You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

2508 lines
233 KiB

  1. <!-- NOTICE : This is a balanced generated output of Sysmon-modular with medium verbosity -->
  2. <!-- due to the balanced nature of this configuration there will be potential blind spots -->
  3. <!-- for more information go to https://github.com/olafhartong/sysmon-modular/wiki -->
  4. <!-- -->
  5. <!-- //** ***// -->
  6. <!-- ///#(** **%(/// -->
  7. <!-- ((&&&** **&&&(( -->
  8. <!-- (&&&** ,(((((((. **&&&( -->
  9. <!-- ((&&**(((((//(((((((/**&&(( _____ __ __ -->
  10. <!-- (&&///((////(((((((///&&( / ___/__ ___________ ___ ____ ____ ____ ___ ____ ____/ /_ __/ /___ ______ -->
  11. <!-- &////(/////(((((/(////& \__ \/ / / / ___/ __ `__ \/ __ \/ __ \______/ __ `__ \/ __ \/ __ / / / / / __ `/ ___/ -->
  12. <!-- ((// /////(///// /((( ___/ / /_/ (__ ) / / / / / /_/ / / / /_____/ / / / / / /_/ / /_/ / /_/ / / /_/ / / -->
  13. <!-- &(((((#.///////// #(((((& /____/\__, /____/_/ /_/ /_/\____/_/ /_/ /_/ /_/ /_/\____/\__,_/\__,_/_/\__,_/_/ -->
  14. <!-- &&&&((#///////((#((&&&& /____/ -->
  15. <!-- &&&&(#/***//(#(&&&& -->
  16. <!-- &&&&****///&&&& by Olaf Hartong -->
  17. <!-- (& ,&. -->
  18. <!-- .*&&*. -->
  19. <!-- -->
  20. <Sysmon schemaversion="4.60">
  21. <HashAlgorithms>*</HashAlgorithms>
  22. <!-- This now also determines the file names of the files preserved (String) -->
  23. <CheckRevocation>False</CheckRevocation>
  24. <!-- Setting this to true might impact performance -->
  25. <DnsLookup>False</DnsLookup>
  26. <!-- Disables lookup behavior, default is True (Boolean) -->
  27. <ArchiveDirectory>Sysmon</ArchiveDirectory>
  28. <!-- Sets the name of the directory in the C:\ root where preserved files will be saved (String)-->
  29. <EventFiltering>
  30. <!-- Event ID 1 == Process Creation - Includes -->
  31. <RuleGroup groupRelation="or">
  32. <ProcessCreate onmatch="include">
  33. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">sethc.exe</ParentImage>
  34. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">utilman.exe</ParentImage>
  35. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">osk.exe</ParentImage>
  36. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">Magnify.exe</ParentImage>
  37. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">DisplaySwitch.exe</ParentImage>
  38. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">Narrator.exe</ParentImage>
  39. <ParentImage name="technique_id=T1546.008,technique_name=Accessibility Features" condition="image">AtBroker.exe</ParentImage>
  40. <OriginalFileName name="technique_id=T1546.011,technique_name=Application Shimming" condition="is">sdbinst.exe</OriginalFileName>
  41. <OriginalFileName name="technique_id=T1197,technique_name=BITS Jobs" condition="is">bitsadmin.exe</OriginalFileName>
  42. <Rule name="Eventviewer Bypass UAC" groupRelation="and">
  43. <ParentImage name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="image">eventvwr.exe</ParentImage>
  44. <Image condition="is not">c:\windows\system32\mmc.exe</Image>
  45. </Rule>
  46. <ParentImage name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="image">fodhelper.exe</ParentImage>
  47. <Rule name="technique_id=T1021.003,technique_name=Distributed Component Object Model" groupRelation="and">
  48. <ParentCommandLine condition="contains">-Embedding</ParentCommandLine>
  49. <ParentImage condition="is">c:\windows\system32\mmc.exe</ParentImage>
  50. </Rule>
  51. <Rule groupRelation="and">
  52. <CommandLine condition="contains">Set-MpPreference</CommandLine>
  53. <CommandLine condition="contains any">-DisableRealTimeMonitoring $true;-DisableBehaviorMonitoring $true;-DisableBlockAtFirstSeen $true;-DisableIOAVProtection $true;-DisablePrivacyMode $true;-SignatureDisableUpdateOnStartupWithoutEngine $true;-DisableArchiveScanning $true;-DisableIntrusionPreventionSystem $true;-DisableScriptScanning $true</CommandLine>
  54. </Rule>
  55. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">^</CommandLine>
  56. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">../../</CommandLine>
  57. <ParentCommandLine name="technique_id=T1204,technique_name=User Execution" condition="is">C:\Windows\explorer.exe</ParentCommandLine>
  58. <ParentImage name="technique_id=T1204,technique_name=User Execution" condition="is">C:\Windows\explorer.exe</ParentImage>
  59. <Rule name="Fltmc" groupRelation="and">
  60. <OriginalFileName name="technique_id=T1562.006,technique_name=Indicator Blocking" condition="is">fltMC.exe</OriginalFileName>
  61. <CommandLine name="technique_id=T1562.006,technique_name=Indicator Blocking" condition="contains">unload;detach</CommandLine>
  62. </Rule>
  63. <Rule groupRelation="or">
  64. <OriginalFileName name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="is">fltMC.exe</OriginalFileName>
  65. <CommandLine name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="contains">misc::mflt</CommandLine>
  66. </Rule>
  67. <Rule name="InstallUtil" groupRelation="and">
  68. <OriginalFileName name="technique_id=T1218.004,technique_name=InstallUtil" condition="is">InstallUtil.exe</OriginalFileName>
  69. <CommandLine name="technique_id=T1218.004,technique_name=InstallUtil" condition="contains all">/logfile=;/LogToConsole=false;/U</CommandLine>
  70. </Rule>
  71. <OriginalFileName name="technique_id=T1218.002,technique_name=rundll32.exe" condition="contains">rundll32.exe</OriginalFileName>
  72. <OriginalFileName name="technique_id=T1546.008,technique_name=Windows Error Reporting" condition="contains">werfault.exe</OriginalFileName>
  73. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="is">whoami.exe</OriginalFileName>
  74. <OriginalFileName name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="is">ipconfig.exe</OriginalFileName>
  75. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">tasklist.exe</OriginalFileName>
  76. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="contains any">systeminfo.exe;sysinfo.exe</OriginalFileName>
  77. <OriginalFileName name="technique_id=T1049,technique_name=System Network Connections Discovery" condition="is">netstat.exe</OriginalFileName>
  78. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="image">qprocess.exe</OriginalFileName>
  79. <OriginalFileName name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="is">nslookup.exe</OriginalFileName>
  80. <OriginalFileName name="technique_id=T1018,technique_name=Remote System Discovery" condition="contains any">net.exe;net1.exe</OriginalFileName>
  81. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="is">quser.exe</OriginalFileName>
  82. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">query.exe</OriginalFileName>
  83. <OriginalFileName name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="is">tracert.exe</OriginalFileName>
  84. <OriginalFileName name="technique_id=T1083,technique_name=File and Directory Discovery" condition="is">tree.com</OriginalFileName>
  85. <OriginalFileName name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="is">route.exe</OriginalFileName>
  86. <OriginalFileName name="technique_id=T1134,technique_name=Access Token Manipulation" condition="is">runas.exe</OriginalFileName>
  87. <OriginalFileName name="technique_id=T1112,technique_name=Modify Registry" condition="is">reg.exe</OriginalFileName>
  88. <OriginalFileName condition="is">taskkill.exe</OriginalFileName>
  89. <OriginalFileName name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="is">netsh.exe</OriginalFileName>
  90. <OriginalFileName name="technique_id=T1087,technique_name=Account Discovery" condition="is">klist.exe</OriginalFileName>
  91. <OriginalFileName name="technique_id=T1070,technique_name=Indicator Removal on Host" condition="is">wevtutil.exe</OriginalFileName>
  92. <OriginalFileName name="technique_id=T1070,technique_name=Indicator Removal on Host" condition="is">fsutil.exe</OriginalFileName>
  93. <OriginalFileName name="technique_id=T1053,technique_name=Scheduled Task" condition="is">taskeng.exe</OriginalFileName>
  94. <OriginalFileName name="technique_id=T1218.010,technique_name=Regsvr32" condition="is">regsvr32.exe</OriginalFileName>
  95. <ParentImage name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="image">wmiprvse.exe</ParentImage>
  96. <OriginalFileName name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="is">wmiprvse.exe</OriginalFileName>
  97. <OriginalFileName condition="is">hh.exe</OriginalFileName>
  98. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">hh.exe</ParentImage>
  99. <Rule groupRelation="and">
  100. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">hh.exe</ParentImage>
  101. <CommandLine condition="contains">.exe</CommandLine>
  102. </Rule>
  103. <OriginalFileName name="technique_id=T1059,technique_name=Command-Line Interface" condition="is">cmd.exe</OriginalFileName>
  104. <ParentImage name="technique_id=T1059,technique_name=Command-Line Interface" condition="image">cmd.exe</ParentImage>
  105. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</Image>
  106. <ParentImage name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</ParentImage>
  107. <ParentImage name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell_ise.exe</ParentImage>
  108. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">bash.exe</OriginalFileName>
  109. <OriginalFileName name="technique_id=T1574.002,technique_name=DLL Side-Loading" condition="is">odbcconf.exe</OriginalFileName>
  110. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">pcalua.exe</Image>
  111. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">cscript.exe</OriginalFileName>
  112. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">wscript.exe</OriginalFileName>
  113. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">pcalua.exe</ParentImage>
  114. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">cscript.exe</ParentImage>
  115. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">wscript.exe</ParentImage>
  116. <Rule groupRelation="and">
  117. <ParentImage name="technique_id=T1027.004,technique_name=Compile After Delivery" condition="is">csc.exe</ParentImage>
  118. <CommandLine condition="contains">-target:library</CommandLine>
  119. <CommandLine condition="contains">.cs</CommandLine>
  120. </Rule>
  121. <Rule groupRelation="and">
  122. <ParentImage name="technique_id=T1027.004,technique_name=Compile After Delivery" condition="is">csc.exe</ParentImage>
  123. <CommandLine condition="contains">-out:</CommandLine>
  124. <CommandLine condition="contains">.cs</CommandLine>
  125. </Rule>
  126. <Rule groupRelation="and">
  127. <OriginalFileName name="technique_id=T1216,technique_name=Signed Script Proxy Execution" condition="is">cscript.exe</OriginalFileName>
  128. <CommandLine condition="contains">.js</CommandLine>
  129. </Rule>
  130. <ParentImage name="technique_id=T1218.005,technique_name=Mshta" condition="image">mshta.exe</ParentImage>
  131. <ParentImage name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">control.exe</ParentImage>
  132. <OriginalFileName name="technique_id=T1218.005,technique_name=Mshta" condition="is">mshta.exe</OriginalFileName>
  133. <OriginalFileName name="technique_id=T1564.001,technique_name=Hidden Files and Directories" condition="is">attrib.exe</OriginalFileName>
  134. <OriginalFileName name="technique_id=T1087,technique_name=Account Discovery" condition="is">cmdkey.exe</OriginalFileName>
  135. <Rule groupRelation="and">
  136. <ParentImage name="technique_id=T1087,technique_name=Account Discovery" condition="is">cmdkey.exe</ParentImage>
  137. <CommandLine condition="contains">/list</CommandLine>
  138. </Rule>
  139. <OriginalFileName name="technique=T1053,technique_name=At.exe Peridoic Secheduled Task" condition="contains">At.exe</OriginalFileName>
  140. <OriginalFileName name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="contains any">nbtstat.exe;nbtinfo.exe</OriginalFileName>
  141. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">qwinsta.exe</OriginalFileName>
  142. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">rwinsta.exe</OriginalFileName>
  143. <OriginalFileName name="technique_id=T1053,technique_name=Scheduled Tasks" condition="contains any">schtasks.exe;sctasks.exe</OriginalFileName>
  144. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">replace.exe</OriginalFileName>
  145. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">jjs.exe</Image>
  146. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">appcmd.exe</Image>
  147. <OriginalFileName name="technique_id=T1543.003,technique_name=Windows Service" condition="is">sc.exe</OriginalFileName>
  148. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">certutil.exe</OriginalFileName>
  149. <OriginalFileName name="technique_id=T1552.001,technique_name=Credentials in Files" condition="is">findstr.exe</OriginalFileName>
  150. <OriginalFileName name="technique_id=T1552.001,technique_name=Credentials in Files" condition="is">where.exe</OriginalFileName>
  151. <Image name="technique_id=T1222,technique_name=File Permissions Modification" condition="image">forfiles.exe</Image>
  152. <OriginalFileName name="technique_id=T1222,technique_name=File Permissions Modification" condition="contains any">icacls.exe;cacls.exe</OriginalFileName>
  153. <OriginalFileName name="technique_id=T1074,technique_name=Data Staged" condition="is">xcopy.exe</OriginalFileName>
  154. <OriginalFileName name="technique_id=T1074,technique_name=Data Staged" condition="is">robocopy.exe</OriginalFileName>
  155. <OriginalFileName name="technique_id=T1222,technique_name=File Permissions Modification" condition="is">takeown.exe</OriginalFileName>
  156. <OriginalFileName name="technique_id=T,technique_name=" condition="is">makecab.exe</OriginalFileName>
  157. <OriginalFileName name="technique_id=T,technique_name=" condition="is">wusa.exe</OriginalFileName>
  158. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">vssadmin.exe</OriginalFileName>
  159. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="contains any">nltest.exe;nltestk.exe</OriginalFileName>
  160. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">winrs.exe</OriginalFileName>
  161. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Account Control" condition="is">computerdefaults.exe</OriginalFileName>
  162. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Account Control" condition="is">dism.exe</OriginalFileName>
  163. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Account Control" condition="is">fodhelper.exe</OriginalFileName>
  164. <OriginalFileName name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="is">mofcomp.exe</OriginalFileName>
  165. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities" condition="is">Microsoft.Workflow.Compiler.exe</OriginalFileName>
  166. <Image name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="begin with">C:\WINDOWS\system32\wbem\scrcons.exe</Image>
  167. <OriginalFileName name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="is">ScrCons</OriginalFileName>
  168. <Rule name="Extensible Storage Engine Utilities" groupRelation="and">
  169. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">esentutl.exe</OriginalFileName>
  170. <CommandLine name="technique_id=T1003,technique_name=Credential Dumping" condition="contains all">/y;/vss/d</CommandLine>
  171. </Rule>
  172. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">vssadmin.exe;delete</CommandLine>
  173. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">wbadmin.exe;delete</CommandLine>
  174. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">bcedit.exe;set</CommandLine>
  175. <CommandLine name="technique_id=T1127,technique_name=dfsvc.exe Making Network Connections" condition="contains">rundll32.exe dfshim.dll,ShOpenVerbApplication http://</CommandLine>
  176. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">diskshadow.exe</Image>
  177. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains all">diskshadow.exe;/s</CommandLine>
  178. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains all">diskshadow.exe;-s</CommandLine>
  179. <ParentImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">diskshadow.exe</ParentImage>
  180. <OriginalFileName name="technique_id=T1105,technique_name=Remote File Copy with Expand" condition="is">expand.exe</OriginalFileName>
  181. <ParentImage name="technique=T1218,technique_name=Signed Binary Proxy Execution with FTP" condition="is">ftp.exe</ParentImage>
  182. <OriginalFileName name="technique_id=T1105,technique_name=Remote File Copy" condition="is">GfxDownloadWrapper.exe</OriginalFileName>
  183. <CommandLine name="technique_id=1218,technique_name=Signed Binary Proxy Execution" condition="contains">ieexec.exe http</CommandLine>
  184. <CommandLine name="technique_id=T1127,technique_name=Trusted Developer Tools" condition="contains">ilasm</CommandLine>
  185. <OriginalFileName name="technique_id=T1218.004,technique_name=InstallUtil" condition="is">installutil.exe</OriginalFileName>
  186. <OriginalFileName name="technique_id=T1127,technique_name=Javascript compilation" condition="is">jsc.exe</OriginalFileName>
  187. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">msdt.exe</OriginalFileName>
  188. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">rasautou.exe</OriginalFileName>
  189. <Rule name="Alternate Data Streams with Print" groupRelation="and">
  190. <OriginalFileName name="technique_id=T1105,technique_name=Remote File Copy" condition="is">print.exe</OriginalFileName>
  191. <CommandLine name="technique_id=T1105,technique_name=Remote File Copy" condition="contains">:</CommandLine>
  192. </Rule>
  193. <Rule name="Alternate Data Streams with Regedit.exe" groupRelation="and">
  194. <OriginalFileName name="technique_id=T1105,technique_name=Remote File Copy" condition="is">regedit.exe</OriginalFileName>
  195. <CommandLine name="technique_id=T1105,technique_name=Remote File Copy" condition="contains">:</CommandLine>
  196. </Rule>
  197. <OriginalFileName name="technique_id=1218,technique_name=Signed Binary Proxy Execution" condition="is">Register-cimprovider.exe</OriginalFileName>
  198. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">rpcping.exe</OriginalFileName>
  199. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">runscripthelper.exe surfacecheck</CommandLine>
  200. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">Scriptrunner.exe -appvscript</CommandLine>
  201. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">Scriptrunner.exe</OriginalFileName>
  202. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">tttracer.exe</OriginalFileName>
  203. <CommandLine name="technique_id=T1127,technique_name=Trusted Developer Utilities" condition="contains">vbc.exe /target:exe</CommandLine>
  204. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities" condition="contains">vbc.exe</OriginalFileName>
  205. <ParentImage name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">wab.exe</ParentImage>
  206. <ParentImage name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">wsreset.exe</ParentImage>
  207. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">xwizard RunWizard</CommandLine>
  208. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">Appvlp.exe</OriginalFileName>
  209. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">bginfo</CommandLine>
  210. <ParentCommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">bginfo</ParentCommandLine>
  211. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">cbd</CommandLine>
  212. <ParentCommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">csi.exe</ParentCommandLine>
  213. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">csi.exe</OriginalFileName>
  214. <ParentCommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">devtoolslauncher.exe LaunchForDeploy</ParentCommandLine>
  215. <ParentImage name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">devtoolslauncher.exe</ParentImage>
  216. <CommandLine name="technique_id=T1218,technique_name=Proxy Execution of unsigned C# Code" condition="contains all">dnx.exe;consoleapp</CommandLine>
  217. <Rule name="Alternate Data Streams with Regedit.exe" groupRelation="and">
  218. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">dotnet.exe</OriginalFileName>
  219. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="end with">.dll</CommandLine>
  220. </Rule>
  221. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is" />
  222. <CommandLine name="technique_id=T1217,technique_name=Trusted Script Proxy Execution" condition="contains">pester</CommandLine>
  223. <CommandLine name="technique_id=T1218,technique_name=Trusted Script Proxy Execution" condition="contains">winrm</CommandLine>
  224. <CommandLine name="technique_id=T1216,technique_name=Trusted Script Proxy Execution" condition="contains">slmgr</CommandLine>
  225. <CommandLine name="technique_id=T1216,technique_name=Trusted Script Proxy Execution" condition="contains">pubprn</CommandLine>
  226. <CommandLine name="technique_id=T1216,technique_name=Trusted Script Proxy Execution" condition="contains">manage-bde</CommandLine>
  227. <CommandLine name="technique_id=T1216,technique_name=Trusted Script Proxy Execution" condition="contains">CL_Invocation</CommandLine>
  228. <CommandLine name="technique_id=T1216,technique_name=Trusted Script Proxy Execution" condition="contains">CL_Mutexverifiers</CommandLine>
  229. <ParentImage name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">wsl.exe</ParentImage>
  230. <ParentImage name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">vsjitdebugger.exe</ParentImage>
  231. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains">vsjitdebugger</CommandLine>
  232. <CommandLine name="technique_id=T1105,technique_name=Remote File Copy" condition="contains all">update;--download</CommandLine>
  233. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">update.exe;--update</CommandLine>
  234. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">update.exe;--ProcessStart</CommandLine>
  235. <OriginalFileName name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">tracker.exe</OriginalFileName>
  236. <OriginalFileName name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">te.exe</OriginalFileName>
  237. <CommandLine name="technique_id=T1105,technique_name=Remote File Copy" condition="contains all">squirrel;--download</CommandLine>
  238. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">squirrel.exe;--update</CommandLine>
  239. <OriginalFileName name="technique_id=1086,technique_name=Powershell" condition="contains">Sqlps.exe</OriginalFileName>
  240. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">sqldumper.exe</OriginalFileName>
  241. <OriginalFileName name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">rcsi.exe</OriginalFileName>
  242. <Rule name="AD Dump with ntdsutil" groupRelation="and">
  243. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">ntdsutil.exe</OriginalFileName>
  244. <CommandLine name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">ifm</CommandLine>
  245. </Rule>
  246. <OriginalFileName name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">msxls.exe</OriginalFileName>
  247. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains">msdeploy.exe -verb:sync -source:RunCommand</CommandLine>
  248. <ParentImage name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">mftrace.exe</ParentImage>
  249. <ParentImage name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">dxcap.exe</ParentImage>
  250. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">dxcap.exe;-c</CommandLine>
  251. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">dxcap.exe;/c</CommandLine>
