Files
hayabusa/rules/Sigma/win_commandline_path_traversal_evasion.yml
2021-11-14 11:00:56 +09:00

38 lines
1.1 KiB
YAML

title: Command Line Path Traversial Evasion
author: Christian Burkard
date: 2021/10/26
description: Detects the attempt to evade or obfuscate the executed command on the
CommandLine using bogus path traversal
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\Windows\\*'
SELECTION_3:
CommandLine: '*\..\Windows\\*'
SELECTION_4:
CommandLine: '*\..\System32\\*'
SELECTION_5:
CommandLine: '*\..\..\\*'
SELECTION_6:
CommandLine: '*.exe\..\\*'
condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4 or SELECTION_5))
or SELECTION_6))
falsepositives:
- Unknown
id: 1327381e-6ab0-4f38-b583-4c1b8346a56b
level: high
logsource:
category: process_creation
product: windows
references:
- https://twitter.com/hexacorn/status/1448037865435320323
- https://twitter.com/Gal_B1t/status/1062971006078345217
status: experimental
tags:
- attack.defense_evasion
- attack.t1036
yml_filename: win_commandline_path_traversal_evasion.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation