Skip to content

Commit

Permalink
Sigma Rule Update (2023-11-11 20:06:45) (#530)
Browse files Browse the repository at this point in the history
Co-authored-by: hach1yon <[email protected]>
  • Loading branch information
github-actions[bot] and hach1yon authored Nov 11, 2023
1 parent 9b1192d commit 6a95a17
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ references:
author: Thomas Patzke, Florian Roth (Nextron Systems), Zach Stanford @svch0st, Tim
Shelton, Nasreddine Bencherchali (Nextron Systems)
date: 2019/01/16
modified: 2023/11/09
modified: 2023/11/11
tags:
- attack.persistence
- attack.t1505.003
Expand Down Expand Up @@ -89,7 +89,7 @@ detection:
- ADManager Plus
ParentProcessName|endswith: \java.exe
condition: process_creation and (1 of selection_webserver_* and selection_anomaly_children
and not 1 of filter_main_**)
and not 1 of filter_main_*)
falsepositives:
- Particular web applications may spawn a shell process legitimately
level: high
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ references:
author: Thomas Patzke, Florian Roth (Nextron Systems), Zach Stanford @svch0st, Tim
Shelton, Nasreddine Bencherchali (Nextron Systems)
date: 2019/01/16
modified: 2023/11/09
modified: 2023/11/11
tags:
- attack.persistence
- attack.t1505.003
Expand Down Expand Up @@ -90,7 +90,7 @@ detection:
- sc query
- ADManager Plus
condition: process_creation and (1 of selection_webserver_* and selection_anomaly_children
and not 1 of filter_main_**)
and not 1 of filter_main_*)
falsepositives:
- Particular web applications may spawn a shell process legitimately
level: high
Expand Down

0 comments on commit 6a95a17

Please sign in to comment.