Skip to content

Commit 4b183be

Browse files
[Tuning] Suspicious Script Object Execution (#3339)
* Update defense_evasion_suspicious_scrobj_load.toml --------- Co-authored-by: Justin Ibarra <[email protected]>
1 parent 07b952b commit 4b183be

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

rules/windows/defense_evasion_suspicious_scrobj_load.toml

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/09/02"
3-
integration = ["endpoint"]
3+
integration = ["endpoint", "windows"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2023/10/09"
7+
updated_date = "2023/12/14"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,27 +13,25 @@ Identifies scrobj.dll loaded into unusual Microsoft processes. This usually mean
1313
executed in the target process.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.*"]
16+
index = ["logs-endpoint.events.library-*", "logs-windows.sysmon_operational-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Suspicious Script Object Execution"
2020
risk_score = 47
2121
rule_id = "4ed678a9-3a4f-41fb-9fea-f85a6e0a0dff"
2222
severity = "medium"
2323
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Data Source: Elastic Defend"]
24+
timestamp_override = "event.ingested"
2425
type = "eql"
2526

2627
query = '''
27-
sequence by process.entity_id with maxspan=2m
28-
[process where host.os.type == "windows" and event.type == "start"
29-
and (process.code_signature.subject_name in ("Microsoft Corporation", "Microsoft Windows") and
30-
process.code_signature.trusted == true) and
31-
not process.executable : (
28+
any where host.os.type == "windows" and
29+
(event.category == "library" or (event.category == "process" and event.action : "Image loaded*")) and
30+
(?dll.name : "scrobj.dll" or ?file.name : "scrobj.dll") and
31+
process.executable : ("?:\\Windows\\System32\\*.exe", "?:\\Windows\\SysWOW64\\*.exe") and
32+
not process.executable : (
3233
"?:\\Windows\\System32\\cscript.exe",
3334
"?:\\Windows\\SysWOW64\\cscript.exe",
34-
"?:\\Program Files (x86)\\Internet Explorer\\iexplore.exe",
35-
"?:\\Program Files\\Internet Explorer\\iexplore.exe",
36-
"?:\\Windows\\SystemApps\\Microsoft.MicrosoftEdge_*\\MicrosoftEdge.exe",
3735
"?:\\Windows\\system32\\msiexec.exe",
3836
"?:\\Windows\\SysWOW64\\msiexec.exe",
3937
"?:\\Windows\\System32\\smartscreen.exe",
@@ -42,11 +40,14 @@ sequence by process.entity_id with maxspan=2m
4240
"?:\\windows\\SysWOW64\\inetsrv\\w3wp.exe",
4341
"?:\\Windows\\system32\\wscript.exe",
4442
"?:\\Windows\\SysWOW64\\wscript.exe",
43+
"?:\\Windows\\System32\\mshta.exe",
4544
"?:\\Windows\\system32\\mobsync.exe",
4645
"?:\\Windows\\SysWOW64\\mobsync.exe",
4746
"?:\\Windows\\System32\\cmd.exe",
48-
"?:\\Windows\\SysWOW64\\cmd.exe")]
49-
[library where host.os.type == "windows" and event.type == "start" and dll.name : "scrobj.dll"]
47+
"?:\\Windows\\SysWOW64\\cmd.exe",
48+
"?:\\Windows\\System32\\OpenWith.exe",
49+
"?:\\Windows\\System32\\wbem\\WMIADAP.exe",
50+
"?:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe")
5051
'''
5152

5253

0 commit comments

Comments
 (0)