mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 09:12:46 +01:00
Sigma Rule Update (2025-10-08 20:14:59) (#105)
Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
2f228031ff
commit
8168b510ec
@@ -8515,6 +8515,27 @@
|
||||
],
|
||||
"title": "Arbitrary File Download Via MSEDGE_PROXY.EXE"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects attempts to delete Internet Information Services (IIS) log files via command line utilities, which is a common defense evasion technique used by attackers to cover their tracks.\nThreat actors often abuse vulnerabilities in web applications hosted on IIS servers to gain initial access and later delete IIS logs to evade detection.\n",
|
||||
"event_ids": [
|
||||
"4688"
|
||||
],
|
||||
"id": "bb67b9c1-36b4-5057-bac0-7c90c9147791",
|
||||
"level": "medium",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"tags": [
|
||||
"attack.defense-evasion",
|
||||
"attack.t1070"
|
||||
],
|
||||
"title": "IIS WebServer Log Deletion via CommandLine Utilities"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
|
||||
Reference in New Issue
Block a user