  252. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">taskmgr.exe</OriginalFileName>
  253. <OriginalFileName name="technique_id=T1112,technique_name=Modify Registry" condition="is">regedit.exe</OriginalFileName>
  254. <OriginalFileName name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="is">netsh.exe</OriginalFileName>
  255. <OriginalFileName name="technique_id=T1053,technique_name=Scheduled Task/Job" condition="is">taskeng.exe</OriginalFileName>
  256. <OriginalFileName name="technique_id=T1218.010,technique_name=Regsvr32" condition="is">regsvr32.exe</OriginalFileName>
  257. <OriginalFileName name="technique_id=T1059.003,technique_name=Windows Command Shell" condition="is">cmd.exe</OriginalFileName>
  258. <ParentImage name="technique_id=T1059.003,technique_name=Windows Command Shell" condition="image">cmd.exe</ParentImage>
  259. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</Image>
  260. <ParentImage name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</ParentImage>
  261. <ParentImage name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell_ise.exe</ParentImage>
  262. <ParentImage name="technique_id=T1218.005,technique_name=Mshta" condition="image">mshta.exe</ParentImage>
  263. <OriginalFileName name="technique_id=T1218.005,technique_name=Mshta" condition="is">mshta.exe</OriginalFileName>
  264. <OriginalFileName name="technique_id=T1564.001,technique_name=Hidden Files and DirectoriesHidden Files and Directories" condition="is">attrib.exe</OriginalFileName>
  265. <OriginalFileName name="technique_id=T1053,technique_name=Scheduled Task/Job" condition="contains any">schtasks.exe;sctasks.exe</OriginalFileName>
  266. <OriginalFileName name="technique_id=T1543.003,technique_name=Windows Service" condition="is">sc.exe</OriginalFileName>
  267. <OriginalFileName name="technique_id=T1202,technique_name=Indirect Command Execution" condition="is">desktopimgdownldr.exe</OriginalFileName>
  268. <OriginalFileName name="technique_id=T1552.001,technique_name=Credentials in Files" condition="is">findstr.exe</OriginalFileName>
  269. <OriginalFileName name="technique_id=T1552.001,technique_name=Credentials in Files" condition="is">where.exe</OriginalFileName>
  270. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="is">computerdefaults.exe</OriginalFileName>
  271. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="is">dism.exe</OriginalFileName>
  272. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="is">fodhelper.exe</OriginalFileName>
  273. <OriginalFileName name="technique_id=T1078,technique_name=Valid Accounts" condition="is">djoin.exe</OriginalFileName>
  274. <OriginalFileName name="technique_id=T1040,technique_name=Network Sniffing" condition="is">PktMon.exe</OriginalFileName>
  275. <Image name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="begin with">C:\WINDOWS\system32\wbem\scrcons.exe</Image>
  276. <Rule name="Extensible Storage Engine Utilities" groupRelation="and">
  277. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">esentutl.exe</OriginalFileName>
  278. <CommandLine name="technique_id=T1003,technique_name=Credential Dumping" condition="contains all">/y;/vss/d</CommandLine>
  279. </Rule>
  280. <Rule name="Domain Name" groupRelation="and">
  281. <OriginalFileName name="technique_id=1482,technique_name=Domain Trust Discovery" condition="is">nltestrk.exe</OriginalFileName>
  282. <CommandLine name="technique_id=T1482,technique_name=Domain Trust Discovery" condition="contains">/domain_trusts</CommandLine>
  283. </Rule>
  284. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">ATBroker.exe</OriginalFileName>
  285. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">csc.exe</OriginalFileName>
  286. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">dfsvc.exe</OriginalFileName>
  287. <OriginalFileName name="technique_id=T1569.002,technique_name=Service Execution" condition="is">dnscmd.exe</OriginalFileName>
  288. <OriginalFileName name="technique_id=T1564.004,technique_name=NTFS File Attributes" condition="is">esentutl.exe</OriginalFileName>
  289. <OriginalFileName name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="is">expand</OriginalFileName>
  290. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">extexport.exe</OriginalFileName>
  291. <OriginalFileName name="technique_id=T1564.004,technique_name=NTFS File Attributes" condition="is">extrac32.exe</OriginalFileName>
  292. <OriginalFileName name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="is">IEExec.exe</OriginalFileName>
  293. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">ilasm.exe</OriginalFileName>
  294. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">InfDefaultInstall.EXE</OriginalFileName>
  295. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">jsc.exe</OriginalFileName>
  296. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">vbc.exe</OriginalFileName>
  297. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">Microsoft.Workflow.Compiler.exe</OriginalFileName>
  298. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">msconfig.EXE</OriginalFileName>
  299. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">msiexec.exe</OriginalFileName>
  300. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">odbcconf.exe</OriginalFileName>
  301. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">PresentationHost.exe</OriginalFileName>
  302. <OriginalFileName name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="is">Print.Exe</OriginalFileName>
  303. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">rasdlui.exe</OriginalFileName>
  304. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">RegisterCimProvider2.exe</OriginalFileName>
  305. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">RegisterCimProvider.exe</OriginalFileName>
  306. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">ScriptRunner.exe</OriginalFileName>
  307. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">TTTracer.exe</OriginalFileName>
  308. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">verclsid.exe</OriginalFileName>
  309. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="is">wab.exe</OriginalFileName>
  310. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="is">WSReset.exe</OriginalFileName>
  311. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="is">xwizard.exe</OriginalFileName>
  312. <OriginalFileName name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="is">curl.exe</OriginalFileName>
  313. <Rule name="Mavinject" groupRelation="and">
  314. <OriginalFileName name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains any">Mavinject.exe;mavinject64.exe</OriginalFileName>
  315. <CommandLine name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="contains">/INJECTRUNNING</CommandLine>
  316. </Rule>
  317. <Rule name="CMSTP" groupRelation="and">
  318. <OriginalFileName name="technique_id=T1218.003,technique_name=CMSTP" condition="is">CMSTP.exe</OriginalFileName>
  319. <CommandLine name="technique_id=T1218.003,technique_name=CMSTP" condition="contains all">/ni;/s</CommandLine>
  320. </Rule>
  321. <OriginalFileName name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="is">MSBuild.exe</OriginalFileName>
  322. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">excel.exe</ParentImage>
  323. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">winword.exe</ParentImage>
  324. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">powerpnt.exe</ParentImage>
  325. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">outlook.exe</ParentImage>
  326. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">msaccess.exe</ParentImage>
  327. <ParentImage name="technique_id=T1137,technique_name=Office Application Startup" condition="image">mspub.exe</ParentImage>
  328. <OriginalFileName name="technique_id=T1218.009,technique_name=Regsvcs/Regasm" condition="contains any">regsvcs.exe;regasm.exe</OriginalFileName>
  329. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">FromBase64</CommandLine>
  330. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">gzip</CommandLine>
  331. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">decompress</CommandLine>
  332. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">http</CommandLine>
  333. <CommandLine name="technique_id=T1027,technique_name=Obfuscated Files or Information" condition="contains">replace</CommandLine>
  334. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">SyncAppvPublishingServer.exe</Image>
  335. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">PsList.exe</OriginalFileName>
  336. <OriginalFileName name="technique_id=T1007,technique_name=System Service Discovery" condition="is">PsService.exe</OriginalFileName>
  337. <OriginalFileName name="technique_id=T1569.002,technique_name=Service Execution" condition="is">PsExec.exe</OriginalFileName>
  338. <OriginalFileName name="technique_id=T1569.002,technique_name=Service Execution" condition="is">PsExec.c</OriginalFileName>
  339. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="is">PsGetSID.exe</OriginalFileName>
  340. <OriginalFileName name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="is">PsKill.exe</OriginalFileName>
  341. <OriginalFileName name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="is">PKill.exe</OriginalFileName>
  342. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">ProcDump</OriginalFileName>
  343. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="is">PsLoggedOn.exe</OriginalFileName>
  344. <OriginalFileName name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">PsFile.exe</OriginalFileName>
  345. <OriginalFileName name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">ShellRunas</OriginalFileName>
  346. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">PipeList.exe</OriginalFileName>
  347. <OriginalFileName name="technique_id=T1083,technique_name=File and Directory Discovery" condition="is">AccessChk.exe</OriginalFileName>
  348. <OriginalFileName name="technique_id=T1083,technique_name=File and Directory Discovery" condition="is">AccessEnum.exe</OriginalFileName>
  349. <OriginalFileName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="is">LogonSessions.exe</OriginalFileName>
  350. <OriginalFileName name="technique_id=T1005,technique_name=Data from Local System" condition="is">PsLogList.exe</OriginalFileName>
  351. <OriginalFileName name="technique_id=T1057,technique_name=Process Discovery" condition="is">PsInfo.exe</OriginalFileName>
  352. <OriginalFileName name="technique_id=T1007,technique_name=System Service Discovery" condition="contains">LoadOrd</OriginalFileName>
  353. <OriginalFileName name="technique_id=T1098,technique_name=Account Manipulation" condition="is">PsPasswd.exe</OriginalFileName>
  354. <OriginalFileName name="technique_id=T1012,technique_name=Query Registry" condition="is">ru.exe</OriginalFileName>
  355. <OriginalFileName name="technique_id=T1012,technique_name=Query Registry" condition="contains">Regsize</OriginalFileName>
  356. <OriginalFileName name="technique_id=T1003,technique_name=Credential Dumping" condition="is">ProcDump</OriginalFileName>
  357. <CommandLine name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">-ma lsass.exe</CommandLine>
  358. <CommandLine name="technique_id=T1036,technique_name=Process Evasion" condition="contains">-accepteula -ma</CommandLine>
  359. <Rule groupRelation="and">
  360. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">vssadmin.exe</OriginalFileName>
  361. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">delete;shadow</CommandLine>
  362. </Rule>
  363. <Rule groupRelation="and">
  364. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">vssadmin.exe</OriginalFileName>
  365. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">resize;shadowstorage</CommandLine>
  366. </Rule>
  367. <Rule groupRelation="and">
  368. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">wmic.exe</OriginalFileName>
  369. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">delete;shadowcopy</CommandLine>
  370. </Rule>
  371. <Rule groupRelation="and">
  372. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">wbadmin.exe</OriginalFileName>
  373. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">delete;catalog</CommandLine>
  374. </Rule>
  375. <Rule groupRelation="and">
  376. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">bcdedit.exe</OriginalFileName>
  377. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">recoveryenabled;no</CommandLine>
  378. </Rule>
  379. <Rule groupRelation="and">
  380. <OriginalFileName name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="is">bcdedit.exe</OriginalFileName>
  381. <CommandLine name="technique_id=T1490,technique_name=Inhibit System Recovery" condition="contains all">bootstatuspolicy;ignoreallfailures</CommandLine>
  382. </Rule>
  383. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\PerfLogs\</Image>
  384. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\$Recycle.bin\</Image>
  385. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Intel\Logs\</Image>
  386. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Default\</Image>
  387. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Public\</Image>
  388. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\NetworkService\</Image>
  389. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Fonts\</Image>
  390. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Debug\</Image>
  391. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Media\</Image>
  392. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Help\</Image>
  393. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\addins\</Image>
  394. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\repair\</Image>
  395. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\security\</Image>
  396. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\system32\config\systemprofile\</Image>
  397. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">VolumeShadowCopy</Image>
  398. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\htdocs\</Image>
  399. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\wwwroot\</Image>
  400. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Temp\</Image>
  401. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Downloads\</Image>
  402. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Desktop\</Image>
  403. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Appdata\Local\</Image>
  404. <Rule name="Control Panel Items" groupRelation="or">
  405. <CommandLine name="technique_id=T1218.002,technique_name=Control Panel Items" condition="contains all">control;/name</CommandLine>
  406. <CommandLine name="technique_id=T1218.002,technique_name=Control Panel Items" condition="contains all">rundll32.exe;shell32.dll;Control_RunDLL</CommandLine>
  407. </Rule>
  408. <Rule name="Windows Defender tampering" groupRelation="and">
  409. <Image name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="image">MpCmdRun.exe</Image>
  410. <CommandLine name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="contains any">Add-MpPreference;RemoveDefinitions;DisableIOAVProtection</CommandLine>
  411. </Rule>
  412. <OriginalFileName name="technique_id=T1021.006,technique_name=Windows Remote Management" condition="is">wsmprovhost.exe</OriginalFileName>
  413. <OriginalFileName name="technique_id=T1021.006,technique_name=Windows Remote Management" condition="is">winrshost.exe</OriginalFileName>
  414. <Image name="technique_id=T1021.006,technique_name=Windows Remote Management" condition="image">winrm.cmd</Image>
  415. <ParentImage name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="is">wsl.exe</ParentImage>
  416. <ParentCommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;-e</ParentCommandLine>
  417. <ParentCommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;/e</ParentCommandLine>
  418. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;-e</CommandLine>
  419. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;/e</CommandLine>
  420. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;-u root</CommandLine>
  421. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;/u root</CommandLine>
  422. <CommandLine name="technique_id=T1218,technique_name=Trusted Binary Proxy Execution" condition="contains all">wsl.exe;--exec bash</CommandLine>
  423. <Rule name="Remote Copy via wsl" groupRelation="and">
  424. <CommandLine name="technique_id=T1202,technique_name=Remote File Copy" condition="contains all">wsl.exe;--exec bash</CommandLine>
  425. <CommandLine name="technique_id=T1202,technique_name=Remote File Copy" condition="contains all">/dev/tcp</CommandLine>
  426. </Rule>
  427. </ProcessCreate>
  428. </RuleGroup>
  429. <!-- Event ID 1 == Process Creation - Excludes -->
  430. <RuleGroup groupRelation="or">
  431. <ProcessCreate onmatch="exclude">
  432. <Rule groupRelation="and">
  433. <Image condition="end with">AcroRd32.exe</Image>
  434. <CommandLine condition="contains any">/CR;channel=</CommandLine>
  435. </Rule>
  436. <Rule groupRelation="or">
  437. <Image condition="end with">C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe</Image>
  438. <ParentImage condition="end with">C:\Program Files (x86)\Common Files\Adobe\AdobeGCClient\AGSService.exe</ParentImage>
  439. <Image condition="end with">C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe</Image>
  440. <Image condition="end with">C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\LogTransport2.exe</Image>
  441. </Rule>
  442. <Image condition="end with">C:\Program Files (x86)\Adobe\Adobe Creative Cloud\ACC\Creative Cloud.exe</Image>
  443. <ParentImage condition="end with">C:\Program Files (x86)\Adobe\Adobe Creative Cloud\ACC\Creative Cloud.exe</ParentImage>
  444. <ParentImage condition="end with">C:\Program Files (x86)\Adobe\Adobe Creative Cloud\CCXProcess\CCXProcess.exe</ParentImage>
  445. <ParentImage condition="end with">C:\Program Files (x86)\Adobe\Adobe Creative Cloud\CoreSync\CoreSync.exe</ParentImage>
  446. <Image condition="end with">C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe</Image>
  447. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe</Image>
  448. <ParentImage condition="end with">C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe</ParentImage>
  449. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe</Image>
  450. <Image condition="end with">C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe</Image>
  451. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\Adobe Desktop Common\HEX\Adobe CEF Helper.exe</Image>
  452. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\AdobeGCClient\AdobeGCClient.exe</Image>
  453. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\P6\adobe_licutil.exe</Image>
  454. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\P7\adobe_licutil.exe</Image>
  455. <ParentImage condition="end with">C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\P7\adobe_licutil.exe</ParentImage>
  456. <Image condition="end with">C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe</Image>
  457. <ParentImage condition="is">C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe</ParentImage>
  458. <ParentCommandLine condition="is">"C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe" -Embedding</ParentCommandLine>
  459. <Rule groupRelation="and">
  460. <ParentImage condition="is">"C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe"</ParentImage>
  461. <CommandLine condition="is">"C:\Windows\system32\cscript.exe" /nologo "MonitorKnowledgeDiscovery.vbs"</CommandLine>
  462. </Rule>
  463. <ParentImage condition="end with">C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe</ParentImage>
  464. <CommandLine condition="begin with">C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe</CommandLine>
  465. <Image condition="is">C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe</Image>
  466. <Image condition="is">C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe</Image>
  467. <Image condition="is">C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe</Image>
  468. <Image condition="is">C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe</Image>
  469. <ParentCommandLine condition="contains">C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe</ParentCommandLine>
  470. <ParentImage condition="is">C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe</ParentImage>
  471. <ParentImage condition="is">C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe</ParentImage>
  472. <ParentImage condition="is">C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe</ParentImage>
  473. <ParentImage condition="is">C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe</ParentImage>
  474. <ParentImage condition="is">C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe</ParentImage>
  475. <Image condition="begin with">C:\Program Files\NVIDIA Corporation\</Image>
  476. <Image condition="begin with">C:\Program Files\Realtek\</Image>
  477. <ParentImage condition="end with">C:\Program Files\Realtek\Audio\HDA\RtkAudioService64.exe</ParentImage>
  478. <Image condition="end with">C:\Program Files (x86)\Dropbox\Update\DropboxUpdate.exe</Image>
  479. <ParentImage condition="end with">C:\Program Files (x86)\Dropbox\Update\DropboxUpdate.exe</ParentImage>
  480. <Image condition="is">C:\Program Files\ESET\ESET Nod32 Antivirus\ekrn.exe</Image>
  481. <CommandLine condition="begin with">"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=</CommandLine>
  482. <CommandLine condition="begin with">"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=</CommandLine>
  483. <Image condition="begin with">C:\Program Files (x86)\Google\Update\</Image>
  484. <ParentImage condition="begin with">C:\Program Files (x86)\Google\Update\</ParentImage>
  485. <ParentImage condition="is">C:\Program Files (x86)\RES Software\Workspace Manager\pfwsmgr.exe</ParentImage>
  486. <ParentImage condition="is">C:\Program Files (x86)\RES Software\Workspace Manager\respesvc64.exe</ParentImage>
  487. <ParentImage condition="is">C:\Program Files (x86)\Ivanti\Workspace Control\pfwsmgr.exe</ParentImage>
  488. <ParentImage condition="is">C:\Program Files (x86)\RES Software\Workspace Manager\ResPesvc64.exe</ParentImage>
  489. <ParentImage condition="is">C:\Program Files\RES Software\Workspace Manager\respesvc.exe</ParentImage>
  490. <ParentImage condition="is">C:\Program Files\Ivanti\Workspace Control\ResPesvc.exe</ParentImage>
  491. <Image condition="is">C:\Program Files\Malwarebytes\Anti-Malware\mbam.exe</Image>
  492. <Image condition="is">C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe</Image>
  493. <Image condition="is">C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe</Image>
  494. <Image condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe</Image>
  495. <ParentImage condition="end with">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe</ParentImage>
  496. <ParentImage condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe</ParentImage>
  497. <Image condition="is">C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE</Image>
  498. <Image condition="is">C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE</Image>
  499. <CommandLine condition="begin with">"C:\Program Files\Mozilla Firefox\plugin-container.exe" --channel</CommandLine>
  500. <CommandLine condition="begin with">"C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe" --channel</CommandLine>
  501. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  502. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Intelligence\swi_service.exe</Image>
  503. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Control\swc_service.exe</Image>
  504. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos System Protection\ssp.exe</Image>
  505. <Image condition="is">C:\Program Files (x86)\Sophos\Remote Management System\RouterNT.exe</Image>
  506. <Image condition="is">C:\Program Files (x86)\Sophos\AutoUpdate\ALsvc.exe</Image>
  507. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\SAVAdminService.exe</Image>
  508. <Image condition="is">C:\Program Files (x86)\Sophos\Remote Management System\ManagementAgentNT.exe</Image>
  509. <Image condition="begin with">C:\Program Files\Splunk\bin\</Image>
  510. <ParentImage condition="is">C:\Program Files\Splunk\bin\splunkd.exe</ParentImage>
  511. <ParentImage condition="is">C:\Program Files\Splunk\bin\splunk.exe</ParentImage>
  512. <Image condition="begin with">D:\Program Files\Splunk\bin\</Image>
  513. <ParentImage condition="is">D:\Program Files\Splunk\bin\splunkd.exe</ParentImage>
  514. <ParentImage condition="is">D:\Program Files\Splunk\bin\splunk.exe</ParentImage>
  515. <Image condition="begin with">C:\Program Files\SplunkUniversalForwarder\bin\</Image>
  516. <ParentImage condition="is">C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe</ParentImage>
  517. <ParentImage condition="is">C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe</ParentImage>
  518. <Image condition="begin with">D:\Program Files\SplunkUniversalForwarder\bin\</Image>
  519. <ParentImage condition="is">D:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe</ParentImage>
  520. <ParentImage condition="is">D:\Program Files\SplunkUniversalForwarder\bin\splunk.exe</ParentImage>
  521. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k appmodel -s StateRepository</CommandLine>
  522. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k appmodel</CommandLine>
  523. <CommandLine condition="is">C:\WINDOWS\system32\svchost.exe -k appmodel -p -s tiledatamodelsvc</CommandLine>
  524. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k camera -s FrameServer</CommandLine>
  525. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k dcomlaunch -s LSM</CommandLine>
  526. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k dcomlaunch -s PlugPlay</CommandLine>
  527. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k defragsvc</CommandLine>
  528. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k devicesflow -s DevicesFlowUserSvc</CommandLine>
  529. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k imgsvc</CommandLine>
  530. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localService -s EventSystem</CommandLine>
  531. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localService -s bthserv</CommandLine>
  532. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localService -s nsi</CommandLine>
  533. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localService -s w32Time</CommandLine>
  534. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceAndNoImpersonation</CommandLine>
  535. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNetworkRestricted -s Dhcp</CommandLine>
  536. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNetworkRestricted -s EventLog</CommandLine>
  537. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNetworkRestricted -s TimeBrokerSvc</CommandLine>
  538. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNetworkRestricted -s WFDSConMgrSvc</CommandLine>
  539. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNetworkRestricted</CommandLine>
  540. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceAndNoImpersonation -s SensrSvc</CommandLine>
  541. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localServiceNoNetwork</CommandLine>
  542. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -p -s WPDBusEnum</CommandLine>
  543. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -p -s fhsvc</CommandLine>
  544. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s DeviceAssociationService</CommandLine>
  545. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s NcbService</CommandLine>
  546. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s SensorService</CommandLine>
  547. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s TabletInputService</CommandLine>
  548. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s UmRdpService</CommandLine>
  549. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s WPDBusEnum</CommandLine>
  550. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted -s WdiSystemHost</CommandLine>
  551. <CommandLine condition="is">C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost</CommandLine>
  552. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted</CommandLine>
  553. <CommandLine condition="is">C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s wlidsvc</CommandLine>
  554. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -p -s ncaSvc</CommandLine>
  555. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s BDESVC</CommandLine>
  556. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s BITS</CommandLine>
  557. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s CertPropSvc</CommandLine>
  558. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc</CommandLine>
  559. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s Gpsvc</CommandLine>
  560. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s ProfSvc</CommandLine>
  561. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s SENS</CommandLine>
  562. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s SessionEnv</CommandLine>
  563. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s Themes</CommandLine>
  564. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt</CommandLine>
  565. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs</CommandLine>
  566. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService -p -s DoSvc</CommandLine>
  567. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService -s Dnscache</CommandLine>
  568. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService -s LanmanWorkstation</CommandLine>
  569. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService -s NlaSvc</CommandLine>
  570. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService -s TermService</CommandLine>
  571. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkService</CommandLine>
  572. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k networkServiceNetworkRestricted</CommandLine>
  573. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k rPCSS</CommandLine>
  574. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k secsvcs</CommandLine>
  575. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k swprv</CommandLine>
  576. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k unistackSvcGroup</CommandLine>
  577. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k utcsvc</CommandLine>
  578. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k wbioSvcGroup</CommandLine>
  579. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k werSvcGroup</CommandLine>
  580. <CommandLine condition="is">C:\WINDOWS\System32\svchost.exe -k wsappx -p -s ClipSVC</CommandLine>
  581. <CommandLine condition="is">C:\WINDOWS\system32\svchost.exe -k wsappx -p -s AppXSvc</CommandLine>
  582. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k wsappx -s ClipSVC</CommandLine>
  583. <CommandLine condition="is">C:\Windows\system32\svchost.exe -k wsappx</CommandLine>
  584. <ParentCommandLine condition="is">C:\Windows\system32\svchost.exe -k netsvcs</ParentCommandLine>
  585. <ParentCommandLine condition="is">C:\Windows\system32\svchost.exe -k localSystemNetworkRestricted</ParentCommandLine>
  586. <Image condition="is">C:\Program Files\Trend Micro\Deep Security Agent\ds_monitor.exe</Image>
  587. <Image condition="is">C:\Program Files\Trend Micro\Deep Security Agent\dsa.exe</Image>
  588. <Image condition="is">C:\Program Files\Trend Micro\Deep Security Agent\dsuam.exe</Image>
  589. <Image condition="is">C:\Program Files\Trend Micro\Deep Security Agent\Notifier.exe</Image>
  590. <Image condition="is">C:\Program Files\Trend Micro\Deep Security Agent\lib\Patch.exe</Image>
  591. <Image condition="is">C:\Program Files (x86)\Trend Micro\BM\TMBMSRV.exe</Image>
  592. <Image condition="is">C:\Program Files (x86)\Trend Micro\OfficeScan Client\TmopExtIns32.exe</Image>
  593. <Image condition="is">C:\Program Files (x86)\Trend Micro\OfficeScan Client\TmExtIns.exe</Image>
  594. <Image condition="is">C:\Program Files (x86)\Trend Micro\OfficeScan Client\TmListen.exe</Image>
  595. <Image condition="begin with">C:\Program Files\Windows Defender\</Image>
  596. <Image condition="is">C:\Windows\system32\MpSigStub.exe</Image>
  597. <Image condition="begin with">C:\Windows\SoftwareDistribution\Download\Install\AM_</Image>
  598. <Image condition="is">C:\Program Files\Microsoft Security Client\MpCmdRun.exe</Image>
  599. <CommandLine condition="begin with">C:\Windows\system32\DllHost.exe /Processid</CommandLine>
  600. <CommandLine condition="is">C:\Windows\system32\SearchIndexer.exe /Embedding</CommandLine>
  601. <Image condition="end with">C:\Windows\System32\CompatTelRunner.exe</Image>
  602. <Image condition="is">C:\Windows\System32\MusNotification.exe</Image>
  603. <Image condition="is">C:\Windows\System32\MusNotificationUx.exe</Image>
  604. <Image condition="is">C:\Windows\System32\audiodg.exe</Image>
  605. <Image condition="is">C:\Windows\System32\conhost.exe</Image>
  606. <Image condition="is">C:\Windows\System32\powercfg.exe</Image>
  607. <Image condition="is">C:\Windows\System32\wbem\WmiApSrv.exe</Image>
  608. <Image condition="is">C:\Windows\System32\wermgr.exe</Image>
  609. <Image condition="is">C:\Windows\SysWOW64\wermgr.exe</Image>
  610. <Image condition="is">C:\Windows\system32\sppsvc.exe</Image>
  611. <IntegrityLevel condition="is">AppContainer</IntegrityLevel>
  612. <ParentCommandLine condition="begin with">%%SystemRoot%%\system32\csrss.exe ObjectDirectory=\Windows</ParentCommandLine>
  613. <ParentImage condition="is">C:\Windows\system32\SearchIndexer.exe</ParentImage>
  614. </ProcessCreate>
  615. </RuleGroup>
  616. <!-- Event ID 2 == File Creation Time - Includes -->
  617. <RuleGroup groupRelation="or">
  618. <FileCreateTime onmatch="include">
  619. <Image name="technique_id=T1070.006,technique_name=Timestomp" condition="begin with">C:\Temp</Image>
  620. <Image name="technique_id=T1070.006,technique_name=Timestomp" condition="begin with">C:\Windows\Temp</Image>
  621. <Image name="technique_id=T1070.006,technique_name=Timestomp" condition="begin with">C:\Tmp</Image>
  622. <Image name="technique_id=T1070.006,technique_name=Timestomp" condition="begin with">C:\Users</Image>
  623. </FileCreateTime>
  624. </RuleGroup>
  625. <!-- Event ID 2 == File Creation Time - Excludes -->
  626. <RuleGroup groupRelation="or">
  627. <FileCreateTime onmatch="exclude">
  628. <Image condition="end with">AppData\Local\Google\Chrome\Application\chrome.exe</Image>
  629. <Image condition="end with">Root\VFS\ProgramFilesX86\Google\Chrome\Application\chrome.exe</Image>
  630. <Image condition="image">OneDrive.exe</Image>
  631. <Image condition="contains">setup</Image>
  632. <Image condition="end with">slack.exe</Image>
  633. <Image condition="end with">AppData\Local\Microsoft\Teams\current\Teams.exe</Image>
  634. </FileCreateTime>
  635. </RuleGroup>
  636. <!-- Event ID 3 == Network Connection - Includes -->
  637. <RuleGroup groupRelation="or">
  638. <NetworkConnect onmatch="include">
  639. <Image name="technique_id=T1021,technique_name=Remote Services" condition="image">vnc.exe</Image>
  640. <Image name="technique_id=T1021,technique_name=Remote Services" condition="image">vncviewer.exe</Image>
  641. <Image name="technique_id=T1021,technique_name=Remote Services" condition="image">vncservice.exe</Image>
  642. <Image name="technique_id=T1569.002,technique_name=Service Execution" condition="image">winexesvc.exe</Image>
  643. <Image name="technique_id=T1197,technique_name=BITS Jobs" condition="image">bitsadmin.exe</Image>
  644. <Image name="technique_id=T1021,technique_name=Remote Services" condition="image">omniinet.exe</Image>
  645. <Image name="technique_id=T1021,technique_name=Remote Services" condition="image">hpsmhd.exe</Image>
  646. <Image name="technique_id=T1102,technique_name=Web Service" condition="begin with">C:\Program Files\Microsoft\HybridConnectionManager</Image>
  647. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">ipconfig.exe</Image>
  648. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">tasklist.exe</Image>
  649. <Image name="technique_id=T1049,technique_name=System Network Connections Discovery" condition="image">netstat.exe</Image>
  650. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qprocess.exe</Image>
  651. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">nslookup.exe</Image>
  652. <Image name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="image">quser.exe</Image>
  653. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">query.exe</Image>
  654. <Image name="technique_id=T1134,technique_name=Access Token Manipulation" condition="image">runas.exe</Image>
  655. <Image name="technique_id=T1112,technique_name=Modify Registry" condition="image">reg.exe</Image>
  656. <Image name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="image">netsh.exe</Image>
  657. <Image condition="image">klist.exe</Image>
  658. <Image name="technique_id=T1070,technique_name=Indicator Removal on Host" condition="image">wevtutil.exe</Image>
  659. <Image name="technique_id=T1053,technique_name=Scheduled Task/Job" condition="image">taskeng.exe</Image>
  660. <Image name="technique_id=T1218.010,technique_name=Regsvr32" condition="image">regsvr32.exe</Image>
  661. <Image name="technique_id=T1059.003,technique_name=Windows Command Shell" condition="image">cmd.exe</Image>
  662. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</Image>
  663. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">bash.exe</Image>
  664. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">pcalua.exe</Image>
  665. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">cscript.exe</Image>
  666. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">wscript.exe</Image>
  667. <Image name="technique_id=T1218.005,technique_name=Mshta" condition="image">mshta.exe</Image>
  668. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">nbtstat.exe</Image>
  669. <Image name="technique_id=T1069,technique_name=Permission Groups Discovery" condition="image">net1.exe</Image>
  670. <Image name="technique_id=T1018,technique_name=Remote System Discovery" condition="image">nslookup.exe</Image>
  671. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qwinsta.exe</Image>
  672. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">rwinsta.exe</Image>
  673. <Image name="technique_id=T1543.003,technique_name=Windows Service" condition="image">sc.exe</Image>
  674. <Image name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="image">nltest.exe</Image>
  675. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">winrs.exe</Image>
  676. <Image name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="image">dfsvc.exe</Image>
  677. <Image name="technique_id=T1569.002,technique_name=Service Execution" condition="image">dnscmd.exe</Image>
  678. <Image name="technique_id=T1564.004,technique_name=NTFS File Attributes" condition="image">esentutl.exe</Image>
  679. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">expand.exe</Image>
  680. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">extrac32.exe</Image>
  681. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">IEExec.exe</Image>
  682. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">Msdt.exe</Image>
  683. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">msiexec.exe</Image>
  684. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">Print.Exe</Image>
  685. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">RegisterCimProvider.exe</Image>
  686. <Image name="technique_id=T1003,technique_name=Credential Dumping" condition="image">RpcPing.exe</Image>
  687. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">ScriptRunner.exe</Image>
  688. <Image name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="image">xwizard.exe</Image>
  689. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">desktopimgdownldr.exe</Image>
  690. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">OpenConsole.exe</Image>
  691. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">WindowsTerminal.exe</Image>
  692. <Image condition="image">dllhost.exe</Image>
  693. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">ipconfig.exe</Image>
  694. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">tasklist.exe</Image>
  695. <Image name="technique_id=T1049,technique_name=System Network Connections Discovery" condition="image">netstat.exe</Image>
  696. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qprocess.exe</Image>
  697. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">nslookup.exe</Image>
  698. <Image name="technique_id=T1018,technique_name=Remote System Discovery" condition="image">net.exe</Image>
  699. <Image name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="image">quser.exe</Image>
  700. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">query.exe</Image>
  701. <Image name="technique_id=T1134,technique_name=Access Token Manipulation" condition="image">runas.exe</Image>
  702. <Image name="technique_id=T1112,technique_name=Modify Registry" condition="image">reg.exe</Image>
  703. <Image name="technique_id=T1518.001,technique_name=Security Software Discovery" condition="image">netsh.exe</Image>
  704. <Image condition="image">klist.exe</Image>
  705. <Image name="technique_id=T1070,technique_name=Indicator Removal on Host" condition="image">wevtutil.exe</Image>
  706. <Image name="technique_id=T1053,technique_name=Scheduled Task/Job" condition="image">taskeng.exe</Image>
  707. <Image name="technique_id=T1218.010,technique_name=Regsvr32" condition="image">regsvr32.exe</Image>
  708. <Image condition="image">hh.exe</Image>
  709. <Image name="technique_id=T1059.003,technique_name=Windows Command Shell" condition="image">cmd.exe</Image>
  710. <Image name="technique_id=T1059.001,technique_name=PowerShell" condition="image">powershell.exe</Image>
  711. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">bash.exe</Image>
  712. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">pcalua.exe</Image>
  713. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">cscript.exe</Image>
  714. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">wscript.exe</Image>
  715. <Image name="technique_id=T1218.005,technique_name=Mshta" condition="image">mshta.exe</Image>
  716. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">nbtstat.exe</Image>
  717. <Image name="technique_id=T1069,technique_name=Permission Groups Discovery" condition="image">net1.exe</Image>
  718. <Image name="technique_id=T1018,technique_name=Remote System Discovery" condition="image">nslookup.exe</Image>
  719. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qwinsta.exe</Image>
  720. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">rwinsta.exe</Image>
  721. <Image condition="image">schtasks.exe</Image>
  722. <Image condition="image">taskkill.exe</Image>
  723. <Image name="technique_id=T1543.003,technique_name=Windows Service" condition="image">sc.exe</Image>
  724. <Image name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="image">nltest.exe</Image>
  725. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">winrs.exe</Image>
  726. <Image name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="image">dfsvc.exe</Image>
  727. <Image name="technique_id=T1569.002,technique_name=Service Execution" condition="image">dnscmd.exe</Image>
  728. <Image name="technique_id=T1564.004,technique_name=NTFS File Attributes" condition="image">esentutl.exe</Image>
  729. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">expand.exe</Image>
  730. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">extrac32.exe</Image>
  731. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">IEExec.exe</Image>
  732. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">Msdt.exe</Image>
  733. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">msiexec.exe</Image>
  734. <Image name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="image">Print.Exe</Image>
  735. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">RegisterCimProvider.exe</Image>
  736. <Image name="technique_id=T1003,technique_name=Credential Dumping" condition="image">RpcPing.exe</Image>
  737. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">ScriptRunner.exe</Image>
  738. <Image name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="image">xwizard.exe</Image>
  739. <Image name="technique_id=T1202,technique_name=Indirect Command Execution" condition="image">desktopimgdownldr.exe</Image>
  740. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">Mavinject.exe</Image>
  741. <Image name="technique_id=T1053,technique_name=Scheduled Task" condition="image">at.exe</Image>
  742. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">certutil.exe</Image>
  743. <Image name="technique_id=T1218,technique_name=Signed Script Proxy Execution" condition="image">cscript.exe</Image>
  744. <Image condition="image">java.exe</Image>
  745. <Image name="technique_id=T1218.005,technique_name=Mshta" condition="image">mshta.exe</Image>
  746. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">msiexec.exe</Image>
  747. <Image name="technique_id=T1069,technique_name=Permission Groups Discovery" condition="image">net.exe</Image>
  748. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">notepad.exe</Image>
  749. <Image name="technique_id=T1012,technique_name=Query Registry" condition="image">reg.exe</Image>
  750. <Image name="technique_id=T1218,technique_name=Regsvr32" condition="image">regsvr32.exe</Image>
  751. <Image name="technique_id=T1218.011,technique_name=Rundll32" condition="image">rundll32.exe</Image>
  752. <Image name="technique_id=T1543.003,technique_name=Windows Service" condition="image">sc.exe</Image>
  753. <Image name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="image">wmic.exe</Image>
  754. <Image name="technique_id=T1218,technique_name=Signed Script Proxy Execution" condition="image">wscript.exe</Image>
  755. <Image condition="image">driverquery.exe</Image>
  756. <Image name="technique_id=T1069,technique_name=Permission Groups Discovery" condition="image">dsquery.exe</Image>
  757. <Image name="technique_id=T1069,technique_name=Permission Groups Discovery" condition="image">AdFind.exe</Image>
  758. <Image condition="image">hh.exe</Image>
  759. <Image condition="image">infDefaultInstall.exe</Image>
  760. <Image condition="image">javaw.exe</Image>
  761. <Image condition="image">javaws.exe</Image>
  762. <Image name="technique_id=T1543.003,technique_name=Windows Service" condition="image">mmc.exe</Image>
  763. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">msbuild.exe</Image>
  764. <Image name="technique_id=T1016,technique_name=System Network Configuration Discovery" condition="image">nbtstat.exe</Image>
  765. <Image name="technique_id=T1018,technique_name=Remote System Discovery" condition="image">nslookup.exe</Image>
  766. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qprocess.exe</Image>
  767. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">qwinsta.exe</Image>
  768. <Image name="technique_id=T1218.009,technique_name=Regsvcs/Regasm" condition="image">regsvcs.exe</Image>
  769. <Image name="technique_id=T1057,technique_name=Process Discovery" condition="image">rwinsta.exe</Image>
