mirror of
https://github.com/Yamato-Security/WELA.git
synced 2025-12-06 09:12:46 +01:00
Sigma Rule Update (2025-06-28 20:14:20) (#84)
Co-authored-by: YamatoSecurity <YamatoSecurity@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
c0f39c2ef0
commit
8751539c58
@@ -2592,6 +2592,23 @@
|
||||
],
|
||||
"title": "Suspicious Extrac32 Execution"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
"sec"
|
||||
],
|
||||
"description": "Detects potentially suspicious subprocesses such as LOLBINs spawned by web browsers. This activity could be associated with the \"FileFix\" social engineering technique,\nwhere users are tricked into launching the file explorer via a browser-based phishing page and pasting malicious commands into the address bar.\nThe technique abuses clipboard manipulation and disguises command execution as benign file path access, resulting in covert execution of system utilities.\n",
|
||||
"event_ids": [
|
||||
"4688"
|
||||
],
|
||||
"id": "0b4162ed-2534-2656-6d4a-8d2ad218617b",
|
||||
"level": "high",
|
||||
"service": "",
|
||||
"subcategory_guids": [
|
||||
"0CCE922B-69AE-11D9-BED3-505054503030"
|
||||
],
|
||||
"title": "FileFix - Suspicious Child Process from Browser File Upload Abuse"
|
||||
},
|
||||
{
|
||||
"category": "process_creation",
|
||||
"channel": [
|
||||
|
||||
Reference in New Issue
Block a user