Files
hayabusa/rules/Sigma/win_ntfs_vuln_exploit.yml
2021-11-14 11:00:56 +09:00

32 lines
928 B
YAML

title: NTFS Vulnerability Exploitation
author: Florian Roth
date: 2021/01/11
description: This the exploitation of a NTFS vulnerability as reported without many
details via Twitter
detection:
SELECTION_1:
EventID: 55
SELECTION_2:
Origin: File System Driver
SELECTION_3:
Description: '*contains a corrupted file record*'
SELECTION_4:
Description: '*The name of the file is "\"*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Unlikely
id: f14719ce-d3ab-4e25-9ce6-2899092260b0
level: critical
logsource:
product: windows
service: system
references:
- https://twitter.com/jonasLyk/status/1347900440000811010
- https://twitter.com/wdormann/status/1347958161609809921
tags:
- attack.impact
- attack.t1499.001
yml_filename: win_ntfs_vuln_exploit.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/builtin