  770. <Image name="technique_id=T1053,technique_name=Scheduled Task/Job" condition="image">schtasks.exe</Image>
  771. <Image name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="image">taskkill.exe</Image>
  772. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">replace.exe</Image>
  773. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">1080</DestinationPort>
  774. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">3128</DestinationPort>
  775. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">8080</DestinationPort>
  776. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">22</DestinationPort>
  777. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">23</DestinationPort>
  778. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">25</DestinationPort>
  779. <Rule groupRelation="and">
  780. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">88</DestinationPort>
  781. <Image condition="is not">C:\Windows\System32\lsass.exe</Image>
  782. </Rule>
  783. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">3389</DestinationPort>
  784. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">5800</DestinationPort>
  785. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">5900</DestinationPort>
  786. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">5985</DestinationPort>
  787. <DestinationPort name="technique_id=T1021,technique_name=Remote Services" condition="is">5986</DestinationPort>
  788. <Image name="technique_id=T1569.002,technique_name=Service Execution" condition="image">psexec.exe</Image>
  789. <Image name="technique_id=T1569.002,technique_name=Service Execution" condition="image">psexesvc.exe</Image>
  790. <Rule groupRelation="and">
  791. <SourcePort name="technique_id=T1557,technique_name=Adversary-in-the-Middle" condition="is any">445;389;8492;636;3268;3269</SourcePort>
  792. <Image condition="is not">C:\Windows\System32\lsass.exe</Image>
  793. <Image condition="is not">c:\Windows\System32\dsamain.exe</Image>
  794. <ProcessId condition="is not">4</ProcessId>
  795. </Rule>
  796. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users</Image>
  797. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\ProgramData</Image>
  798. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Temp</Image>
  799. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Temp</Image>
  800. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\PerfLogs\</Image>
  801. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\$Recycle.bin\</Image>
  802. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Intel\Logs\</Image>
  803. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Default\</Image>
  804. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Public\</Image>
  805. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\NetworkService\</Image>
  806. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Fonts\</Image>
  807. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Debug\</Image>
  808. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Media\</Image>
  809. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Help\</Image>
  810. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\addins\</Image>
  811. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\repair\</Image>
  812. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\security\</Image>
  813. <Image name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\system32\config\systemprofile\</Image>
  814. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\htdocs\</Image>
  815. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\wwwroot\</Image>
  816. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\Local\</Image>
  817. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\Local\Temp\</Image>
  818. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\Roaming\</Image>
  819. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\LocalLow\</Image>
  820. <Image name="technique_id=T1036,technique_name=Masquerading" condition="contains">C:\Windows\SysWOW64</Image>
  821. <Image name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="image">SyncAppvPublishingServer.exe</Image>
  822. <Image condition="image">tor.exe</Image>
  823. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">1723</DestinationPort>
  824. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">4500</DestinationPort>
  825. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">9001</DestinationPort>
  826. <DestinationPort name="technique_id=T1571,technique_name=Non-Standard Port" condition="is">9030</DestinationPort>
  827. <DestinationPort name="technique_id=T1021.006,technique_name=Windows Remote Management" condition="is">5985</DestinationPort>
  828. <DestinationPort name="technique_id=T1021.006,technique_name=Windows Remote Management" condition="is">5986</DestinationPort>
  829. </NetworkConnect>
  830. </RuleGroup>
  831. <!-- Event ID 3 == Network Connection - Excludes -->
  832. <RuleGroup groupRelation="or">
  833. <NetworkConnect onmatch="exclude">
  834. <Image condition="end with">AppData\Roaming\Dropbox\bin\Dropbox.exe</Image>
  835. <Image condition="end with">winlogbeat.exe</Image>
  836. <Image condition="end with">packetbeat.exe</Image>
  837. <Image condition="is">C:\Program Files\ESET\ESET Nod32 Antivirus\ekrn.exe</Image>
  838. <Rule groupRelation="and">
  839. <Image condition="is">C:\Windows\System32\lsass.exe</Image>
  840. <DestinationPort condition="is">88</DestinationPort>
  841. </Rule>
  842. <Image condition="image">OneDrive.exe</Image>
  843. <Image condition="image">OneDriveStandaloneUpdater.exe</Image>
  844. <Image condition="end with">ownCloud\owncloud.exe</Image>
  845. <Image condition="is">C:\Program Files\Palo Alto Networks\Traps\cyserver.exe</Image>
  846. <Rule groupRelation="and">
  847. <Protocol condition="is">udp</Protocol>
  848. <DestinationPort condition="is">3389</DestinationPort>
  849. </Rule>
  850. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Intelligence\swi_service.exe</Image>
  851. <Image condition="is">C:\Program Files (x86)\Sophos\AutoUpdate\ALsvc.exe</Image>
  852. <Image condition="is">C:\Program Files (x86)\Sophos\Remote Management System\RouterNT.exe</Image>
  853. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Control\swc_service.exe</Image>
  854. <Image condition="is">C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Intelligence\swi_service.exe</Image>
  855. <Image condition="is">C:\Program Files\Sophos\Sophos Network Threat Protection\bin\SntpService.exe</Image>
  856. <Image condition="end with">AppData\Roaming\Spotify\Spotify.exe</Image>
  857. <Image condition="end with">AppData\Local\SynologyDrive\SynologyDrive.app\bin\cloud-drive-ui.exe</Image>
  858. <Image condition="end with">AppData\Local\SynologyDrive\SynologyDrive.app\bin\cloud-drive-daemon.exe</Image>
  859. <Image condition="is">C:\Program files (x86)\Trend Micro\OfficeScan Client\tmlisten.exe</Image>
  860. <Image condition="is">C:\Program Files (x86)\Trend Micro\BM\TMBMSRV.exe</Image>
  861. <DestinationHostname condition="end with">.windowsupdate.microsoft.com</DestinationHostname>
  862. <DestinationHostname condition="end with">.windowsupdate.com</DestinationHostname>
  863. <DestinationHostname condition="end with">wustat.windows.com</DestinationHostname>
  864. <DestinationHostname condition="end with">go.microsoft.com</DestinationHostname>
  865. <DestinationHostname condition="end with">.update.microsoft.com</DestinationHostname>
  866. <DestinationHostname condition="end with">download.microsoft.com</DestinationHostname>
  867. <DestinationHostname condition="end with">microsoft.com.akadns.net</DestinationHostname>
  868. <DestinationHostname condition="end with">microsoft.com.nsatc.net</DestinationHostname>
  869. </NetworkConnect>
  870. </RuleGroup>
  871. <!-- Event ID 5 == Process Terminated - Includes -->
  872. <RuleGroup groupRelation="or">
  873. <ProcessTerminate onmatch="include">
  874. <Image condition="begin with">C:\Users</Image>
  875. <Image condition="begin with">C:\Temp</Image>
  876. <Image condition="begin with">C:\Windows\Temp</Image>
  877. </ProcessTerminate>
  878. </RuleGroup>
  879. <!-- Event ID 6 == Driver Loaded - Excludes -->
  880. <RuleGroup groupRelation="or">
  881. <!--Default to log all and exclude only valid signed Microsoft or Intel drivers-->
  882. <DriverLoad onmatch="exclude">
  883. <Rule groupRelation="and">
  884. <Signature condition="begin with">Intel </Signature>
  885. <SignatureStatus condition="is">Valid</SignatureStatus>
  886. </Rule>
  887. <Rule groupRelation="and">
  888. <Signature condition="contains">Microsoft</Signature>
  889. <SignatureStatus condition="is">Valid</SignatureStatus>
  890. </Rule>
  891. </DriverLoad>
  892. </RuleGroup>
  893. <!-- Event ID 7 == Image Loaded - Includes -->
  894. <RuleGroup groupRelation="or">
  895. <ImageLoad onmatch="include">
  896. <Rule groupRelation="and">
  897. <OriginalFileName name="technique_id=T1059.001,technique_name=PowerShell" condition="is">amsi.dll</OriginalFileName>
  898. <Image condition="excludes any">powershell.exe;powershell_ise.exe</Image>
  899. </Rule>
  900. <Rule groupRelation="and">
  901. <Image name="technique_id=T1037.005,technique_name=Boot or Logon Initialization Scripts - Startup Items" condition="end with">bginfo.exe</Image>
  902. <ImageLoaded condition="contains any">System.ni.dll;System.Core.ni.dll</ImageLoaded>
  903. </Rule>
  904. <ImageLoaded name="technique_id=T1197,technique_name=BITS" condition="end with">bitsproxy.dll</ImageLoaded>
  905. <Rule groupRelation="and">
  906. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">clr.dll</OriginalFileName>
  907. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  908. </Rule>
  909. <Rule groupRelation="and">
  910. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">clrjit.dll</OriginalFileName>
  911. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  912. </Rule>
  913. <Rule groupRelation="and">
  914. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">mscoreei.dll</OriginalFileName>
  915. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  916. </Rule>
  917. <Rule groupRelation="and">
  918. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">mscoree.dll</OriginalFileName>
  919. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  920. </Rule>
  921. <Rule groupRelation="and">
  922. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">mscoreeis.dll</OriginalFileName>
  923. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  924. </Rule>
  925. <Rule groupRelation="and">
  926. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">mscorlib.dll</OriginalFileName>
  927. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  928. </Rule>
  929. <Rule groupRelation="and">
  930. <OriginalFileName name="technique_id=T1055,technique_name=Process Injection" condition="is">mscorlib.ni.dll</OriginalFileName>
  931. <Image condition="excludes">C:\Windows\Microsoft.NET\</Image>
  932. </Rule>
  933. <ImageLoaded name="technique_id=T1047,technique_name=Windows Scheduled Tasks" condition="end with">mstask.dll</ImageLoaded>
  934. <ImageLoaded name="technique_id=T1059,technique_name=Command and Scripting Interpreter" condition="end with">wshom.ocx</ImageLoaded>
  935. <OriginalFileName condition="is">scrrun.dll</OriginalFileName>
  936. <OriginalFileName condition="is">vbscript.dll</OriginalFileName>
  937. <Rule groupRelation="and">
  938. <OriginalFileName name="technique_id=T1218.005,technique_name=MSHTA with AMSI Bypass" condition="is">jscript.dll</OriginalFileName>
  939. <Image condition="end with">mshta.exe</Image>
  940. </Rule>
  941. <Rule groupRelation="and">
  942. <OriginalFileName name="technique_id=T1218.005,technique_name=MSHTA with AMSI Bypass" condition="is">jscript9.dll</OriginalFileName>
  943. <Image condition="end with">mshta.exe</Image>
  944. </Rule>
  945. <ImageLoaded name="technique_id=T1137,technique_name=Office Application Startup" condition="end with">.wll</ImageLoaded>
  946. <ImageLoaded name="technique_id=T1137,technique_name=Office Application Startup" condition="end with">.xll</ImageLoaded>
  947. <Rule groupRelation="and">
  948. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  949. <OriginalFileName name="technique_id=T1559.001,technique_name=Component Object Model" condition="is">combase.dll</OriginalFileName>
  950. </Rule>
  951. <Rule groupRelation="and">
  952. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  953. <OriginalFileName name="technique_id=T1559.001,technique_name=Component Object Model" condition="is">coml2.dll</OriginalFileName>
  954. </Rule>
  955. <Rule groupRelation="and">
  956. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  957. <OriginalFileName name="technique_id=T1559.001,technique_name=Component Object Model" condition="is">comsvcs.dll</OriginalFileName>
  958. </Rule>
  959. <Rule groupRelation="and" name="technique_id=T1055,technique_name=Process Injection">
  960. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  961. <ImageLoaded condition="begin with">C:\Windows\assembly\</ImageLoaded>
  962. </Rule>
  963. <Rule groupRelation="and" name="technique_id=T1055,technique_name=Process Injection">
  964. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  965. <ImageLoaded condition="begin with">C:\Windows\Microsoft.NET\assembly\GAC_MSIL</ImageLoaded>
  966. </Rule>
  967. <Rule groupRelation="and" name="technique_id=T1055,technique_name=Process Injection">
  968. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  969. <OriginalFileName condition="is">clr.dll</OriginalFileName>
  970. </Rule>
  971. <Rule groupRelation="and" name="technique_id=T1059.005,technique_name=Command and Scripting Interpreter VBScript">
  972. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  973. <OriginalFileName condition="is">VBE7INTL.DLL</OriginalFileName>
  974. </Rule>
  975. <Rule groupRelation="and" name="technique_id=T1059.005,technique_name=Command and Scripting Interpreter VBScript">
  976. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  977. <OriginalFileName condition="is">VBE7.DLL</OriginalFileName>
  978. </Rule>
  979. <Rule groupRelation="and" name="technique_id=T1059.005,technique_name=Command and Scripting Interpreter VBScript">
  980. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  981. <OriginalFileName condition="is">VBEUI.DLL</OriginalFileName>
  982. </Rule>
  983. <Rule groupRelation="and" name="technique_id=T1137.001,technique_name=Office Application Startup - Office Template Macros">
  984. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  985. <OriginalFileName condition="is">OUTLVBA.DLL</OriginalFileName>
  986. </Rule>
  987. <Image name="technique_id=T1137,technique_name=Office Application Startup" condition="end with">VSTOInstaller.exe</Image>
  988. <Rule groupRelation="and">
  989. <Image name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains all">C:\Program Files;\Microsoft Office\root\Office</Image>
  990. <ImageLoaded condition="is">C:\Windows\SysWOW64\wbem\wbemdisp.dll</ImageLoaded>
  991. </Rule>
  992. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">system.management.automation.ni.dll</ImageLoaded>
  993. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">system.management.automation.dll</ImageLoaded>
  994. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">Microsoft.PowerShell.Commands.Diagnostics.dll</ImageLoaded>
  995. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">Microsoft.PowerShell.Commands.Management.dll</ImageLoaded>
  996. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">Microsoft.PowerShell.Commands.Utility.dll</ImageLoaded>
  997. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">Microsoft.PowerShell.ConsoleHost.dll</ImageLoaded>
  998. <ImageLoaded name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">Microsoft.PowerShell.Security.dll</ImageLoaded>
  999. <ImageLoaded name="technique_id=1210,technique_name=Exploitation of Remote Services" condition="begin with">C:\Windows\System32\spool\drivers\</ImageLoaded>
  1000. <OriginalFileName name="technique_id=T1112,technique_name=Modify Registry" condition="is">regsvc.dll</OriginalFileName>
  1001. <Rule groupRelation="and">
  1002. <Image condition="end with">rundll32.exe</Image>
  1003. <OriginalFileName name="technique_id=T1003.004,technique_name=LSASS Memory" condition="is">comsvcs.dll</OriginalFileName>
  1004. </Rule>
  1005. <OriginalFileName name="technique_id=T1053,technique_name=Scheduled Task" condition="is">taskschd.dll</OriginalFileName>
  1006. <ImageLoaded name="technique_id=T1218.010,technique_name=Regsvr32" condition="end with">scrobj.dll</ImageLoaded>
  1007. <OriginalFileName name="technique_id=T1218.010,technique_name=Regsvr32" condition="is">scrobj.dll</OriginalFileName>
  1008. <ImageLoaded name="technique_id=T1574.002,technique_name=DLL Side-Loading" condition="contains any">admin$;c$;\\;\appdata\;\temp\</ImageLoaded>
  1009. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">c:\programdata\</ImageLoaded>
  1010. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\Media\</ImageLoaded>
  1011. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\addins\</ImageLoaded>
  1012. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\system32\config\systemprofile\</ImageLoaded>
  1013. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\Debug\</ImageLoaded>
  1014. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\Temp</ImageLoaded>
  1015. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\PerfLogs\</ImageLoaded>
  1016. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\Help\</ImageLoaded>
  1017. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Intel\Logs\</ImageLoaded>
  1018. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Temp</ImageLoaded>
  1019. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\repair\</ImageLoaded>
  1020. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\security\</ImageLoaded>
  1021. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">C:\Windows\Fonts\</ImageLoaded>
  1022. <ImageLoaded condition="contains" name="technique_id=T1574.002,technique_name=DLL Side-Loading">Downloads</ImageLoaded>
  1023. <ImageLoaded condition="contains" name="technique_id=T1574.002,technique_name=DLL Side-Loading">Public</ImageLoaded>
  1024. <ImageLoaded condition="contains" name="technique_id=T1574.002,technique_name=DLL Side-Loading">Documents</ImageLoaded>
  1025. <ImageLoaded condition="contains" name="technique_id=T1574.002,technique_name=DLL Side-Loading">Music</ImageLoaded>
  1026. <ImageLoaded condition="contains" name="technique_id=T1574.002,technique_name=DLL Side-Loading">Video</ImageLoaded>
  1027. <ImageLoaded condition="begin with" name="technique_id=T1574.002,technique_name=DLL Side-Loading">file:</ImageLoaded>
  1028. <ImageLoaded name="technique_id=T1574.002,technique_name=DLL Side-Loading" condition="contains">$Recycle.bin\</ImageLoaded>
  1029. <ImageLoaded name="technique_id=T1574.002,technique_name=DLL Side-Loading" condition="contains">\Windows\IME\</ImageLoaded>
  1030. <Rule groupRelation="and">
  1031. <OriginalFileName condition="is">urlmon.dll</OriginalFileName>
  1032. </Rule>
  1033. <ImageLoaded name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="end with">wmiutils.dll</ImageLoaded>
  1034. </ImageLoad>
  1035. </RuleGroup>
  1036. <!-- Event ID 7 == Image Loaded - Excludes -->
  1037. <RuleGroup groupRelation="or">
  1038. <ImageLoad onmatch="exclude">
  1039. <Rule groupRelation="and">
  1040. <Image condition="is">C:\Windows\System32\cscript.exe</Image>
  1041. <OriginalFileName condition="is">scrobj.dll</OriginalFileName>
  1042. </Rule>
  1043. <Rule groupRelation="and">
  1044. <Image name="technique_id=T1137,technique_name=Office Application Startup" condition="end with">VSTOInstaller.exe</Image>
  1045. <ImageLoaded condition="begin with">C:\Windows\</ImageLoaded>
  1046. </Rule>
  1047. <Rule groupRelation="and">
  1048. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1049. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\FileSyncTelemetryExtensions.dll</ImageLoaded>
  1050. </Rule>
  1051. <Rule groupRelation="and">
  1052. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1053. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\FileCoAuthLib.dll</ImageLoaded>
  1054. </Rule>
  1055. <Rule groupRelation="and">
  1056. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1057. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\OneDriveTelemetryStable.dll</ImageLoaded>
  1058. </Rule>
  1059. <Rule groupRelation="and">
  1060. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1061. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\vcruntime140.dll</ImageLoaded>
  1062. </Rule>
  1063. <Rule groupRelation="and">
  1064. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1065. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\UpdateRingSettings.dll</ImageLoaded>
  1066. </Rule>
  1067. <Rule groupRelation="and">
  1068. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1069. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\LoggingPlatform.dll</ImageLoaded>
  1070. </Rule>
  1071. <Rule groupRelation="and">
  1072. <Image condition="contains all"> C:\Users\;\AppData\Local\Microsoft\OneDrive;\FileCoAuth.exe</Image>
  1073. <ImageLoaded condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\;\FileCoAuth.exe</ImageLoaded>
  1074. </Rule>
  1075. </ImageLoad>
  1076. </RuleGroup>
  1077. <!-- Event ID 8 == CreateRemoteThread - Excludes -->
  1078. <RuleGroup groupRelation="or">
  1079. <!--Default to log all and exclude a few common processes-->
  1080. <CreateRemoteThread onmatch="exclude">
  1081. <SourceImage condition="is">C:\Windows\System32\svchost.exe</SourceImage>
  1082. <SourceImage condition="is">C:\Windows\System32\wininit.exe</SourceImage>
  1083. <SourceImage condition="is">C:\Windows\System32\csrss.exe</SourceImage>
  1084. <SourceImage condition="is">C:\Windows\System32\services.exe</SourceImage>
  1085. <SourceImage condition="is">C:\Windows\System32\winlogon.exe</SourceImage>
  1086. <SourceImage condition="is">C:\Windows\System32\audiodg.exe</SourceImage>
  1087. <Rule groupRelation="and">
  1088. <SourceImage condition="is">C:\Windows\System32\dwm.exe</SourceImage>
  1089. <TargetImage condition="is">C:\Windows\System32\csrss.exe</TargetImage>
  1090. </Rule>
  1091. <TargetImage condition="end with">Google\Chrome\Application\chrome.exe</TargetImage>
  1092. <SourceImage condition="is">C:\Windows\System32\wbem\WmiPrvSE.exe</SourceImage>
  1093. </CreateRemoteThread>
  1094. </RuleGroup>
  1095. <!-- Event ID 9 == RawAccessRead - Includes -->
  1096. <RuleGroup groupRelation="or">
  1097. <RawAccessRead onmatch="include" />
  1098. </RuleGroup>
  1099. <!-- Event ID 10 == ProcessAccess - Includes -->
  1100. <RuleGroup groupRelation="or">
  1101. <ProcessAccess onmatch="include">
  1102. <CallTrace name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">dbghelp.dll</CallTrace>
  1103. <CallTrace name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">dbgcore.dll</CallTrace>
  1104. <TargetImage condition="contains">Desktop</TargetImage>
  1105. <Rule groupRelation="and">
  1106. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\csrss.exe</TargetImage>
  1107. <GrantedAccess>0x1F1FFF</GrantedAccess>
  1108. </Rule>
  1109. <Rule groupRelation="and">
  1110. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\wininit.exe</TargetImage>
  1111. <GrantedAccess>0x1F1FFF</GrantedAccess>
  1112. </Rule>
  1113. <Rule groupRelation="and">
  1114. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\winlogon.exe</TargetImage>
