Added Sigma Rules
This commit is contained in:
31
rules/Sigma/sysmon_susp_python_image_load.yml
Normal file
31
rules/Sigma/sysmon_susp_python_image_load.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Python Py2Exe Image Load
|
||||
author: Patrick St. John, OTR (Open Threat Research)
|
||||
date: 2020/05/03
|
||||
description: Detects the image load of Python Core indicative of a Python script bundled
|
||||
with Py2Exe.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: Python Core
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legit Py2Exe Binaries
|
||||
fields:
|
||||
- Description
|
||||
id: cbb56d62-4060-40f7-9466-d8aaf3123f83
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/05/12
|
||||
references:
|
||||
- https://www.py2exe.org/
|
||||
- https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027.002
|
||||
yml_filename: sysmon_susp_python_image_load.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load
|
||||
|
||||
Reference in New Issue
Block a user