Skip to content

Commit 7381c9d

Browse files
authored
Update windows_powershell_process_with_malicious_string.yml
update search yaml for better readability / remove single quote in SPL issues
1 parent a96137f commit 7381c9d

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

detections/endpoint/windows_powershell_process_with_malicious_string.yml

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,14 @@ data_source:
1010
- Windows Security Event ID 4688
1111
- Sysmon Event ID 1
1212
- CrowdStrike ProcessRollup2
13-
search: '| tstats `security_content_summariesonly` count values(Processes.original_file_name) as original_file_name values(Processes.process) as process values(Processes.parent_process) as parent_process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where `process_powershell` by Processes.user Processes.dest Processes.process_name Processes.parent_process_name Processes.process
14-
| `drop_dm_object_name(Processes)`
15-
| `security_content_ctime(firstTime)`
16-
| `security_content_ctime(lastTime)`
17-
| lookup malicious_powershell_strings command as process
18-
| where isnotnull(match)
19-
| `windows_powershell_process_with_malicious_string_filter`'
13+
search: |-
14+
| tstats `security_content_summariesonly` count values(Processes.original_file_name) as original_file_name values(Processes.process) as process values(Processes.parent_process) as parent_process min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where `process_powershell` by Processes.user Processes.dest Processes.process_name Processes.parent_process_name Processes.process
15+
| `drop_dm_object_name(Processes)`
16+
| `security_content_ctime(firstTime)`
17+
| `security_content_ctime(lastTime)`
18+
| lookup malicious_powershell_strings command as process
19+
| where isnotnull(match)
20+
| `windows_powershell_process_with_malicious_string_filter`
2021
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the process GUID, process name, and parent process. Additionally, you must ingest complete command-line executions. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process.
2122
known_false_positives: Unknown, possible usage by internal red team or powershell commands with overlap.
2223
references:

0 commit comments

Comments
 (0)