  1115. <GrantedAccess>0x1F1FFF</GrantedAccess>
  1116. </Rule>
  1117. <Rule groupRelation="and">
  1118. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\services.exe</TargetImage>
  1119. <GrantedAccess>0x1F1FFF</GrantedAccess>
  1120. </Rule>
  1121. <GrantedAccess name="technique_id=T1055.012,technique_name=Process Hollowing">0x21410</GrantedAccess>
  1122. <Rule groupRelation="and">
  1123. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\lsass.exe</TargetImage>
  1124. <GrantedAccess>0x1FFFFF</GrantedAccess>
  1125. </Rule>
  1126. <Rule groupRelation="and">
  1127. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\lsass.exe</TargetImage>
  1128. <GrantedAccess>0x1F1FFF</GrantedAccess>
  1129. </Rule>
  1130. <Rule groupRelation="and">
  1131. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\lsass.exe</TargetImage>
  1132. <GrantedAccess>0x1010</GrantedAccess>
  1133. </Rule>
  1134. <Rule groupRelation="and">
  1135. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="is">C:\Windows\system32\lsass.exe</TargetImage>
  1136. <GrantedAccess>0x143A</GrantedAccess>
  1137. </Rule>
  1138. <Rule groupRelation="and">
  1139. <TargetImage name="technique_id=T1003,technique_name=Credential Dumping" condition="image">lsass.exe</TargetImage>
  1140. <SourceImage name="technique_id=T1003,technique_name=Credential Dumping" condition="image">wsmprovhost.exe</SourceImage>
  1141. </Rule>
  1142. <Rule groupRelation="and" name="technique_id=T1055,technique_name=Process Injection">
  1143. <SourceImage condition="contains all">C:\Program Files;\Microsoft Office\Root\Office</SourceImage>
  1144. <CallTrace condition="contains">\Microsoft Shared\VBA</CallTrace>
  1145. </Rule>
  1146. <Rule groupRelation="and">
  1147. <CallTrace name="technique_id=T1055.001,technique_name=Dynamic-link Library Injection" condition="contains all">C:\Windows\SYSTEM32\ntdll.dll;C:\Windows\System32\kernelbase.dll;UNKNOWN</CallTrace>
  1148. <GrantedAccess name="technique_id=T1055.001,technique_name=Dynamic-link Library Injection" condition="contains any">0x1F0FFF;0x1F1FFF;0x143A;0x1410;0x1010;0x1F2FFF;0x1F3FFF;0x1FFFFF;0x147A</GrantedAccess>
  1149. </Rule>
  1150. <GrantedAccess name="technique_id=T1055.012,technique_name=Process Hollowing">0x0800</GrantedAccess>
  1151. <GrantedAccess name="technique_id=T1003,technique_name=Credential Dumping">0x0810</GrantedAccess>
  1152. <GrantedAccess name="technique_id=T1055,technique_name=Process Injection">0x0820</GrantedAccess>
  1153. <GrantedAccess name="technique_id=T1055.012,technique_name=Process Hollowing">0x800</GrantedAccess>
  1154. <GrantedAccess name="technique_id=T1003,technique_name=Credential Dumping">0x810</GrantedAccess>
  1155. <GrantedAccess name="technique_id=T1055,technique_name=Process Injection">0x820</GrantedAccess>
  1156. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\PerfLogs\</SourceImage>
  1157. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\$Recycle.bin\</SourceImage>
  1158. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Intel\Logs\</SourceImage>
  1159. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Default\</SourceImage>
  1160. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\Public\</SourceImage>
  1161. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Users\NetworkService\</SourceImage>
  1162. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Fonts\</SourceImage>
  1163. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Debug\</SourceImage>
  1164. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Media\</SourceImage>
  1165. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\Help\</SourceImage>
  1166. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\addins\</SourceImage>
  1167. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\repair\</SourceImage>
  1168. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\security\</SourceImage>
  1169. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="begin with">C:\Windows\system32\config\systemprofile\</SourceImage>
  1170. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">VolumeShadowCopy</SourceImage>
  1171. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\htdocs\</SourceImage>
  1172. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\wwwroot\</SourceImage>
  1173. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\Temp\</SourceImage>
  1174. <Rule groupRelation="and">
  1175. <SourceImage name="technique_id=T1036,technique_name=Masquerading" condition="contains">\AppData\</SourceImage>
  1176. <SourceImage condition="not end with">\AppData\Local\Microsoft\Teams\current\Teams.exe</SourceImage>
  1177. </Rule>
  1178. <Rule groupRelation="and">
  1179. <CallTrace name="technique_id=T1059.001,technique_name=PowerShell" condition="contains">System.Management.Automation.ni.dll</CallTrace>
  1180. <SourceImage condition="is not">C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe</SourceImage>
  1181. </Rule>
  1182. <Rule groupRelation="and">
  1183. <CallTrace name="technique_id=T1055,technique_name=Process Injection" condition="not begin with">C:\Windows\SYSTEM32\ntdll.dll</CallTrace>
  1184. <CallTrace name="technique_id=T1055,technique_name=Process Injection" condition="not begin with">C:\Windows\SYSTEM32\win32u.dll</CallTrace>
  1185. <CallTrace name="technique_id=T1055,technique_name=Process Injection" condition="not begin with">C:\Windows\SYSTEM32\wow64win.dll</CallTrace>
  1186. </Rule>
  1187. </ProcessAccess>
  1188. </RuleGroup>
  1189. <!-- Event ID 10 == ProcessAccess - Excludes -->
  1190. <RuleGroup groupRelation="or">
  1191. <ProcessAccess onmatch="exclude">
  1192. <SourceImage condition="is">C:\Program Files\Adobe\Adobe Creative Cloud Experience\libs\node.exe</SourceImage>
  1193. <SourceImage condition="contains all">C:\Program Files;\Common Files\Adobe\AdobeGCClient\AGMService.exe</SourceImage>
  1194. <SourceImage condition="is">C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\Acrobat.exe</SourceImage>
  1195. <SourceImage condition="is">C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\AcroCEF\AcroCEF.exe</SourceImage>
  1196. <SourceImage condition="is">C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe</SourceImage>
  1197. <SourceImage condition="is">C:\Program Files\Adobe\Adobe Photoshop 2021\Photoshop.exe</SourceImage>
  1198. <TargetImage condition="begin with">C:\Program Files\Autodesk\Autodesk Desktop App</TargetImage>
  1199. <TargetImage condition="begin with">C:\Program Files (x86)\Autodesk\Autodesk Desktop App</TargetImage>
  1200. <SourceImage condition="is">C:\Windows\CarbonBlack\cb.exe</SourceImage>
  1201. <SourceImage condition="contains all">C:\Program Files\Cisco\AMP\;sfc.exe</SourceImage>
  1202. <SourceImage condition="contains all">C:\Users\;\AppData\Local\Citrix\ICA Client\receiver\Receiver.exe</SourceImage>
  1203. <SourceImage condition="is">C:\Program Files (x86)\Citrix\ICA Client\Receiver\Receiver.exe</SourceImage>
  1204. <SourceImage condition="is">c:\Program Files\Couchbase\Server\bin\sigar_port.exe</SourceImage>
  1205. <SourceImage condition="contains all">C:\Program Files\Elastic\Agent\data\;\metricbeat.exe</SourceImage>
  1206. <SourceImage condition="contains all">C:\Program Files;\FireEye\xagt\xagt.exe</SourceImage>
  1207. <SourceImage condition="is">C:\Program Files (x86)\Ivanti\Workspace Control\cpushld.exe</SourceImage>
  1208. <SourceImage condition="is">C:\Program Files (x86)\RES Software\Workspace Manager\cpushld.exe</SourceImage>
  1209. <SourceImage condition="is">C:\Program Files\Ivanti\Workspace Control\cpushld.exe</SourceImage>
  1210. <SourceImage condition="is">C:\Program Files\RES Software\Workspace Manager\cpushld.exe</SourceImage>
  1211. <SourceImage condition="end with">wmiprvse.exe</SourceImage>
  1212. <SourceImage condition="end with">GoogleUpdate.exe</SourceImage>
  1213. <SourceImage condition="end with">LTSVC.exe</SourceImage>
  1214. <SourceImage condition="end with">taskmgr.exe</SourceImage>
  1215. <SourceImage condition="end with">VBoxService.exe</SourceImage>
  1216. <SourceImage condition="end with">vmtoolsd.exe</SourceImage>
  1217. <SourceImage condition="end with">\Citrix\System32\wfshell.exe</SourceImage>
  1218. <SourceImage condition="is">C:\Windows\System32\lsm.exe</SourceImage>
  1219. <SourceImage condition="end with">Microsoft.Identity.AadConnect.Health.AadSync.Host.exe</SourceImage>
  1220. <SourceImage condition="begin with">C:\Program Files (x86)\Symantec\Symantec Endpoint Protection</SourceImage>
  1221. <GrantedAccess>0x1000</GrantedAccess>
  1222. <GrantedAccess>0x1400</GrantedAccess>
  1223. <GrantedAccess>0x101400</GrantedAccess>
  1224. <GrantedAccess>0x101000</GrantedAccess>
  1225. <SourceImage condition="is">C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\mfeesp.exe</SourceImage>
  1226. <SourceImage condition="is">C:\Program Files\McAfee\Agent\x86\macompatsvc.exe</SourceImage>
  1227. <SourceImage condition="contains all">C:\Users\;\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe</SourceImage>
  1228. <SourceImage condition="is">C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE</SourceImage>
  1229. <SourceImage condition="is">C:\Program Files\PowerToys\modules\KeyboardManager\KeyboardManagerEngine\PowerToys.KeyboardManagerEngine.exe</SourceImage>
  1230. <Rule groupRelation="and">
  1231. <SourceImage condition="contains all">C:\Users\;\AppData\Local\Microsoft\Teams\current\Teams.exe</SourceImage>
  1232. <TargetImage condition="contains all">C:\Users\;\AppData\Local\Microsoft\Teams\current\Teams.exe</TargetImage>
  1233. </Rule>
  1234. <SourceImage condition="is">C:\Program Files\Microsoft Security Client\MsMpEng.exe</SourceImage>
  1235. <SourceImage condition="is">C:\Program Files\Windows Defender\MsMpEng.exe</SourceImage>
  1236. <SourceImage condition="contains all">C:\ProgramData\Microsoft\Windows Defender\Platform\;\MsMpEng.exe</SourceImage>
  1237. <SourceImage condition="is">C:\Program Files (x86)\Mobatek\MobaXterm\MobaXterm.exe</SourceImage>
  1238. <SourceImage condition="is">C:\Program Files\Palo Alto Networks\Traps\cyserver.exe</SourceImage>
  1239. <SourceImage condition="is">C:\Program Files\Qualys\QualysAgent\QualysAgent.exe</SourceImage>
  1240. <SourceImage condition="is">C:\Program Files (x86)\Razer Chroma SDK\bin\RzSDKService.exe</SourceImage>
  1241. <SourceImage condition="is">C:\WINDOWS\CCM\CcmExec.exe</SourceImage>
  1242. <SourceImage condition="is">C:\Program Files\Splunk\bin\splunkd.exe</SourceImage>
  1243. <Rule groupRelation="and">
  1244. <SourceImage condition="is">C:\Program Files\Microsoft VS Code\Code.exe</SourceImage>
  1245. <TargetImage condition="is">C:\Program Files\Microsoft VS Code\Code.exe</TargetImage>
  1246. <GrantedAccess condition="is">0x100000</GrantedAccess>
  1247. </Rule>
  1248. <Rule groupRelation="and">
  1249. <SourceImage condition="is">C:\Program Files\Microsoft VS Code\Code.exe</SourceImage>
  1250. <TargetImage condition="is">C:\Program Files\Microsoft VS Code\Code.exe</TargetImage>
  1251. <GrantedAccess condition="is">0x1401</GrantedAccess>
  1252. </Rule>
  1253. <SourceImage condition="is">C:\Program Files (x86)\VMware\VMWare Player\vmware-authd.exe</SourceImage>
  1254. <SourceImage condition="is">C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe</SourceImage>
  1255. <SourceImage condition="is">C:\Program Files\WinZip\FAHWindow64.exe</SourceImage>
  1256. </ProcessAccess>
  1257. </RuleGroup>
  1258. <!-- Event ID 11 == FileCreate - Includes -->
  1259. <RuleGroup groupRelation="or">
  1260. <FileCreate onmatch="include">
  1261. <TargetFilename name="technique_id=T1546.011,technique_name=Application Shimming" condition="contains">C:\Windows\AppPatch\Custom</TargetFilename>
  1262. <TargetFilename condition="end with">.bat</TargetFilename>
  1263. <TargetFilename condition="end with">.cmd</TargetFilename>
  1264. <TargetFilename name="technique_id=T1059,technique_name=Command and Scripting Interpreter" condition="end with">.chm</TargetFilename>
  1265. <TargetFilename condition="contains all">C:\Users\;\.azure\accesstokens.json</TargetFilename>
  1266. <TargetFilename condition="contains all">C:\Users\;\.aws\credentials</TargetFilename>
  1267. <TargetFilename condition="contains all">C:\Users\;\config\gcloud</TargetFilename>
  1268. <TargetFilename condition="contains all">C:\Users\;\.alibabacloud\credentials</TargetFilename>
  1269. <TargetFilename condition="contains all">C:\Users\;\.kube\config</TargetFilename>
  1270. <TargetFilename condition="contains all">C:\Users\;\.ssh\</TargetFilename>
  1271. <TargetFilename condition="begin with">C:\Users\Default</TargetFilename>
  1272. <TargetFilename condition="contains">Desktop</TargetFilename>
  1273. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="contains">AppData\Local\Microsoft\CLR_v2.0\UsageLogs\</TargetFilename>
  1274. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\cscript.exe.log</TargetFilename>
  1275. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\wscript.exe.log</TargetFilename>
  1276. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\wmic.exe.log</TargetFilename>
  1277. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\mshta.exe.log</TargetFilename>
  1278. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\svchost.exe.log</TargetFilename>
  1279. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\regsvr32.exe.log</TargetFilename>
  1280. <TargetFilename name="technique_id=T1218,technique_name=Office Signed Binary Proxy Execution" condition="end with">\UsageLogs\rundll32.exe.log</TargetFilename>
  1281. <TargetFilename condition="contains">\Downloads\</TargetFilename>
  1282. <TargetFilename condition="begin with">C:\Windows\System32\Drivers</TargetFilename>
  1283. <TargetFilename condition="begin with">C:\Windows\SysWOW64\Drivers</TargetFilename>
  1284. <Rule groupRelation="and">
  1285. <TargetFilename condition="end with">.js</TargetFilename>
  1286. <TargetFilename condition="contains">Appdata\Local\whatsapp\</TargetFilename>
  1287. <Image condition="excludes">Appdata\Local\whatsapp\</Image>
  1288. </Rule>
  1289. <Rule groupRelation="and">
  1290. <TargetFilename condition="end with">.js</TargetFilename>
  1291. <TargetFilename condition="contains">Appdata\Local\Microsoft\Teams\</TargetFilename>
  1292. <Image condition="excludes">Appdata\Local\Microsoft\Teams\</Image>
  1293. </Rule>
  1294. <Rule groupRelation="and">
  1295. <TargetFilename condition="end with">.js</TargetFilename>
  1296. <TargetFilename condition="contains">Appdata\Local\slack\</TargetFilename>
  1297. <Image condition="excludes">Appdata\Local\slack\</Image>
  1298. </Rule>
  1299. <Rule groupRelation="and">
  1300. <TargetFilename condition="end with">.js</TargetFilename>
  1301. <TargetFilename condition="contains">Appdata\Local\discord\</TargetFilename>
  1302. <Image condition="excludes">Appdata\Local\discord\</Image>
  1303. </Rule>
  1304. <Rule groupRelation="and">
  1305. <TargetFilename condition="end with">.js</TargetFilename>
  1306. <TargetFilename condition="contains">Appdata\Local\signal\</TargetFilename>
  1307. <Image condition="excludes">Appdata\Local\signal\</Image>
  1308. </Rule>
  1309. <TargetFilename condition="end with">.exe</TargetFilename>
  1310. <TargetFilename condition="begin with">C:\Windows\System32\GroupPolicy\Machine\Scripts</TargetFilename>
  1311. <TargetFilename condition="begin with">C:\Windows\System32\GroupPolicy\User\Scripts</TargetFilename>
  1312. <TargetFilename name="technique_id=T1218.005,technique_name=Mshta" condition="end with">.hta</TargetFilename>
  1313. <TargetFilename condition="end with">.iso</TargetFilename>
  1314. <TargetFilename condition="end with">.img</TargetFilename>
  1315. <TargetFilename name="technique_id=T1059.007,technique_name=JavaScript" condition="end with">.js</TargetFilename>
  1316. <TargetFilename name="technique_id=T1059.007,technique_name=JavaScript" condition="end with">.javascript</TargetFilename>
  1317. <TargetFilename condition="end with">.kirbi</TargetFilename>
  1318. <TargetFilename name="technique_id=T1187,technique_name=Forced Authentication" condition="end with">.lnk</TargetFilename>
  1319. <TargetFilename name="technique_id=T1187,technique_name=Forced Authentication" condition="end with">.scf</TargetFilename>
  1320. <TargetFilename condition="end with">.application</TargetFilename>
  1321. <TargetFilename condition="end with">.appref-ms</TargetFilename>
  1322. <TargetFilename name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="end with">.*proj</TargetFilename>
  1323. <TargetFilename name="technique_id=T1127,technique_name=Trusted Developer Utilities Proxy Execution" condition="end with">.sln</TargetFilename>
  1324. <TargetFilename condition="end with">.settingcontent-ms</TargetFilename>
  1325. <TargetFilename condition="end with">.docm</TargetFilename>
  1326. <TargetFilename condition="end with">.pptm</TargetFilename>
  1327. <TargetFilename condition="end with">.xlsm</TargetFilename>
  1328. <TargetFilename condition="end with">.xlm</TargetFilename>
  1329. <TargetFilename condition="end with">.dotm</TargetFilename>
  1330. <TargetFilename condition="end with">.xltm</TargetFilename>
  1331. <TargetFilename condition="end with">.potm</TargetFilename>
  1332. <TargetFilename condition="end with">.ppsm</TargetFilename>
  1333. <TargetFilename condition="end with">.sldm</TargetFilename>
  1334. <TargetFilename condition="end with">.xlam</TargetFilename>
  1335. <TargetFilename condition="end with">.xla</TargetFilename>
  1336. <TargetFilename condition="end with">.iqy</TargetFilename>
  1337. <TargetFilename condition="end with">.slk</TargetFilename>
  1338. <TargetFilename condition="contains">\Content.Outlook\</TargetFilename>
  1339. <TargetFilename condition="contains">Roaming\Microsoft\Outlook\VbaProject.OTM</TargetFilename>
  1340. <TargetFilename condition="end with">.rwz</TargetFilename>
  1341. <TargetFilename condition="contains">Roaming\Microsoft\Outlook\Outlook.xml</TargetFilename>
  1342. <TargetFilename condition="end with">.rft</TargetFilename>
  1343. <TargetFilename condition="end with">.jsp</TargetFilename>
  1344. <TargetFilename condition="end with">.jspx</TargetFilename>
  1345. <TargetFilename condition="end with">.asp</TargetFilename>
  1346. <TargetFilename condition="end with">.aspx</TargetFilename>
  1347. <TargetFilename condition="end with">.php</TargetFilename>
  1348. <TargetFilename condition="end with">.war</TargetFilename>
  1349. <TargetFilename condition="end with">.ace</TargetFilename>
  1350. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="begin with">C:\Windows\System32\WindowsPowerShell</TargetFilename>
  1351. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="begin with">C:\Windows\SysWOW64\WindowsPowerShell</TargetFilename>
  1352. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">.ps1</TargetFilename>
  1353. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">.ps2</TargetFilename>
  1354. <TargetFilename condition="end with">.py</TargetFilename>
  1355. <TargetFilename condition="end with">.pyc</TargetFilename>
  1356. <TargetFilename condition="end with">.pyw</TargetFilename>
  1357. <TargetFilename condition="end with">.rdp</TargetFilename>
  1358. <Image condition="image">rundll32.exe</Image>
  1359. <TargetFilename condition="begin with">C:\Windows\System32\Tasks</TargetFilename>
  1360. <TargetFilename condition="begin with">C:\Windows\Tasks\</TargetFilename>
  1361. <TargetFilename condition="contains">\Start Menu</TargetFilename>
  1362. <TargetFilename condition="contains">\Startup</TargetFilename>
  1363. <TargetFilename name="technique_id=T1574.010,technique_name=Services File Permissions Weakness" condition="begin with">C:\Windows\SysWoW64</TargetFilename>
  1364. <TargetFilename name="technique_id=T1574.010,technique_name=Services File Permissions Weakness" condition="begin with">C:\Windows\System32</TargetFilename>
  1365. <TargetFilename name="technique_id=T1574.010,technique_name=Services File Permissions Weakness" condition="begin with">C:\Windows\</TargetFilename>
  1366. <TargetFilename condition="end with">.sys</TargetFilename>
  1367. <TargetFilename condition="contains">\*lsass*.dmp\</TargetFilename>
  1368. <Image condition="image">taskmgr.exe</Image>
  1369. <TargetFilename condition="end with">.url</TargetFilename>
  1370. <TargetFilename condition="end with">.vb</TargetFilename>
  1371. <TargetFilename condition="end with">.vbe</TargetFilename>
  1372. <TargetFilename condition="end with">.vbs</TargetFilename>
  1373. <Rule groupRelation="and">
  1374. <TargetFilename name="technique_id=T1562.001,technique_name=Disable or Modify tools" condition="begin with">C:\Windows\System32\CodeIntegrity\CIPolicies\Active\</TargetFilename>
  1375. <TargetFilename name="technique_id=T1562.001,technique_name=Disable or Modify tools" condition="end with">.cip</TargetFilename>
  1376. </Rule>
  1377. <Rule groupRelation="and">
  1378. <TargetFilename name="technique_id=T1562.001,technique_name=Disable or Modify tools" condition="begin with">C:\Windows\System32\CodeIntegrity\</TargetFilename>
  1379. <TargetFilename name="technique_id=T1562.001,technique_name=Disable or Modify tools" condition="end with">.p7b</TargetFilename>
  1380. </Rule>
  1381. <TargetFilename name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="begin with">C:\Windows\System32\Wbem</TargetFilename>
  1382. <TargetFilename name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="begin with">C:\Windows\SysWOW64\Wbem</TargetFilename>
  1383. <Image name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="begin with">C:\WINDOWS\system32\wbem\scrcons.exe</Image>
  1384. <TargetFilename name="technique_id=T1546.008,technique_name=Services File Permissions Weakness" condition="begin with">C:\Windows\Temp\</TargetFilename>
  1385. <TargetFilename name="technique_id=T1546.008,technique_name=Services File Permissions Weakness" condition="begin with">C:\Program\</TargetFilename>
  1386. <TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="begin with">C:\Temp\</TargetFilename>
  1387. <TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="begin with">C:\PerfLogs\</TargetFilename>
  1388. <TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="begin with">C:\Users\Public\</TargetFilename>
  1389. <TargetFilename name="technique_id=T1047,technique_name=File System Permissions Weakness" condition="contains">\AppData\Temp\</TargetFilename>
  1390. </FileCreate>
  1391. </RuleGroup>
  1392. <!-- Event ID 11 == FileCreate - Excludes -->
  1393. <RuleGroup groupRelation="or">
  1394. <FileCreate onmatch="exclude">
  1395. <Image condition="is">C:\Program Files (x86)\Dell\CommandUpdate\InvColPC.exe</Image>
  1396. <Rule groupRelation="and">
  1397. <Image condition="is">C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe</Image>
  1398. <TargetFilename condition="is">C:\Program Files\Elastic\Endpoint\state\last-document-id.json</TargetFilename>
  1399. </Rule>
  1400. <Rule groupRelation="and">
  1401. <Image condition="begin with">C:\Program Files\Elastic\Agent\data\</Image>
  1402. <TargetFilename condition="contains all">C:\Program Files\Elastic\Agent\data\;.ndjson</TargetFilename>
  1403. </Rule>
  1404. <Image condition="is">C:\Windows\system32\igfxCUIService.exe</Image>
  1405. <Image condition="is">C:\Program Files (x86)\Ivanti\Workspace Control\pfwsmgr.exe</Image>
  1406. <Image condition="is">C:\Program Files (x86)\RES Software\Workspace Manager\pfwsmgr.exe</Image>
  1407. <Image condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe</Image>
  1408. <Image condition="is">C:\Windows\System32\smss.exe</Image>
  1409. <Image condition="is">C:\Windows\system32\CompatTelRunner.exe</Image>
