Skip to content

Commit 83f8d23

Browse files
fukusuketgithub-actions[bot]
authored andcommitted
Apply changes
1 parent 944f63d commit 83f8d23

2 files changed

Lines changed: 9 additions & 1 deletion

File tree

data/Microsoft_Client/UsableRules.csv

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1465,6 +1465,9 @@ This could be a precursor to a ransomware attack and has been an observed techni
14651465
This could indicate potential exploitation of the updater component to deliver unwanted malware.
14661466
","3f3ab8ff-23de-2bef-b606-fd2585bdc5e2"
14671467
"Suspicious Greedy Compression Using Rar.EXE","high","","process_creation","Detects RAR usage that creates an archive from a suspicious folder, either a system folder or one of the folders often used by attackers for staging purposes","d9100b89-baa5-8f0b-5a28-90217fe41a0f"
1468+
"Python One-Liners with Base64 Decoding","high","","process_creation","Detects Python one-liners that use base64 decoding functions in command line executions.
1469+
Malicious scripts or attackers often use python one-liners to decode and execute base64-encoded payloads, which is a common technique for obfuscation and evasion.
1470+
","89d785d7-fec2-209e-53a3-19a670b7e0ea"
14681471
"Uncommon One Time Only Scheduled Task At 00:00","high","","process_creation","Detects scheduled task creation events that include suspicious actions, and is run once at 00:00","476ef906-3f50-4b93-19a2-cf02ea63f392"
14691472
"Dynamic .NET Compilation Via Csc.EXE","medium","","process_creation","Detects execution of ""csc.exe"" to compile .NET code. Attackers often leverage this to compile code on the fly and use it in other stages.","e20cb030-7e44-e3e0-0314-4f07eae201d0"
14701473
"Certificate Exported Via PowerShell","medium","","process_creation","Detects calls to cmdlets that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.","909ad08b-a33e-57b8-8a0e-98a42a566b03"
@@ -1759,6 +1762,11 @@ Adversaries may delete this key to cover their tracks after executing commands.
17591762
"Permission Check Via Accesschk.EXE","medium","","process_creation","Detects the usage of the ""Accesschk"" utility, an access and privilege audit tool developed by SysInternal and often being abused by attacker to verify process privileges","1ee3a188-7a90-b357-3e25-dd202515f11d"
17601763
"Hardware Model Reconnaissance Via Wmic.EXE","medium","","process_creation","Detects the execution of WMIC with the ""csproduct"" which is used to obtain information such as hardware models and vendor information","ac40503f-520c-79c6-d0e8-3a32c8cec7eb"
17611764
"Suspicious Microsoft Office Child Process","high","","process_creation","Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)","7a1b8071-8f13-c99a-439b-e2769871d008"
1765+
"HackTool - NetExec Execution","high","","process_creation","Detects execution of the hacktool NetExec.
1766+
NetExec (formerly CrackMapExec) is a widely used post-exploitation tool designed for Active Directory penetration testing and network enumeration
1767+
In enterprise environments, the use of NetExec is considered suspicious or potentially malicious because it enables attackers to enumerate hosts, exploit network services, and move laterally across systems.
1768+
Threat actors and red teams commonly use NetExec to identify vulnerable systems, harvest credentials, and execute commands remotely.
1769+
","837269f1-83f1-229a-c835-4371ad44e510"
17621770
"Process Execution From A Potentially Suspicious Folder","high","","process_creation","Detects a potentially suspicious execution from an uncommon folder.","a9dad077-e2f9-a739-8ac0-eb0e6dcbdebb"
17631771
"Shell Process Spawned by Java.EXE","medium","","process_creation","Detects shell spawned from Java host process, which could be a sign of exploitation (e.g. log4j exploitation)","15e3c45c-06b7-5da5-4bc0-66cf00fcc185"
17641772
"UAC Bypass Using IEInstal - Process","high","","process_creation","Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)","27cc5ada-12cd-ee4a-3260-a00437b0ac13"

data/Microsoft_Client/WELA-Audit-Result.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
"Security Advanced (Account Management)","Security Group Management","12","critical:0, high:5, medium:2, low:5, info:0","Success","Success","Success","",""
2222
"Security Advanced (Account Management)","User Account Management","13","critical:0, high:7, medium:4, low:2, info:0","Success","Success","Success","",""
2323
"Security Advanced (Detailed Tracking)","Plug and Play Events","2","critical:0, high:0, medium:1, low:1, info:0","No Auditing","No Auditing","","",""
24-
"Security Advanced (Detailed Tracking)","Process Creation","1396","critical:69, high:683, medium:555, low:86, info:3","No Auditing","Success","Success","","Include command line in process creation events"
24+
"Security Advanced (Detailed Tracking)","Process Creation","1398","critical:69, high:685, medium:555, low:86, info:3","No Auditing","Success","Success","","Include command line in process creation events"
2525
"Security Advanced (Detailed Tracking)","Process Termination","1","critical:0, high:1, medium:0, low:0, info:0","No Auditing","No Auditing","","",""
2626
"Security Advanced (Detailed Tracking)","RPC Events","0","critical:0, high:0, medium:0, low:0, info:0","No Auditing","No Auditing","","",""
2727
"Security Advanced (Detailed Tracking)","Token Right Adjusted Events","0","critical:0, high:0, medium:0, low:0, info:0","No Auditing","No Auditing","","",""

0 commit comments

Comments
 (0)