Skip to content

Commit 7d84fa2

Browse files
authored
Update windows_detect_process_executed_from_removable_media.yml
1 parent 9998dc9 commit 7d84fa2

File tree

1 file changed

+17
-36
lines changed

1 file changed

+17
-36
lines changed

detections/endpoint/windows_detect_process_executed_from_removable_media.yml

Lines changed: 17 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -43,57 +43,38 @@ drilldown_searches:
4343
search: '| from datamodel:Endpoint.Processes | search dest=$dest$ process_current_directory=$object_handle$*'
4444
earliest_offset: $info_min_time$
4545
latest_offset: $info_max_time$
46+
rba:
47+
message: The process [$process_name$] was launched using files on a removable storage device named [$object_name$] by [$user$] on $dest$
48+
risk_objects:
49+
- field: user
50+
type: user
51+
score: 35
52+
- field: dest
53+
type: system
54+
score: 35
55+
threat_objects:
56+
- field: process_name
57+
type: process_name
58+
- field: object_name
59+
type: registry_value_name
60+
- field: object_handle
61+
type: registry_value_text
4662
tags:
4763
analytic_story:
4864
- Data Protection
4965
asset_type: Endpoint
50-
confidence: 50
51-
impact: 70
52-
message: The process [$process_name$] was launched using files on a removable storage device named [$object_name$] by [$user$] on $dest$
5366
mitre_attack_id:
5467
- T1200
5568
- T1025
5669
- T1091
57-
observable:
58-
- name: dest
59-
type: Hostname
60-
role:
61-
- Victim
62-
- name: user
63-
type: User
64-
role:
65-
- Victim
66-
- name: object_name
67-
type: Other
68-
role:
69-
- Attacker
70-
- name: object_handle
71-
type: Other
72-
role:
73-
- Attacker
74-
- name: process_name
75-
type: Process Name
76-
role:
77-
- Attacker
7870
product:
7971
- Splunk Enterprise
8072
- Splunk Enterprise Security
8173
- Splunk Cloud
82-
required_fields:
83-
- Processes.dest
84-
- Processes.user
85-
- Processes.process_name
86-
- Processes.parent_process_name
87-
- Processes.process_current_directory
88-
- Registry.registry_path
89-
- Registry.registry_value_name
90-
- Registry.dest
91-
- Registry.registry_value_data
92-
risk_score: 35
9374
security_domain: endpoint
9475
tests:
9576
- name: True Positive Test
9677
attack_data:
9778
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1200/sysmon_usb_use_execution/sysmon_usb_use_execution.log
9879
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
99-
sourcetype: XmlWinEventLog
80+
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)