  1410. <Image condition="is">C:\Windows\system32\wbem\WMIADAP.EXE</Image>
  1411. <TargetFilename condition="begin with">C:\Windows\System32\DriverStore\Temp\</TargetFilename>
  1412. <TargetFilename condition="begin with">C:\Windows\System32\wbem\Performance\</TargetFilename>
  1413. <TargetFilename condition="end with">WRITABLE.TST</TargetFilename>
  1414. <TargetFilename condition="contains">\AppData\Roaming\Microsoft\Windows\Recent\</TargetFilename>
  1415. <TargetFilename condition="begin with">C:\$WINDOWS.~BT\Sources\SafeOS\SafeOS.Mount\</TargetFilename>
  1416. <Image condition="begin with">C:\WINDOWS\winsxs\amd64_microsoft-windows</Image>
  1417. <Image condition="is">c:\Program Files\Microsoft Security Client\MsMpEng.exe</Image>
  1418. <Rule groupRelation="and">
  1419. <Image condition="image">Outlook.exe</Image>
  1420. <TargetFilename condition="contains">Roaming\Microsoft\Outlook\Outlook.xml</TargetFilename>
  1421. </Rule>
  1422. <Image condition="is">c:\windows\system32\provtool.exe</Image>
  1423. <Rule groupRelation="and">
  1424. <Image condition="is">C:\Windows\system32\wsmprovhost.exe</Image>
  1425. <TargetFilename condition="contains all">C:\Users\;\AppData\Local\Temp;__PSScriptPolicyTest;.ps1</TargetFilename>
  1426. </Rule>
  1427. <Rule groupRelation="and">
  1428. <Image condition="is">C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe</Image>
  1429. <TargetFilename condition="contains all">C:\Windows\Temp;__PSScriptPolicyTest;.ps1</TargetFilename>
  1430. <User condition="is">NT AUTHORITY\SYSTEM</User>
  1431. </Rule>
  1432. <Image condition="is">C:\WINDOWS\CCM\CcmExec.exe</Image>
  1433. <TargetFilename condition="begin with">C:\Windows\CCM</TargetFilename>
  1434. <TargetFilename condition="begin with">C:\Windows\System32\Tasks\Microsoft\Windows\PLA\FabricTraces</TargetFilename>
  1435. <TargetFilename condition="begin with">C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</TargetFilename>
  1436. <TargetFilename condition="begin with">C:\Windows\System32\Tasks\Microsoft\Windows\Customer Experience Improvement Program\Server\ServerRoleUsageCollector</TargetFilename>
  1437. <TargetFilename condition="begin with">C:\Windows\System32\Tasks\Microsoft\Windows\Customer Experience Improvement Program\Server\ServerCeipAssistant</TargetFilename>
  1438. </FileCreate>
  1439. </RuleGroup>
  1440. <!-- Event ID 12,13,14 == RegObject added/deleted, RegValue Set, RegObject Renamed - Includes -->
  1441. <RuleGroup groupRelation="or">
  1442. <RegistryEvent onmatch="include">
  1443. <TargetObject name="technique_id=T1546.011,technique_name=Application Shimming" condition="contains">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB</TargetObject>
  1444. <TargetObject name="technique_id=T1546.011,technique_name=Application Shimming" condition="contains">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom</TargetObject>
  1445. <TargetObject name="technique_id=T1547.002,technique_name=Authentication Package" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Authentication</TargetObject>
  1446. <TargetObject name="technique_id=T1547.002,technique_name=Authentication Package" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\RunAsPPL</TargetObject>
  1447. <TargetObject name="technique_id=T1547.002,technique_name=Authentication Package" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\NtlmMinClientSec</TargetObject>
  1448. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">\CurrentVersion\Run</TargetObject>
  1449. <TargetObject condition="contains">\Group Policy\Scripts</TargetObject>
  1450. <TargetObject name="technique_id=T1037,technique_name=Boot or Logon Initialization Scripts" condition="contains">\Windows\System\Scripts</TargetObject>
  1451. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">\Policies\Explorer\Run</TargetObject>
  1452. <TargetObject condition="end with">\ServiceDll</TargetObject>
  1453. <TargetObject condition="end with">\ImagePath</TargetObject>
  1454. <TargetObject condition="end with">\Start</TargetObject>
  1455. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify</TargetObject>
  1456. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit</TargetObject>
  1457. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell</TargetObject>
  1458. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\VmApplet</TargetObject>
  1459. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Specialaccounts\userlist</TargetObject>
  1460. <TargetObject name="technique_id=T1547.004,technique_name=Winlogon Helper DLL" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Uihostl</TargetObject>
  1461. <TargetObject condition="begin with">HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32</TargetObject>
  1462. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32</TargetObject>
  1463. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains all">HKLM\SYSTEM\;Control\Session Manager\BootExecute</TargetObject>
  1464. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains all">HKLM\SYSTEM\;Control\Session Manager\excludefromknowndlls</TargetObject>
  1465. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains all">HKLM\SYSTEM\;Control\Session Manager\safedllsearchmode</TargetObject>
  1466. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains all">HKLM\SYSTEM\;Control\Session Manager\setupexecute</TargetObject>
  1467. <TargetObject name="technique_id=T1546.001,technique_name=Change Default File Association" condition="contains">\Explorer\FileExts</TargetObject>
  1468. <TargetObject condition="contains">\shell\install\command</TargetObject>
  1469. <TargetObject condition="contains">\shell\open\command</TargetObject>
  1470. <TargetObject condition="contains">\shell\open\ddeexec</TargetObject>
  1471. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup</TargetObject>
  1472. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains all">software\microsoft\windows nt\currentversion\accessibility\ATs\;\StartExe</TargetObject>
  1473. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">software\microsoft\windows nt\currentversion\windows\run\</TargetObject>
  1474. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\</TargetObject>
  1475. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">software\microsoft\windows\currentversion\explorer\shell folders\common startup</TargetObject>
  1476. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="contains">software\microsoft\windows\currentversion\explorer\shell folders\startup</TargetObject>
  1477. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="begin with">hklm\software\microsoft\command processor\autorun</TargetObject>
  1478. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">\mscfile\shell\open\command</TargetObject>
  1479. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">ms-settings\shell\open\command</TargetObject>
  1480. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">Classes\exefile\shell\runas\command\isolatedCommand</TargetObject>
  1481. <TargetObject name="technique_id=T1546.015,technique_name=Component Object Model Hijacking" condition="contains all">Software\Classes\CLSID;inprocserver32</TargetObject>
  1482. <TargetObject name="technique_id=T1546.015,technique_name=Component Object Model Hijacking" condition="contains all">Software\Classes\CLSID;localserver32</TargetObject>
  1483. <TargetObject name="technique_id=T1546.015,technique_name=Component Object Model Hijacking" condition="contains all">Classes\CLSID\;TreatAs</TargetObject>
  1484. <TargetObject name="technique_id=T1003.002,technique_name=Security Account Manager" condition="contains">System\CurrentControlSet\Services\VSS</TargetObject>
  1485. <TargetObject name="technique_id=T1098,technique_name=Account Manipulation" condition="contains">\services\Netlogon\Parameters\DisablePasswordChange</TargetObject>
  1486. <TargetObject name="technique_id=T1546.010,technique_name=Appinit DLLs" condition="contains all">HKLM\SOFTWARE\;Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls</TargetObject>
  1487. <TargetObject name="technique_id=T1546.010,technique_name=Appinit DLLs" condition="contains all">HKLM\SOFTWARE\;Microsoft\Windows NT\CurrentVersion\Windows\loadappinit_dlls</TargetObject>
  1488. <TargetObject name="technique_id=T1546.010,technique_name=Appinit DLLs" condition="contains all">\SYSTEM\;\Services\DNS\Parameters\ServerLevelPluginDll</TargetObject>
  1489. <TargetObject name="technique_id=T1562.006,technique_name=Impair Defenses - Indicator Blocking" condition="end with">SOFTWARE\Microsoft\.NETFramework\ETWEnabled</TargetObject>
  1490. <TargetObject name="technique_id=T1546.008,technique_name=Accessibility Features" condition="contains">\Environment\</TargetObject>
  1491. <TargetObject condition="begin with">HKLM\SYSTEM\setup\cmdline</TargetObject>
  1492. <TargetObject condition="begin with">HKLM\SYSTEM\setup\upgrade</TargetObject>
  1493. <TargetObject condition="contains all">Software\microsoft\ctf\langbaraddin\;\Enable</TargetObject>
  1494. <TargetObject condition="contains all">Software\microsoft\ctf\langbaraddin\;\FilePath</TargetObject>
  1495. <TargetObject condition="contains">Software\policies\microsoft\windows\control panel\desktop\scrnsave.exe</TargetObject>
  1496. <TargetObject condition="begin with">HKLM\Software\Classes\protocols\filter\</TargetObject>
  1497. <TargetObject condition="begin with">HKLM\Software\Classes\protocols\handler\</TargetObject>
  1498. <TargetObject name="technique_id=T1562.002,technique_name=Disable Windows Event Logging" condition="contains all">\SYSTEM\;\Service\EventLog;Retention</TargetObject>
  1499. <TargetObject name="technique_id=T1562.002,technique_name=Disable Windows Event Logging" condition="contains all">\SYSTEM\;\Service\EventLog;MaxSize</TargetObject>
  1500. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions</TargetObject>
  1501. <TargetObject name="technique_id=T1546.012,technique_name=Image File Execution Options Injection" condition="begin with">HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options</TargetObject>
  1502. <TargetObject name="technique_id=T1546.012,technique_name=Image File Execution Options Injection" condition="begin with">HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options</TargetObject>
  1503. <TargetObject condition="contains">\Internet Explorer\Toolbar</TargetObject>
  1504. <TargetObject condition="contains">\Internet Explorer\Extensions</TargetObject>
  1505. <TargetObject condition="contains">\Browser Helper Objects</TargetObject>
  1506. <TargetObject condition="contains">\software\microsoft\internet explorer\desktop\components\Source</TargetObject>
  1507. <TargetObject condition="contains">\software\microsoft\internet explorer\explorer bars\</TargetObject>
  1508. <TargetObject condition="contains">\software\microsoft\internet explorer\Styles\MaxScriptStatements</TargetObject>
  1509. <TargetObject condition="contains">\software\microsoft\internet explorer\toolbar\WebBrowser\ITBarLayout</TargetObject>
  1510. <TargetObject condition="contains">\software\wow6432node\microsoft\internet explorer\toolbar\WebBrowser\ITBarLayout</TargetObject>
  1511. <TargetObject condition="contains">\software\microsoft\internet explorer\urlsearchhooks\</TargetObject>
  1512. <TargetObject condition="contains">HKLM\software\wow6432node\microsoft\internet explorer\urlsearchhooks\</TargetObject>
  1513. <TargetObject name="technique_id=Port Monitors,technique_name=Port Monitors" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors</TargetObject>
  1514. <TargetObject condition="begin with">hklm\system\mounteddevices\</TargetObject>
  1515. <TargetObject condition="contains all">hklm\system\;\enum\usb\</TargetObject>
  1516. <TargetObject name="technique_id=T1546.007,technique_name=Netsh Helper DLL" condition="contains">SOFTWARE\Microsoft\Netsh</TargetObject>
  1517. <TargetObject name="technique_id=T1137.006,technique_name=Office Add-ins" condition="contains all">\Microsoft\Office;\Outlook\Addins</TargetObject>
  1518. <TargetObject name="technique_id=T1137.006,technique_name=Office Add-ins" condition="contains">\Software\Microsoft\VSTO\Security\Inclusion</TargetObject>
  1519. <TargetObject name="technique_id=T1137.006,technique_name=Office Add-ins" condition="contains">\Software\Microsoft\VSTO\SolutionMetadata</TargetObject>
  1520. <TargetObject name="technique_name=Outlook Server 95/98 Identity Keys" condition="contains">Identities</TargetObject>
  1521. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\Account Name</TargetObject>
  1522. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\Display Name</TargetObject>
  1523. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\Email</TargetObject>
  1524. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\HTTP Password</TargetObject>
  1525. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\HTTP User</TargetObject>
  1526. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\IMAP Password</TargetObject>
  1527. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\IMAP User</TargetObject>
  1528. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\MAPI Provider</TargetObject>
  1529. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\POP3 Password</TargetObject>
  1530. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\POP3 User</TargetObject>
  1531. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\SMTP Password</TargetObject>
  1532. <TargetObject condition="contains all">SOFTWARE\Microsoft\Office\;\Outlook\Profiles\;\9375CFF0413111d3B88A00104B2A6676\;\SMTP User</TargetObject>
  1533. <TargetObject name="technique_id=T1137.004,technique_name=Outlook Home Page" condition="contains all">software\microsoft\office\;\outlook\security\</TargetObject>
  1534. <TargetObject name="technique_id=T1137.004,technique_name=Outlook Home Page" condition="contains all">software\microsoft\office\;\outlook\today\</TargetObject>
  1535. <TargetObject name="technique_id=T1137.004,technique_name=Outlook Home Page" condition="contains all">software\microsoft\office\;\outlook\webview\;\</TargetObject>
  1536. <TargetObject condition="contains all">software\microsoft\office\;\word\options\globaldotname</TargetObject>
  1537. <TargetObject condition="contains all">software\microsoft\office\;\common\internet\server cache\</TargetObject>
  1538. <TargetObject condition="contains all">software\;microsoft\office\;\addins\</TargetObject>
  1539. <TargetObject condition="contains all">software\;microsoft\office\;\Common\COM Compatibility</TargetObject>
  1540. <TargetObject condition="contains">\Security\Trusted Documents\TrustRecords</TargetObject>
  1541. <TargetObject condition="contains">\Security\Trusted Documents\</TargetObject>
  1542. <TargetObject condition="end with">\UrlUpdateInfo</TargetObject>
  1543. <TargetObject condition="contains">software\microsoft\windows\currentversion\explorer\recentdocs\.docx\</TargetObject>
  1544. <TargetObject condition="contains">software\microsoft\windows\currentversion\explorer\recentdocs\.xlsx\</TargetObject>
  1545. <TargetObject condition="begin with">HKLM\SOFTWARE\Clients\Mail\Microsoft Outlook\DllPath</TargetObject>
  1546. <TargetObject condition="begin with">HKLM\SOFTWARE\Clients\Mail\Microsoft Outlook\DllPathEx</TargetObject>
  1547. <TargetObject condition="contains">software\microsoft\Office test\special\perf\</TargetObject>
  1548. <TargetObject condition="contains all">software\microsoft\office\;\Options\OPEN</TargetObject>
  1549. <TargetObject name="technique_id=T1137.006,technique_name=Office Add-ins" condition="contains all">\Microsoft\Office;\PowerPoint\Addins</TargetObject>
  1550. <TargetObject name="T1559.002,office" condition="end with">\Word\Security\AllowDDE</TargetObject>
  1551. <TargetObject name="T1559.002,office" condition="end with">\Excel\Security\DisableDDEServerLaunch</TargetObject>
  1552. <TargetObject name="T1559.002,office" condition="end with">\Excel\Security\DisableDDEServerLookup</TargetObject>
  1553. <TargetObject name="T1562,office" condition="end with">\VBAWarnings</TargetObject>
  1554. <TargetObject name="T1562,office" condition="end with">\DisableInternetFilesInPV</TargetObject>
  1555. <TargetObject name="T1562,office" condition="end with">\DisableUnsafeLocationsInPV</TargetObject>
  1556. <TargetObject name="T1562,office" condition="end with">\DisableAttachementsInPV</TargetObject>
  1557. <TargetObject name="technique_id=T1021.001,technique_name=Remote Desktop Protocol" condition="is">HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\MaxInstanceCount</TargetObject>
  1558. <TargetObject name="technique_id=T1021.001,technique_name=Remote Desktop Protocol" condition="is">HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\RaunSolicit</TargetObject>
  1559. <TargetObject name="technique_id=T1112,technique_name=Modify Registry" condition="begin with">HKLM\SYSTEM\CurrentControlSet\services\TermService\Parameters\ServiceDll</TargetObject>
  1560. <TargetObject name="technique_id=T1112,technique_name=Modify Registry" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\fSingleSessionPerUser</TargetObject>
  1561. <TargetObject name="technique_id=T1112,technique_name=Modify Registry" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\fDenyTSConnections</TargetObject>
  1562. <TargetObject name="technique_id=T1112,technique_name=Modify Registry" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Shadow</TargetObject>
  1563. <TargetObject name="technique_id=T1053,technique_name=Scheduled Task" condition="contains all">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks;Actions</TargetObject>
  1564. <TargetObject name="technique_id=T1053,technique_name=Scheduled Task" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree</TargetObject>
  1565. <TargetObject name="technique_id=T1053,technique_name=Scheduled Task" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\</TargetObject>
  1566. <TargetObject name="technique_id=T1547.005,technique_name=Security Support Provider" condition="contains">SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe</TargetObject>
  1567. <TargetObject name="technique_id=T1543,technique_name=Service Creation" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services</TargetObject>
  1568. <TargetObject name="technique_id=T1553.003,technique_name=SIP and Trust Provider Hijacking" condition="begin with">HKLM\SOFTWARE\Microsoft\Cryptography\OID</TargetObject>
  1569. <TargetObject name="technique_id=T1553.003,technique_name=SIP and Trust Provider Hijacking" condition="begin with">HKLM\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID</TargetObject>
  1570. <TargetObject name="technique_id=T1553.003,technique_name=SIP and Trust Provider Hijacking" condition="begin with">HKLM\SOFTWARE\Microsoft\Cryptography\Providers\Trust</TargetObject>
  1571. <TargetObject name="technique_id=T1553.003,technique_name=SIP and Trust Provider Hijacking" condition="begin with">HKLM\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust</TargetObject>
  1572. <TargetObject name="technique_id=T1553.003,technique_name=SIP and Trust Provider Hijacking" condition="begin with">HKLM\SOFTWARE\Microsoft\Cryptography\Offload\ExpoOffload</TargetObject>
  1573. <TargetObject name="technique_id=T1569.002,technique_name=Service Execution" condition="end with">\PsExec\EulaAccepted</TargetObject>
  1574. <TargetObject name="technique_id=T1105,technique_name=Ingress Tool Transfer" condition="end with">\PsFile\EulaAccepted</TargetObject>
  1575. <TargetObject name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="end with">\PsGetSID\EulaAccepted</TargetObject>
  1576. <TargetObject name="technique_id=T1057,technique_name=Process Discovery" condition="end with">\PsInfo\EulaAccepted</TargetObject>
  1577. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="end with">\PsKill\EulaAccepted</TargetObject>
  1578. <TargetObject name="technique_id=T1057,technique_name=Process Discovery" condition="end with">\PsList\EulaAccepted</TargetObject>
  1579. <TargetObject name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="end with">\PsLoggedOn\EulaAccepted</TargetObject>
  1580. <TargetObject name="technique_id=T1569.002,technique_name=Service Execution" condition="end with">\PsLogList\EulaAccepted</TargetObject>
  1581. <TargetObject name="technique_id=T1098,technique_name=Account Manipulation" condition="end with">\PsPasswd\EulaAccepted</TargetObject>
  1582. <TargetObject name="technique_id=T1569.002,technique_name=Service Execution" condition="end with">\PsService\EulaAccepted</TargetObject>
  1583. <TargetObject name="undefined" condition="end with">\PsShutDown\EulaAccepted</TargetObject>
  1584. <TargetObject name="undefined" condition="end with">\PsSuspend\EulaAccepted</TargetObject>
  1585. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="contains">SYSTEM\CurrentControlSet\services\SysmonDrv</TargetObject>
  1586. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="contains">SYSTEM\CurrentControlSet\services\Sysmon</TargetObject>
  1587. <TargetObject name="technique_id=T1547.001,technique_name=Registry Run Keys / Start Folder" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\InitialProgram</TargetObject>
  1588. <TargetObject name="technique_id=T1547.003,technique_name=Time Providers" condition="contains">HKLM\System\CurrentControlSet\Services\W32Time\TimeProviders</TargetObject>
  1589. <TargetObject name="technique_id=T1218,technique_name=Signed Binary Proxy Execution" condition="begin with">HKLM\Software\Microsoft\WAB\DLLPath</TargetObject>
  1590. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Control.exe</TargetObject>
  1591. <TargetObject name="technique_id=T1546.009,technique_name=AppCert DLLs" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls</TargetObject>
  1592. <TargetObject name="technique_id=T1546.015,technique_name=Component Object Model Hijacking" condition="contains">software\classes\clsid\{083863f1-70de-11d0-bd40-00a0c911ce86}\instance</TargetObject>
  1593. <TargetObject name="technique_id=T1546.015,technique_name=Component Object Model Hijacking" condition="contains">software\classes\clsid\{7ed96837-96f0-4812-b211-f13c24117ed3}\instance</TargetObject>
  1594. <TargetObject name="technique_id=T1125,technique_name=Video Capture" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam</TargetObject>
  1595. <TargetObject name="technique_id=T1123,technique_name=Audio Capture" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone</TargetObject>
  1596. <TargetObject name="technique_id=T1123,technique_name=Audio Capture" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\bluetooth</TargetObject>
  1597. <TargetObject name="technique_id=T1005,technique_name=Data from Local System" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\usb</TargetObject>
  1598. <TargetObject name="technique_id=T1005,technique_name=Data from Local System" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location</TargetObject>
  1599. <TargetObject name="technique_id=T1005,technique_name=Data from Local System" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts</TargetObject>
  1600. <TargetObject name="technique_id=T1056.001,technique_name=Input Capture - Keylogging" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\humanInterfaceDevice</TargetObject>
  1601. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Provider</TargetObject>
  1602. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Plap Providers</TargetObject>
  1603. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa</TargetObject>
  1604. <TargetObject name="technique_id=T1003,technique_name=Credential Dumping" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\</TargetObject>
