Skip to content

Commit c612c9a

Browse files
authored
Update windows_powershell_process_with_malicious_string.yml
updating to new yml to pass testing
1 parent 7712f51 commit c612c9a

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

detections/endpoint/windows_powershell_process_with_malicious_string.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -37,25 +37,26 @@ drilldown_searches:
3737
search: '| from datamodel:Endpoint.Processes | search dest=$dest|s$ process_name=$process_name$ "*$match$*"'
3838
earliest_offset: $info_min_time$
3939
latest_offset: $info_max_time$
40+
rba:
41+
message: The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
42+
risk_objects:
43+
- field: user
44+
type: user
45+
score: 70
46+
- field: dest
47+
type: system
48+
score: 70
49+
threat_objects:
50+
- field: process_name
51+
type: process_name
4052
tags:
4153
analytic_story:
4254
- Malicious PowerShell
4355
asset_type: Endpoint
44-
confidence: 90
45-
impact: 80
46-
message: The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
56+
message:
4757
mitre_attack_id:
4858
- T1059
4959
- T1059.001
50-
observable:
51-
- name: dest
52-
type: Hostname
53-
role:
54-
- Victim
55-
- name: user
56-
type: User
57-
role:
58-
- Victim
5960
product:
6061
- Splunk Enterprise
6162
- Splunk Enterprise Security
@@ -66,7 +67,6 @@ tags:
6667
- Processes.process_name
6768
- Processes.process
6869
- Processes.parent_process_name
69-
risk_score: 72
7070
security_domain: threat
7171
tests:
7272
- name: True Positive Test

0 commit comments

Comments
 (0)