314
|`drop_dm_object_name(Processes)`
1415
| `security_content_ctime(firstTime)`

0 commit comments

Comments
 (0)