  1605. <TargetObject name="technique_id=T1003,technique_name=Credential Dumping" condition="contains">\Control\SecurityProviders\WDigest</TargetObject>
  1606. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify</TargetObject>
  1607. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware</TargetObject>
  1608. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiVirus</TargetObject>
  1609. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring</TargetObject>
  1610. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection</TargetObject>
  1611. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable</TargetObject>
  1612. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection</TargetObject>
  1613. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring</TargetObject>
  1614. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\SpyNetReporting</TargetObject>
  1615. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows Defender</TargetObject>
  1616. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="contains all">HKLM\software\lmicrosoft\microsoft antimalware\exclusions\</TargetObject>
  1617. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\software\microsoft\Windows Advanced Threat Protection\TelLib</TargetObject>
  1618. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\software\policies\microsoft\windows advanced threat protection\</TargetObject>
  1619. <Rule groupRelation="and">
  1620. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\Sense</TargetObject>
  1621. <Details condition="contains">DWORD (0x00000004)</Details>
  1622. </Rule>
  1623. <Rule groupRelation="and">
  1624. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\WinDefend</TargetObject>
  1625. <Details condition="contains">DWORD (0x00000004)</Details>
  1626. </Rule>
  1627. <Rule groupRelation="and">
  1628. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\MsMpSvc</TargetObject>
  1629. <Details condition="contains">DWORD (0x00000004)</Details>
  1630. </Rule>
  1631. <Rule groupRelation="and">
  1632. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\NisSrv</TargetObject>
  1633. <Details condition="contains">DWORD (0x00000004)</Details>
  1634. </Rule>
  1635. <Rule groupRelation="and">
  1636. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\WdBoot</TargetObject>
  1637. <Details condition="contains">DWORD (0x00000004)</Details>
  1638. </Rule>
  1639. <Rule groupRelation="and">
  1640. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv</TargetObject>
  1641. <Details condition="contains">DWORD (0x00000004)</Details>
  1642. </Rule>
  1643. <Rule groupRelation="and">
  1644. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc</TargetObject>
  1645. <Details condition="contains">DWORD (0x00000004)</Details>
  1646. </Rule>
  1647. <Rule groupRelation="and">
  1648. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\wscsvc</TargetObject>
  1649. <Details condition="contains">DWORD (0x00000004)</Details>
  1650. </Rule>
  1651. <Rule groupRelation="and">
  1652. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService</TargetObject>
  1653. <Details condition="contains">DWORD (0x00000004)</Details>
  1654. </Rule>
  1655. <Rule groupRelation="and">
  1656. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\wuauserv</TargetObject>
  1657. <Details condition="contains">DWORD (0x00000004)</Details>
  1658. </Rule>
  1659. <Rule groupRelation="and">
  1660. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc</TargetObject>
  1661. <Details condition="contains">DWORD (0x00000004)</Details>
  1662. </Rule>
  1663. <TargetObject condition="begin with">hklm\software\microsoft\windows script\settings\amsienable</TargetObject>
  1664. <TargetObject condition="contains">\software\microsoft\windows script\settings\amsienable</TargetObject>
  1665. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List</TargetObject>
  1666. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify</TargetObject>
  1667. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride</TargetObject>
  1668. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\software\policies\microsoft\windowsfirewall\;\authorizedapplications</TargetObject>
  1669. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\software\policies\microsoft\windowsfirewall\;\authorizedapplications\list</TargetObject>
  1670. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\software\policies\microsoft\windowsfirewall\;\globallyopenports</TargetObject>
  1671. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options</TargetObject>
  1672. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT</TargetObject>
  1673. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Safeboot</TargetObject>
  1674. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\Winlogon</TargetObject>
  1675. <TargetObject condition="end with">\FriendlyName</TargetObject>
  1676. <TargetObject condition="is">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\InProgress\(Default)</TargetObject>
  1677. <Rule groupRelation="and">
  1678. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System</TargetObject>
  1679. <Image condition="is not">C:\Windows\System32\svchost.exe</Image>
  1680. </Rule>
  1681. <Rule groupRelation="and">
  1682. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System</TargetObject>
  1683. <Image condition="is not">C:\Windows\System32\svchost.exe</Image>
  1684. </Rule>
  1685. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order</TargetObject>
  1686. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles</TargetObject>
  1687. <TargetObject name="technique_id=T1547.010,technique_name=Boot or Logon Autostart Execution - Port Monitors" condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports</TargetObject>
  1688. <TargetObject name="technique_id=T1547.010,technique_name=Boot or Logon Autostart Execution - Port Monitors" condition="contains">\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports</TargetObject>
  1689. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging</TargetObject>
  1690. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging</TargetObject>
  1691. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription</TargetObject>
  1692. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="contains all">software\microsoft\powershell\;\shellids\microsoft.powershell\executionpolicy</TargetObject>
  1693. <TargetObject name="technique_id=T1553.004,technique_name=Install Root Certificate" condition="begin with">HKLM\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates</TargetObject>
  1694. <TargetObject name="technique_id=T1553.004,technique_name=Install Root Certificate" condition="contains">\Microsoft\SystemCertificates\Root\Certificates</TargetObject>
  1695. <TargetObject name="technique_id=T1553.004,technique_name=Install Root Certificate" condition="contains">\Microsoft\SystemCertificates\CA\Certificates</TargetObject>
  1696. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\AllAlertsDisabled</TargetObject>
  1697. <TargetObject name="technique_id=T1562.001,technique_name=Disable or Modify Tools" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\DisableMonitoring</TargetObject>
  1698. <TargetObject condition="contains">\Classes\AllFilesystemObjects</TargetObject>
  1699. <TargetObject condition="contains">\Classes\Directory</TargetObject>
  1700. <TargetObject condition="contains">\Classes\Drive</TargetObject>
  1701. <TargetObject condition="contains">\Classes\Folder</TargetObject>
  1702. <TargetObject condition="contains">\ShellEx\ContextMenuHandlers</TargetObject>
  1703. <TargetObject condition="contains">\CurrentVersion\Shell</TargetObject>
  1704. <TargetObject condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\explorer\ShellExecuteHooks</TargetObject>
  1705. <TargetObject condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\explorer\ShellServiceObject</TargetObject>
  1706. <TargetObject name="technique_id=T1210,technique_name=Exploitation of Remote Services" condition="contains all">HKLM\SOFTWARE\Microsoft\Windows;\CurrentVersion\Print\Connections</TargetObject>
  1707. <TargetObject name="technique_id=T1210,technique_name=Exploitation of Remote Services" condition="contains all">HKLM\System;\control\print\monitors</TargetObject>
  1708. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="contains">\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command</TargetObject>
  1709. <TargetObject condition="contains">{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}</TargetObject>
  1710. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</TargetObject>
  1711. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</TargetObject>
  1712. <TargetObject condition="begin with">HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\DontDisplayLastUsername</TargetObject>
  1713. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UacDisableNotify</TargetObject>
  1714. <TargetObject name="technique_id=T1548.002,technique_name=Bypass User Access Control" condition="begin with">HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify</TargetObject>
  1715. <TargetObject name="UACMe Dir Prep" condition="contains all">HKU;Environment</TargetObject>
  1716. <TargetObject name="UACMe Dir Prep" condition="contains all">HKLM;Environment</TargetObject>
  1717. <TargetObject condition="is">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Setup\ServiceStartup</TargetObject>
  1718. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Services\Pending\</TargetObject>
  1719. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\PostRebootReporting\</TargetObject>
  1720. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired\</TargetObject>
  1721. <TargetObject condition="begin with">HKLM\SYSTEM\CurrentControlSet\Services\WinSock</TargetObject>
  1722. <TargetObject condition="end with">\ProxyServer</TargetObject>
  1723. <TargetObject name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains">SYSTEM\CurrentControlSet\Control\CrashControl</TargetObject>
  1724. <TargetObject name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains all">HKLM\SYSTEM\;Control\WMI\autologger\senseauditlogger</TargetObject>
  1725. <TargetObject name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains all">HKLM\SYSTEM\;Control\WMI\autologger\senseeventlog</TargetObject>
  1726. <TargetObject name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains all">HKLM\SYSTEM\;Control\WMI\EtwMaxLoggers</TargetObject>
  1727. <TargetObject name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="contains all">HKLM\SYSTEM\;Control\WMI\Security</TargetObject>
  1728. </RegistryEvent>
  1729. </RuleGroup>
  1730. <!-- Event ID 12,13,14 == RegObject added/deleted, RegValue Set, RegObject Renamed - Excludes -->
  1731. <RuleGroup groupRelation="or">
  1732. <RegistryEvent onmatch="exclude">
  1733. <Image condition="is">C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\aciseposture.exe</Image>
  1734. <Image condition="is">C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnagent.exe</Image>
  1735. <Image condition="is">C:\Program Files\Cylance\Optics\CyOptics.exe</Image>
  1736. <Image condition="is">C:\Program Files\Cylance\Desktop\CylanceSvc.exe</Image>
  1737. <TargetObject condition="end with">Toolbar\WebBrowser</TargetObject>
  1738. <TargetObject condition="end with">Toolbar\WebBrowser\ITBar7Height</TargetObject>
  1739. <TargetObject condition="end with">Toolbar\ShellBrowser\ITBar7Layout</TargetObject>
  1740. <TargetObject condition="end with">Internet Explorer\Toolbar\Locked</TargetObject>
  1741. <TargetObject condition="end with">ShellBrowser</TargetObject>
  1742. <Image condition="is">C:\Program Files (x86)\Ivanti\Workspace Control\pfwsmgr.exe</Image>
  1743. <Image condition="is">C:\Program Files\RES Software\Workspace Manager\pfwsmgr.exe</Image>
  1744. <Image condition="begin with">C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security </Image>
  1745. <Image condition="begin with">C:\Program Files\Kaspersky Lab\Kaspersky Internet Security </Image>
  1746. <Image condition="is">C:\Program Files\McAfee\Endpoint Encryption Agent\MfeEpeHost.exe</Image>
  1747. <Image condition="is">C:\Program Files\McAfee\Endpoint Security\Adaptive Threat Protection\mfeatp.exe</Image>
  1748. <Image condition="is">C:\Program Files\McAfee\Endpoint Security\Endpoint Security Platform\mfeesp.exe</Image>
  1749. <Image condition="is">C:\Program Files\Common Files\McAfee\Engine\AMCoreUpdater\amupdate.exe</Image>
  1750. <Image condition="is">C:\Program Files\McAfee\Agent\masvc.exe</Image>
  1751. <Image condition="is">C:\Program Files\McAfee\Agent\x86\mfemactl.exe</Image>
  1752. <Image condition="is">C:\Program Files\McAfee\Agent\x86\McScript_InUse.exe</Image>
  1753. <Image condition="is">C:\Program Files\McAfee\Agent\x86\macompatsvc.exe</Image>
  1754. <Image condition="is">C:\Program Files\McAfee\Endpoint Security\Threat Prevention\mfeensppl.exe</Image>
  1755. <Image condition="begin with">C:\Program Files\Common Files\McAfee\Engine\scanners</Image>
  1756. <Image condition="is">C:\Program Files\Common Files\McAfee\AVSolution\mcshield.exe</Image>
  1757. <Image condition="is">C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe</Image>
  1758. <Image condition="is">C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe</Image>
  1759. <Image condition="is">C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe</Image>
  1760. <Rule groupRelation="and">
  1761. <Image condition="is">C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe</Image>
  1762. <TargetObject condition="begin with">HKLM\System\CurrentControlSet\Services\HealthService\Parameters\Management Groups</TargetObject>
  1763. </Rule>
  1764. <Image condition="is">C:\Program Files\ownCloud\owncloud.exe</Image>
  1765. <Image condition="is">C:\Program Files (x86)\ownCloud\owncloud.exe</Image>
  1766. <Rule groupRelation="and">
  1767. <Image condition="image">svchost.exe</Image>
  1768. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks</TargetObject>
  1769. </Rule>
  1770. <Image condition="begin with">C:\Program Files\SentinelOne\Sentinel Agent</Image>
  1771. <Image condition="is">System</Image>
  1772. <Rule groupRelation="and">
  1773. <Image condition="is">C:\Program Files\VMware\VMware Tools\vmtoolsd.exe</Image>
  1774. <TargetObject condition="is">HKLM\System\CurrentControlSet\Services\Tcpip\Parameters</TargetObject>
  1775. </Rule>
  1776. <Image condition="is">C:\Program Files (x86)\Webroot\WRSA.exe</Image>
  1777. <Image condition="is">C:\Program Files\WIDCOMM\Bluetooth Software\btwdins.exe</Image>
  1778. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Audit</TargetObject>
  1779. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Audit\AuditPolicy</TargetObject>
  1780. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Audit\PerUserAuditing\System</TargetObject>
  1781. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\SspiCache</TargetObject>
  1782. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains</TargetObject>
  1783. <TargetObject condition="end with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit</TargetObject>
  1784. <TargetObject condition="contains">\OpenWithProgids</TargetObject>
  1785. <TargetObject condition="end with">\OpenWithList</TargetObject>
  1786. <TargetObject condition="end with">\UserChoice</TargetObject>
  1787. <TargetObject condition="end with">\UserChoice\ProgId</TargetObject>
  1788. <TargetObject condition="end with">\UserChoice\Hash</TargetObject>
  1789. <TargetObject condition="end with">\OpenWithList\MRUList</TargetObject>
  1790. <TargetObject condition="end with">} 0xFFFF</TargetObject>
  1791. <Image condition="end with">Office\root\integration\integrator.exe</Image>
  1792. <Image condition="is">C:\WINDOWS\system32\backgroundTaskHost.exe</Image>
  1793. <Image condition="is">C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe</Image>
  1794. <Image condition="is">C:\Program Files\Windows Defender\MsMpEng.exe</Image>
  1795. <Image condition="is">C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe</Image>
  1796. <Image condition="is">C:\Program Files\Microsoft Application Virtualization\Client\AppVClient.exe</Image>
  1797. <TargetObject condition="end with">\CurrentVersion\App Paths</TargetObject>
  1798. <TargetObject condition="end with">\CurrentVersion\Image File Execution Options</TargetObject>
  1799. <TargetObject condition="end with">\CurrentVersion\Shell Extensions\Cached</TargetObject>
  1800. <TargetObject condition="end with">\CurrentVersion\Shell Extensions\Approved</TargetObject>
  1801. <TargetObject condition="end with">}\PreviousPolicyAreas</TargetObject>
  1802. <TargetObject condition="contains">\Control\WMI\Autologger\</TargetObject>
  1803. <TargetObject condition="end with">HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc\Start</TargetObject>
  1804. <TargetObject condition="end with">\Lsa\OfflineJoin\CurrentValue</TargetObject>
  1805. <TargetObject condition="end with">\Components\TrustedInstaller\Events</TargetObject>
  1806. <TargetObject condition="end with">\Components\TrustedInstaller</TargetObject>
  1807. <TargetObject condition="end with">\Components\Wlansvc</TargetObject>
  1808. <TargetObject condition="end with">\Components\Wlansvc\Events</TargetObject>
  1809. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\</TargetObject>
  1810. <TargetObject condition="end with">\Directory\shellex</TargetObject>
  1811. <TargetObject condition="end with">\Directory\shellex\DragDropHandlers</TargetObject>
  1812. <TargetObject condition="end with">\Drive\shellex</TargetObject>
  1813. <TargetObject condition="end with">\Drive\shellex\DragDropHandlers</TargetObject>
  1814. <TargetObject condition="contains">_Classes\AppX</TargetObject>
  1815. <TargetObject condition="begin with">HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\</TargetObject>
  1816. <TargetObject condition="contains all">SOFTWARE;\Microsoft\EnterpriseCertificates\Disallowed</TargetObject>
  1817. <TargetObject condition="contains all">SOFTWARE;\Microsoft\SystemCertificates\Disallowed</TargetObject>
  1818. <TargetObject condition="contains">Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing</TargetObject>
  1819. <TargetObject condition="is">HKLM\SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates</TargetObject>
  1820. <Image condition="is">C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe</Image>
  1821. <Image condition="begin with">C:\$WINDOWS.~BT\</Image>
  1822. <TargetObject condition="is">HKLM\System\CurrentControlSet\Services\Tcpip\Parameters</TargetObject>
  1823. <Rule groupRelation="and">
  1824. <Image condition="is">C:\Windows\system32\lsass.exe</Image>
  1825. <TargetObject condition="contains">HKLM\System\CurrentControlSet\Services</TargetObject>
  1826. </Rule>
  1827. <Rule groupRelation="and">
  1828. <TargetObject condition="contains">SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization</TargetObject>
  1829. <Image condition="is">C:\Windows\System32\svchost.exe</Image>
  1830. </Rule>
  1831. <TargetObject condition="is">HKLM\System\CurrentControlSet\Services\W32Time\Config\LastKnownGoodTime</TargetObject>
  1832. <TargetObject condition="is">HKLM\System\CurrentControlSet\Services\SmsRouter\State\Registration\Ids</TargetObject>
  1833. <TargetObject condition="end with">\services\clr_optimization_v2.0.50727_32\Start</TargetObject>
  1834. <TargetObject condition="end with">\services\clr_optimization_v2.0.50727_64\Start</TargetObject>
  1835. <TargetObject condition="end with">\services\clr_optimization_v4.0.30319_32\Start</TargetObject>
  1836. <TargetObject condition="end with">\services\clr_optimization_v4.0.30319_64\Start</TargetObject>
  1837. <TargetObject condition="end with">\services\DeviceAssociationService\Start</TargetObject>
  1838. <TargetObject condition="end with">\services\BITS\Start</TargetObject>
  1839. <TargetObject condition="end with">\services\TrustedInstaller\Start</TargetObject>
  1840. <TargetObject condition="end with">\services\tunnel\Start</TargetObject>
  1841. <TargetObject condition="end with">\services\UsoSvc\Start</TargetObject>
  1842. </RegistryEvent>
  1843. </RuleGroup>
  1844. <!-- Event ID 15 == FileStream Created - Includes -->
  1845. <RuleGroup groupRelation="or">
  1846. <FileCreateStreamHash onmatch="include">
  1847. <TargetFilename condition="contains">Temp\7z</TargetFilename>
  1848. <TargetFilename condition="end with">.bat</TargetFilename>
  1849. <TargetFilename condition="end with">.cmd</TargetFilename>
  1850. <TargetFilename condition="end with">Temp\debug.bin</TargetFilename>
  1851. <TargetFilename condition="end with">.dll</TargetFilename>
  1852. <TargetFilename condition="end with">.exe</TargetFilename>
  1853. <TargetFilename condition="end with">.hta</TargetFilename>
  1854. <Rule name="technique_id=T1189,technique_name=Drive-by Compromise" groupRelation="and">
  1855. <TargetFilename condition="end with">:Zone.Identifier</TargetFilename>
  1856. <Contents condition="contains any">blob:;about:internet</Contents>
  1857. </Rule>
  1858. <TargetFilename condition="end with">.lnk</TargetFilename>
  1859. <TargetFilename condition="contains">Content.Outlook</TargetFilename>
  1860. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">.ps1</TargetFilename>
  1861. <TargetFilename name="technique_id=T1059.001,technique_name=PowerShell" condition="end with">.ps2</TargetFilename>
  1862. <TargetFilename condition="end with">.reg</TargetFilename>
  1863. <TargetFilename condition="contains">Downloads</TargetFilename>
  1864. <TargetFilename condition="contains">AppData</TargetFilename>
  1865. <TargetFilename condition="contains">Temp</TargetFilename>
  1866. <TargetFilename condition="contains">ProgramData</TargetFilename>
  1867. <TargetFilename condition="contains">Users</TargetFilename>
  1868. <TargetFilename condition="end with">.vb</TargetFilename>
  1869. <TargetFilename condition="end with">.vbe</TargetFilename>
  1870. <TargetFilename condition="end with">.vbs</TargetFilename>
  1871. </FileCreateStreamHash>
  1872. </RuleGroup>
  1873. <!-- Event ID 17,18 == PipeEvent. Log Named pipe created & Named pipe connected - Includes -->
  1874. <RuleGroup groupRelation="or">
  1875. <PipeEvent onmatch="include">
  1876. <Rule groupRelation="and">
  1877. <PipeName condition="begin with">\</PipeName>
  1878. <EventType>CreatePipe</EventType>
  1879. </Rule>
  1880. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\atsvc</PipeName>
  1881. <Rule groupRelation="and">
  1882. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\msse-</PipeName>
  1883. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="end with">-server</PipeName>
  1884. </Rule>
  1885. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\msagent_</PipeName>
  1886. <PipeName name="technique_id=T1055; Possible Cobalt Strike post-exploitation jobs." condition="begin with">\postex_</PipeName>
  1887. <PipeName name="technique_id=T1021.004,technique_name=Remote Services: SSH" condition="begin with">\postex_ssh_</PipeName>
  1888. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\status_</PipeName>
  1889. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\gruntsvc</PipeName>
  1890. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\svcctl</PipeName>
  1891. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\msf-pipe</PipeName>
  1892. <Rule groupRelation="and">
  1893. <PipeName name="technique_id=T1059.001,technique_name=PowerShell" condition="begin with">\PSHost</PipeName>
  1894. <Image condition="is not">powershell.exe</Image>
  1895. </Rule>
  1896. <Rule groupRelation="and">
