1
1
[metadata ]
2
2
creation_date = " 2020/09/02"
3
- integration = [" endpoint" ]
3
+ integration = [" endpoint" , " windows " ]
4
4
maturity = " production"
5
5
min_stack_comments = " New fields added: required_fields, related_integrations, setup"
6
6
min_stack_version = " 8.3.0"
7
- updated_date = " 2023/10/09 "
7
+ updated_date = " 2023/12/14 "
8
8
9
9
[rule ]
10
10
author = [" Elastic" ]
@@ -13,27 +13,25 @@ Identifies scrobj.dll loaded into unusual Microsoft processes. This usually mean
13
13
executed in the target process.
14
14
"""
15
15
from = " now-9m"
16
- index = [" logs-endpoint.events.*" ]
16
+ index = [" logs-endpoint.events.library-* " , " logs-windows.sysmon_operational- *" ]
17
17
language = " eql"
18
18
license = " Elastic License v2"
19
19
name = " Suspicious Script Object Execution"
20
20
risk_score = 47
21
21
rule_id = " 4ed678a9-3a4f-41fb-9fea-f85a6e0a0dff"
22
22
severity = " medium"
23
23
tags = [" Domain: Endpoint" , " OS: Windows" , " Use Case: Threat Detection" , " Tactic: Defense Evasion" , " Data Source: Elastic Defend" ]
24
+ timestamp_override = " event.ingested"
24
25
type = " eql"
25
26
26
27
query = '''
27
- sequence by process.entity_id with maxspan=2m
28
- [process where host.os.type == "windows " and event.type == "start"
29
- and (process.code_signature.subject_name in ("Microsoft Corporation", "Microsoft Windows" ) and
30
- process.code_signature.trusted == true ) and
31
- not process.executable : (
28
+ any where host.os.type == "windows" and
29
+ (event.category == "library" or (event.category == "process " and event.action : "Image loaded*")) and
30
+ (?dll.name : "scrobj.dll" or ?file.name : "scrobj.dll" ) and
31
+ process.executable : ("?:\\Windows\\System32\\*.exe", "?:\\Windows\\SysWOW64\\*.exe" ) and
32
+ not process.executable : (
32
33
"?:\\Windows\\System32\\cscript.exe",
33
34
"?:\\Windows\\SysWOW64\\cscript.exe",
34
- "?:\\Program Files (x86)\\Internet Explorer\\iexplore.exe",
35
- "?:\\Program Files\\Internet Explorer\\iexplore.exe",
36
- "?:\\Windows\\SystemApps\\Microsoft.MicrosoftEdge_*\\MicrosoftEdge.exe",
37
35
"?:\\Windows\\system32\\msiexec.exe",
38
36
"?:\\Windows\\SysWOW64\\msiexec.exe",
39
37
"?:\\Windows\\System32\\smartscreen.exe",
@@ -42,11 +40,14 @@ sequence by process.entity_id with maxspan=2m
42
40
"?:\\windows\\SysWOW64\\inetsrv\\w3wp.exe",
43
41
"?:\\Windows\\system32\\wscript.exe",
44
42
"?:\\Windows\\SysWOW64\\wscript.exe",
43
+ "?:\\Windows\\System32\\mshta.exe",
45
44
"?:\\Windows\\system32\\mobsync.exe",
46
45
"?:\\Windows\\SysWOW64\\mobsync.exe",
47
46
"?:\\Windows\\System32\\cmd.exe",
48
- "?:\\Windows\\SysWOW64\\cmd.exe")]
49
- [library where host.os.type == "windows" and event.type == "start" and dll.name : "scrobj.dll"]
47
+ "?:\\Windows\\SysWOW64\\cmd.exe",
48
+ "?:\\Windows\\System32\\OpenWith.exe",
49
+ "?:\\Windows\\System32\\wbem\\WMIADAP.exe",
50
+ "?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe")
50
51
'''
51
52
52
53
0 commit comments