Skip to content

Commit

Permalink
Merge pull request #11455 from ank0ku/master
Browse files Browse the repository at this point in the history
Update PasswordSprayingWithMDE.yaml
  • Loading branch information
v-prasadboke authored Nov 21, 2024
2 parents 01f3e2b + 2297f30 commit 6113380
Show file tree
Hide file tree
Showing 5 changed files with 463 additions and 476 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
id: dd22dc4f-ab7c-4d0a-84ad-cc393638ba31
name: Match Legitimate Name or Location - 2
description: |
Attackers often match or approximate the name or location of legitimate files to avoid detection rules that are based trust of certain operating system processes.
Attackers often match or approximate the name or location of legitimate files to avoid detection rules that are based trust of on certain operating system processes.
This query detects mismatches in the parent-child relationship of core operating system processes to uncover different masquerading attempts.
severity: Medium
status: Available
Expand Down Expand Up @@ -58,5 +58,5 @@ entityMappings:
fieldMappings:
- identifier: CommandLine
columnName: ProcessCommandLine
version: 1.0.0
kind: Scheduled
version: 1.0.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -43,9 +43,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: IPAddress
- entityType: Process
fieldMappings:
- identifier: CommandLine
columnName: ProcessCommandLine
version: 1.0.0
kind: Scheduled
version: 1.0.1
kind: Scheduled
Binary file modified Solutions/FalconFriday/Package/3.0.0.zip
Binary file not shown.
2 changes: 1 addition & 1 deletion Solutions/FalconFriday/Package/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -296,7 +296,7 @@
"name": "analytic16-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Attackers often match or approximate the name or location of legitimate files to avoid detection rules that are based trust of certain operating system processes.\nThis query detects mismatches in the parent-child relationship of core operating system processes to uncover different masquerading attempts."
"text": "Attackers often match or approximate the name or location of legitimate files to avoid detection rules that are based trust of on certain operating system processes.\nThis query detects mismatches in the parent-child relationship of core operating system processes to uncover different masquerading attempts."
}
}
]
Expand Down
Loading

0 comments on commit 6113380

Please sign in to comment.