Skip to content

Commit 9b15a7b

Browse files
authored
Merge pull request #3376 from 0xC0FFEEEE/yourelinuxsilly
Windows Detections - Don't trigger on linux os
2 parents d675485 + b3e768b commit 9b15a7b

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

detections/endpoint/windows_command_and_scripting_interpreter_path_traversal_exec.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Command and Scripting Interpreter Path Traversal Exec
22
id: 58fcdeb1-728d-415d-b0d7-3ab18a275ec2
3-
version: 6
4-
date: '2024-12-10'
3+
version: 7
4+
date: '2025-03-03'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ data_source:
1818
- Windows Event Log Security 4688
1919
- CrowdStrike ProcessRollup2
2020
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
21-
as lastTime FROM datamodel=Endpoint.Processes where Processes.process="*\/..\/..\/..\/*"
21+
as lastTime FROM datamodel=Endpoint.Processes where NOT Processes.os="Linux" Processes.process="*\/..\/..\/..\/*"
2222
OR Processes.process="*\\..\\..\\..\\*" OR Processes.process="*\/\/..\/\/..\/\/..\/\/*"
2323
by Processes.dest Processes.user Processes.parent_process_name Processes.process_name
2424
Processes.process Processes.original_file_name Processes.process_id Processes.parent_process_id

detections/endpoint/windows_process_with_netexec_command_line_parameters.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Process With NetExec Command Line Parameters
22
id: adbff89c-c1f2-4a2e-88a4-b5e645856510
3-
version: 4
4-
date: '2025-02-11'
3+
version: 5
4+
date: '2025-03-03'
55
author: Steven Dick, Github Community
66
status: production
77
type: TTP
@@ -10,7 +10,7 @@ data_source:
1010
- Windows Event Log Security 4688
1111
- Sysmon EventID 1
1212
- CrowdStrike ProcessRollup2
13-
search: '| tstats `security_content_summariesonly` values(Processes.parent_process) as Processes.parent_process, values(Processes.process) as Processes.process values(Processes.process_current_directory) AS process_current_directory, values(Processes.process_id) as Processes.process_id, values(Processes.process_guid) as Processes.process_guid, count min(_time) AS firstTime, max(_time) AS lastTime FROM datamodel=Endpoint.Processes where Processes.process_name IN ("nxc.exe") OR Processes.original_file_name IN ("nxc.exe") OR (Processes.process IN ("* smb *","* ssh *","* ldap *","* ftp *","* wmi *","* winrm *","* rdp *","* vnc *","* mssql *","* nfs *") AND ((Processes.process = "* -p *" AND Processes.process = "* -u *") OR Processes.process IN ("* -x *","* -M *","* --*"))) BY _time span=1h Processes.user Processes.dest Processes.process_name Processes.parent_process_name
13+
search: '| tstats `security_content_summariesonly` values(Processes.parent_process) as Processes.parent_process, values(Processes.process) as Processes.process values(Processes.process_current_directory) AS process_current_directory, values(Processes.process_id) as Processes.process_id, values(Processes.process_guid) as Processes.process_guid, count min(_time) AS firstTime, max(_time) AS lastTime FROM datamodel=Endpoint.Processes where NOT Processes.os="Linux" Processes.process_name IN ("nxc.exe") OR Processes.original_file_name IN ("nxc.exe") OR (Processes.process IN ("* smb *","* ssh *","* ldap *","* ftp *","* wmi *","* winrm *","* rdp *","* vnc *","* mssql *","* nfs *") AND ((Processes.process = "* -p *" AND Processes.process = "* -u *") OR Processes.process IN ("* -x *","* -M *","* --*"))) BY _time span=1h Processes.user Processes.dest Processes.process_name Processes.parent_process_name
1414
|`drop_dm_object_name(Processes)`
1515
| `security_content_ctime(firstTime)`
1616
| `security_content_ctime(lastTime)`

0 commit comments

Comments
 (0)