  1897. <PipeName name="technique_id=T1059.001,technique_name=PowerShell" condition="begin with">\PSHost</PipeName>
  1898. <Image condition="is not">powershell_ise.exe</Image>
  1899. </Rule>
  1900. <PipeName name="technique_id=T1021.002,technique_name=SMB/Windows Admin Shares" condition="begin with">\PSEXESVC</PipeName>
  1901. <PipeName name="technique_id=T1049,technique_name=System Network Connections Discovery" condition="begin with">\srvsvc</PipeName>
  1902. <Rule groupRelation="and">
  1903. <PipeName condition="begin with">\TSVCPIPE</PipeName>
  1904. </Rule>
  1905. <PipeName name="technique_id=T1033,technique_name=System Owner/User Discovery" condition="begin with">\winreg</PipeName>
  1906. </PipeEvent>
  1907. </RuleGroup>
  1908. <!-- Event ID 17,18 == PipeEvent. Log Named pipe created & Named pipe connected - Excludes -->
  1909. <RuleGroup groupRelation="or">
  1910. <PipeEvent onmatch="exclude">
  1911. <Rule groupRelation="and">
  1912. <Image condition="contains all">C:\Program Files;\Common Files\Adobe\ARM\1.0\AdobeARM.exe</Image>
  1913. <PipeName condition="begin with">\32B6B37A-4A7D-4e00-95F2-</PipeName>
  1914. <PipeName condition="end with">thsnYaVieBoda</PipeName>
  1915. </Rule>
  1916. <Rule groupRelation="and">
  1917. <Image condition="contains all">C:\Program Files;\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe</Image>
  1918. <PipeName condition="begin with">\com.adobe.reader.rna.;\mojo</PipeName>
  1919. </Rule>
  1920. <Rule groupRelation="and">
  1921. <Image condition="contains all">C:\Program Files;\Common Files\Adobe\AdobeGCClient\AGMService.exe</Image>
  1922. <PipeName condition="begin with">\gc_pipe_</PipeName>
  1923. </Rule>
  1924. <Rule groupRelation="and">
  1925. <Image condition="contains all">C:\Program Files;\Common Files\Adobe\Creative Cloud Libraries\libs\node.exe</Image>
  1926. <PipeName condition="begin with">\uv\</PipeName>
  1927. </Rule>
  1928. <Image condition="is">"C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe"</Image>
  1929. <Rule groupRelation="and">
  1930. <Image condition="contains all"> C:\Users\;\AppData\Local\Programs\Call Manager\Call Manager.exe</Image>
  1931. <PipeName condition="begin with">\crashpad_;\mojo.;\uv\</PipeName>
  1932. </Rule>
  1933. <Image condition="contains all">C:\Program Files;\Citrix\ICA Client\SelfServicePlugin\SelfService.exe</Image>
  1934. <Image condition="contains all">C:\Program Files;\Citrix\ICA Client\Receiver\Receiver.exe</Image>
  1935. <Image condition="contains all">C:\Program Files;\Citrix\ICA Client\wfcrun32.exe</Image>
  1936. <Image condition="contains all">C:\Program Files;\Citrix\ICA Client\concentr.exe</Image>
  1937. <Image condition="contains all">C:\Users\;\AppData\Local\Citrix\ICA Client\receiver\Receiver.exe</Image>
  1938. <Image condition="contains all">C:\Users\;\AppData\Local\Citrix\ICA Client\SelfServicePlugin\SelfService.exe</Image>
  1939. <Image condition="contains all">C:\Program Files;\FireEye\xagt\xagt.exe</Image>
  1940. <Rule groupRelation="and">
  1941. <Image condition="contains all">C:\Program Files;\Google\Update\Install\;setup.exe</Image>
  1942. <PipeName condition="begin with">\crashpad_</PipeName>
  1943. </Rule>
  1944. <Rule groupRelation="and">
  1945. <Image condition="contains all">C:\Program Files;\Google\Chrome\Application\chrome.exe</Image>
  1946. <PipeName condition="begin with">\mojo.</PipeName>
  1947. </Rule>
  1948. <Rule groupRelation="and">
  1949. <Image condition="contains all">C:\Program Files;\Google\Chrome\Application\;\Installer\chrmstp.exe</Image>
  1950. <PipeName condition="begin with">\crashpad_</PipeName>
  1951. </Rule>
  1952. <PipeName condition="begin with">\Vivisimo Velocity</PipeName>
  1953. <Rule groupRelation="and">
  1954. <Image condition="contains all">C:\Program Files;\Microsoft\Edge\Application\msedge.exe</Image>
  1955. <PipeName condition="begin with">\LOCAL\mojo.</PipeName>
  1956. </Rule>
  1957. <Rule groupRelation="and">
  1958. <Image condition="contains all">C:\Program Files;\Microsoft\Edge\Application\msedge.exe</Image>
  1959. <PipeName condition="begin with">\LOCAL\chrome.sync.</PipeName>
  1960. </Rule>
  1961. <Rule groupRelation="and">
  1962. <Image condition="contains all">C:\Program Files;\Microsoft\Edge\Application\msedge.exe</Image>
  1963. <PipeName condition="begin with">\LOCAL\crashpad_</PipeName>
  1964. </Rule>
  1965. <Rule groupRelation="and">
  1966. <Image condition="contains all">C:\Program Files;\Microsoft Office\root\Office16\OUTLOOK.EXE</Image>
  1967. <PipeName condition="is">\MsFteWds</PipeName>
  1968. </Rule>
  1969. <Rule groupRelation="and">
  1970. <Image condition="contains all">C:\Users\;\AppData\Local\Microsoft\Teams\current\Teams.exe</Image>
  1971. <PipeName condition="begin with">\mojo.</PipeName>
  1972. </Rule>
  1973. <Rule groupRelation="and">
  1974. <Image condition="contains all">C:\Users\;\AppData\Local\Microsoft\Teams\current\Teams.exe</Image>
  1975. <PipeName condition="begin with">\chrome.sync.</PipeName>
  1976. </Rule>
  1977. <Rule groupRelation="and">
  1978. <Image condition="contains all">C:\Program Files;\Mozilla Firefox\firefox.exe</Image>
  1979. <PipeName condition="begin with">\cubeb-pipe-</PipeName>
  1980. </Rule>
  1981. <Rule groupRelation="and">
  1982. <Image condition="contains all">C:\Program Files;\Mozilla Firefox\firefox.exe</Image>
  1983. <PipeName condition="begin with">\chrome.</PipeName>
  1984. </Rule>
  1985. <Rule groupRelation="and">
  1986. <Image condition="contains all">C:\Program Files;\Mozilla Firefox\firefox.exe</Image>
  1987. <PipeName condition="begin with">\gecko-crash-server-pipe.</PipeName>
  1988. </Rule>
  1989. <PipeName condition="is">\SQLLocal\MSSQLSERVER</PipeName>
  1990. <PipeName condition="is">\SQLLocal\INSTANCE01</PipeName>
  1991. <PipeName condition="is">\SQLLocal\SQLEXPRESS</PipeName>
  1992. <PipeName condition="is">\SQLLocal\COMMVAULT</PipeName>
  1993. <PipeName condition="is">\SQLLocal\RTCLOCAL</PipeName>
  1994. <PipeName condition="is">\SQLLocal\RTC</PipeName>
  1995. <PipeName condition="is">\SQLLocal\TMSM</PipeName>
  1996. <Image condition="is">Program Files (x86)\Microsoft SQL Server\110\DTS\binn\dtexec.exe</Image>
  1997. <Image condition="end with">PostgreSQL\9.6\bin\postgres.exe</Image>
  1998. <PipeName condition="contains">\pgsignal_</PipeName>
  1999. <Image condition="is">Program Files\Qlik\Sense\Engine\Engine.exe</Image>
  2000. <Image condition="contains all">C:\Program Files;\Qualys\QualysAgent\QualysAgent.exe</Image>
  2001. <Image condition="end with">Program Files\SplunkUniversalForwarder\bin\splunkd.exe</Image>
  2002. <Image condition="end with">Program Files\SplunkUniversalForwarder\bin\splunk.exe</Image>
  2003. <Image condition="end with">Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe</Image>
  2004. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\CMAgent\OfcCMAgent.exe</Image>
  2005. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\web\service\ofcservice.exe</Image>
  2006. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\Web\Service\DbServer.exe</Image>
  2007. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\web\service\verconn.exe</Image>
  2008. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\WEB_OSCE\WEB\CGI\cgiOnClose.exe</Image>
  2009. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\WEB_OSCE\WEB\CGI\cgiRqHotFix.exe</Image>
  2010. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\LWCS\LWCSService.exe</Image>
  2011. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\WSS\iCRCService.exe</Image>
  2012. <Image condition="end with">Program Files\Trend\SPROTECT\x64\tsc.exe</Image>
  2013. <Image condition="end with">Program Files\Trend\SPROTECT\x64\tsc64.exe</Image>
  2014. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\web\service\osceintegrationservice.exe</Image>
  2015. <Image condition="end with">Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\web\service\OfcLogReceiverSvc.exe</Image>
  2016. <PipeName condition="is">\Trend Micro OSCE Command Handler Manager</PipeName>
  2017. <PipeName condition="is">\Trend Micro OSCE Command Handler2 Manager</PipeName>
  2018. <PipeName condition="is">\Trend Micro Endpoint Encryption ToolBox Command Handler Manager</PipeName>
  2019. <PipeName condition="is">\OfcServerNamePipe</PipeName>
  2020. <PipeName condition="is">\ntapvsrq</PipeName>
  2021. <PipeName condition="is">\srvsvc</PipeName>
  2022. <PipeName condition="is">\wkssvc</PipeName>
  2023. <PipeName condition="is">\lsass</PipeName>
  2024. <PipeName condition="is">\winreg</PipeName>
  2025. <PipeName condition="is">\spoolss</PipeName>
  2026. <PipeName condition="contains">Anonymous Pipe</PipeName>
  2027. <Image condition="is">c:\windows\system32\inetsrv\w3wp.exe</Image>
  2028. </PipeEvent>
  2029. </RuleGroup>
  2030. <!-- Event ID 19,20,21, == WmiEvent. Log all WmiEventFilter, WmiEventConsumer, WmiEventConsumerToFilter activity - Includes -->
  2031. <RuleGroup groupRelation="or">
  2032. <WmiEvent onmatch="include">
  2033. <Operation name="technique_id=T1047,technique_name=Windows Management Instrumentation" condition="is">Created</Operation>
  2034. </WmiEvent>
  2035. </RuleGroup>
  2036. <!-- Event ID 22 == DNS Queries and their results Excludes -->
  2037. <RuleGroup groupRelation="or">
  2038. <!--Default to log all and exclude a few common processes-->
  2039. <DnsQuery onmatch="exclude">
  2040. <QueryName condition="end with">.1rx.io</QueryName>
  2041. <QueryName condition="end with">.2mdn.net</QueryName>
  2042. <QueryName condition="end with">.adadvisor.net</QueryName>
  2043. <QueryName condition="end with">.adap.tv</QueryName>
  2044. <QueryName condition="end with">.addthis.com</QueryName>
  2045. <QueryName condition="end with">.adform.net</QueryName>
  2046. <QueryName condition="end with">.adnxs.com</QueryName>
  2047. <QueryName condition="end with">.adroll.com</QueryName>
  2048. <QueryName condition="end with">.adrta.com</QueryName>
  2049. <QueryName condition="end with">.adsafeprotected.com</QueryName>
  2050. <QueryName condition="end with">.adsrvr.org</QueryName>
  2051. <QueryName condition="end with">.advertising.com</QueryName>
  2052. <QueryName condition="end with">.amazon-adsystem.com</QueryName>
  2053. <QueryName condition="end with">.amazon-adsystem.com</QueryName>
  2054. <QueryName condition="end with">.analytics.yahoo.com</QueryName>
  2055. <QueryName condition="end with">.aol.com</QueryName>
  2056. <QueryName condition="end with">.betrad.com</QueryName>
  2057. <QueryName condition="end with">.bidswitch.net</QueryName>
  2058. <QueryName condition="end with">.casalemedia.com</QueryName>
  2059. <QueryName condition="end with">.chartbeat.net</QueryName>
  2060. <QueryName condition="end with">.cnn.com</QueryName>
  2061. <QueryName condition="end with">.convertro.com</QueryName>
  2062. <QueryName condition="end with">.criteo.com</QueryName>
  2063. <QueryName condition="end with">.criteo.net</QueryName>
  2064. <QueryName condition="end with">.crwdcntrl.net</QueryName>
  2065. <QueryName condition="end with">.demdex.net</QueryName>
  2066. <QueryName condition="end with">.domdex.com</QueryName>
  2067. <QueryName condition="end with">.dotomi.com</QueryName>
  2068. <QueryName condition="end with">.doubleclick.net</QueryName>
  2069. <QueryName condition="end with">.doubleverify.com</QueryName>
  2070. <QueryName condition="end with">.emxdgt.com</QueryName>
  2071. <QueryName condition="end with">.exelator.com</QueryName>
  2072. <QueryName condition="end with">.google-analytics.com</QueryName>
  2073. <QueryName condition="end with">.googleadservices.com</QueryName>
  2074. <QueryName condition="end with">.googlesyndication.com</QueryName>
  2075. <QueryName condition="end with">.googletagmanager.com</QueryName>
  2076. <QueryName condition="end with">.googlevideo.com</QueryName>
  2077. <QueryName condition="end with">.gstatic.com</QueryName>
  2078. <QueryName condition="end with">.gvt1.com</QueryName>
  2079. <QueryName condition="end with">.gvt2.com</QueryName>
  2080. <QueryName condition="end with">.ib-ibi.com</QueryName>
  2081. <QueryName condition="end with">.jivox.com</QueryName>
  2082. <QueryName condition="end with">.mathtag.com</QueryName>
  2083. <QueryName condition="end with">.moatads.com</QueryName>
  2084. <QueryName condition="end with">.moatpixel.com</QueryName>
  2085. <QueryName condition="end with">.mookie1.com</QueryName>
  2086. <QueryName condition="end with">.myvisualiq.net</QueryName>
  2087. <QueryName condition="end with">.netmng.com</QueryName>
  2088. <QueryName condition="end with">.nexac.com</QueryName>
  2089. <QueryName condition="end with">.openx.net</QueryName>
  2090. <QueryName condition="end with">.optimizely.com</QueryName>
  2091. <QueryName condition="end with">.outbrain.com</QueryName>
  2092. <QueryName condition="end with">.pardot.com</QueryName>
  2093. <QueryName condition="end with">.phx.gbl</QueryName>
  2094. <QueryName condition="end with">.pinterest.com</QueryName>
  2095. <QueryName condition="end with">.pubmatic.com</QueryName>
  2096. <QueryName condition="end with">.quantcount.com</QueryName>
  2097. <QueryName condition="end with">.quantserve.com</QueryName>
  2098. <QueryName condition="end with">.revsci.net</QueryName>
  2099. <QueryName condition="end with">.rfihub.net</QueryName>
  2100. <QueryName condition="end with">.rlcdn.com</QueryName>
  2101. <QueryName condition="end with">.rubiconproject.com</QueryName>
  2102. <QueryName condition="end with">.scdn.co</QueryName>
  2103. <QueryName condition="end with">.scorecardresearch.com</QueryName>
  2104. <QueryName condition="end with">.serving-sys.com</QueryName>
  2105. <QueryName condition="end with">.sharethrough.com</QueryName>
  2106. <QueryName condition="end with">.simpli.fi</QueryName>
  2107. <QueryName condition="end with">.sitescout.com</QueryName>
  2108. <QueryName condition="end with">.smartadserver.com</QueryName>
  2109. <QueryName condition="end with">.snapads.com</QueryName>
  2110. <QueryName condition="end with">.spotxchange.com</QueryName>
  2111. <QueryName condition="end with">.taboola.com</QueryName>
  2112. <QueryName condition="end with">.taboola.map.fastly.net</QueryName>
  2113. <QueryName condition="end with">.tapad.com</QueryName>
  2114. <QueryName condition="end with">.tidaltv.com</QueryName>
  2115. <QueryName condition="end with">.trafficmanager.net</QueryName>
  2116. <QueryName condition="end with">.tremorhub.com</QueryName>
  2117. <QueryName condition="end with">.tribalfusion.com</QueryName>
  2118. <QueryName condition="end with">.turn.com</QueryName>
  2119. <QueryName condition="end with">.twimg.com</QueryName>
  2120. <QueryName condition="end with">.tynt.com</QueryName>
  2121. <QueryName condition="end with">.w55c.net</QueryName>
  2122. <QueryName condition="end with">.ytimg.com</QueryName>
  2123. <QueryName condition="end with">.zorosrv.com</QueryName>
  2124. <QueryName condition="is">1rx.io</QueryName>
  2125. <QueryName condition="is">adservice.google.com</QueryName>
  2126. <QueryName condition="is">ampcid.google.com</QueryName>
  2127. <QueryName condition="is">clientservices.googleapis.com</QueryName>
  2128. <QueryName condition="is">googleadapis.l.google.com</QueryName>
  2129. <QueryName condition="is">imasdk.googleapis.com</QueryName>
  2130. <QueryName condition="is">l.google.com</QueryName>
  2131. <QueryName condition="is">ml314.com</QueryName>
  2132. <QueryName condition="is">mtalk.google.com</QueryName>
  2133. <QueryName condition="is">update.googleapis.com</QueryName>
  2134. <QueryName condition="is">www.googletagservices.com</QueryName>
  2135. <QueryName condition="end with">.mozaws.net</QueryName>
  2136. <QueryName condition="end with">.mozilla.com</QueryName>
  2137. <QueryName condition="end with">.mozilla.net</QueryName>
  2138. <QueryName condition="end with">.mozilla.org</QueryName>
  2139. <QueryName condition="is">clients1.google.com</QueryName>
  2140. <QueryName condition="is">clients2.google.com</QueryName>
  2141. <QueryName condition="is">clients3.google.com</QueryName>
  2142. <QueryName condition="is">clients4.google.com</QueryName>
  2143. <QueryName condition="is">clients5.google.com</QueryName>
  2144. <QueryName condition="is">clients6.google.com</QueryName>
  2145. <QueryName condition="is">safebrowsing.googleapis.com</QueryName>
  2146. <QueryName condition="end with">.akadns.net</QueryName>
  2147. <QueryName condition="end with">.netflix.com</QueryName>
  2148. <QueryName condition="end with">.aspnetcdn.com</QueryName>
  2149. <QueryName condition="is">ajax.googleapis.com</QueryName>
  2150. <QueryName condition="is">cdnjs.cloudflare.com</QueryName>
  2151. <QueryName condition="is">fonts.googleapis.com</QueryName>
  2152. <QueryName condition="end with">.typekit.net</QueryName>
  2153. <QueryName condition="is">cdnjs.cloudflare.com</QueryName>
  2154. <QueryName condition="end with">.stackassets.com</QueryName>
  2155. <QueryName condition="end with">.steamcontent.com</QueryName>
  2156. <QueryName condition="end with">.arpa.</QueryName>
  2157. <QueryName condition="end with">.arpa</QueryName>
  2158. <QueryName condition="end with">.msftncsi.com</QueryName>
  2159. <QueryName condition="end with">.localmachine</QueryName>
  2160. <QueryName condition="is">localhost</QueryName>
  2161. <Rule groupRelation="and">
  2162. <Image condition="is">C:\ProgramData\LogiShrd\LogiOptions\Software\Current\updater.exe</Image>
  2163. <QueryName condition="end with">.logitech.com</QueryName>
  2164. </Rule>
  2165. <Image condition="is">C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe</Image>
  2166. <QueryName condition="end with">-pushp.svc.ms</QueryName>
  2167. <QueryName condition="end with">.b-msedge.net</QueryName>
  2168. <QueryName condition="end with">.bing.com</QueryName>
  2169. <QueryName condition="end with">.hotmail.com</QueryName>
  2170. <QueryName condition="end with">.live.com</QueryName>
  2171. <QueryName condition="end with">.live.net</QueryName>
  2172. <QueryName condition="end with">.s-microsoft.com</QueryName>
  2173. <QueryName condition="end with">.microsoft.com</QueryName>
  2174. <QueryName condition="end with">.microsoftonline.com</QueryName>
  2175. <QueryName condition="end with">.microsoftstore.com</QueryName>
  2176. <QueryName condition="end with">.ms-acdc.office.com</QueryName>
  2177. <QueryName condition="end with">.msedge.net</QueryName>
  2178. <QueryName condition="end with">.msn.com</QueryName>
  2179. <QueryName condition="end with">.msocdn.com</QueryName>
  2180. <QueryName condition="end with">.skype.com</QueryName>
  2181. <QueryName condition="end with">.skype.net</QueryName>
  2182. <QueryName condition="end with">.windows.com</QueryName>
  2183. <QueryName condition="end with">.windows.net.nsatc.net</QueryName>
  2184. <QueryName condition="end with">.windowsupdate.com</QueryName>
  2185. <QueryName condition="end with">.xboxlive.com</QueryName>
  2186. <QueryName condition="is">login.windows.net</QueryName>
  2187. <QueryName condition="is">outlook.office.com</QueryName>
  2188. <QueryName condition="is">statics.teams.cdn.office.net</QueryName>
  2189. <QueryName condition="is">acdc-direct.office.com</QueryName>
  2190. <QueryName condition="end with">.fp.measure.office.com</QueryName>
  2191. <QueryName condition="end with">office365.com</QueryName>
  2192. <QueryName condition="end with">.activedirectory.windowsazure.com</QueryName>
  2193. <QueryName condition="end with">.aria.microsoft.com</QueryName>
  2194. <QueryName condition="end with">.msauth.net</QueryName>
  2195. <QueryName condition="end with">.msftauth.net</QueryName>
  2196. <QueryName condition="end with">.opinsights.azure.com</QueryName>
  2197. <QueryName condition="is">management.azure.com</QueryName>
  2198. <QueryName condition="is">outlook.office365.com</QueryName>
  2199. <QueryName condition="is">portal.azure.com</QueryName>
  2200. <QueryName condition="is">substrate.office.com</QueryName>
  2201. <QueryName condition="is">osi.office.net</QueryName>
  2202. <QueryName condition="end with">.digicert.com</QueryName>
  2203. <QueryName condition="end with">.globalsign.com</QueryName>
  2204. <QueryName condition="end with">.globalsign.net</QueryName>
  2205. <QueryName condition="is">msocsp.com</QueryName>
  2206. <QueryName condition="is">ocsp.msocsp.com</QueryName>
  2207. <QueryName condition="is">pki.goog</QueryName>
  2208. <QueryName condition="end with">.pki.goog</QueryName>
  2209. <QueryName condition="is">ocsp.godaddy.com</QueryName>
  2210. <QueryName condition="is">amazontrust.com</QueryName>
  2211. <QueryName condition="end with">.amazontrust.com</QueryName>
  2212. <QueryName condition="is">ocsp.sectigo.com</QueryName>
  2213. <QueryName condition="is">pki-goog.l.google.com</QueryName>
  2214. <QueryName condition="end with">.usertrust.com</QueryName>
  2215. <QueryName condition="is">ocsp.comodoca.com</QueryName>
  2216. <QueryName condition="is">ocsp.verisign.com</QueryName>
  2217. <QueryName condition="is">ocsp.entrust.net</QueryName>
  2218. <QueryName condition="end with">ocsp.identrust.com</QueryName>
  2219. <QueryName condition="is">status.rapidssl.com</QueryName>
  2220. <QueryName condition="is">status.thawte.com</QueryName>
  2221. <QueryName condition="is">ocsp.int-x3.letsencrypt.org</QueryName>
  2222. <QueryName condition="is">subca.ocsp-certum.com</QueryName>
  2223. <QueryName condition="is">cscasha2.ocsp-certum.com</QueryName>
  2224. <QueryName condition="is">crl.verisign.com</QueryName>
  2225. <Image condition="contains all">C:\Program Files\SentinelOne\Sentinel Agent;\SentinelAgent.exe</Image>
  2226. <QueryName condition="end with">.spotify.com</QueryName>
  2227. <QueryName condition="end with">.spotify.map.fastly.net</QueryName>
  2228. <Image condition="contains all">C:\Windows\SystemApps\Microsoft.Windows.Search;SearchApp.exe</Image>
  2229. </DnsQuery>
  2230. </RuleGroup>
  2231. <!-- Event ID 23 == File Delete and overwrite events which saves a copy to the archivedir - Includes -->
  2232. <!-- Default set to disabled due to disk space implications, enable with care!-->
  2233. <RuleGroup groupRelation="or">
  2234. <FileDelete onmatch="include">
  2235. <Rule name="Executables" groupRelation="and">
  2236. <IsExecutable>True</IsExecutable>
  2237. <Image condition="is not">C:\Windows\system32\cleanmgr.exe</Image>
  2238. <TargetFilename condition="not end with">.mui</TargetFilename>
  2239. </Rule>
  2240. <Rule name="Office documents" groupRelation="or">
  2241. <TargetFilename condition="end with">.doc</TargetFilename>
  2242. <TargetFilename condition="end with">.dot</TargetFilename>
  2243. <TargetFilename condition="end with">.docx</TargetFilename>
  2244. <TargetFilename condition="end with">.docm</TargetFilename>
  2245. <TargetFilename condition="end with">.doc</TargetFilename>
  2246. <TargetFilename condition="end with">.dot</TargetFilename>
  2247. <TargetFilename condition="end with">.docx</TargetFilename>
  2248. <TargetFilename condition="end with">.docm</TargetFilename>
  2249. <TargetFilename condition="end with">.dotx</TargetFilename>
  2250. <TargetFilename condition="end with">.dotm</TargetFilename>
  2251. <TargetFilename condition="end with">.docb</TargetFilename>
  2252. <TargetFilename condition="end with">.xls</TargetFilename>
  2253. <TargetFilename condition="end with">.xlt</TargetFilename>
  2254. <TargetFilename condition="end with">.xlm</TargetFilename>
  2255. <TargetFilename condition="end with">.xlsx</TargetFilename>
  2256. <TargetFilename condition="end with">.xlsm</TargetFilename>
  2257. <TargetFilename condition="end with">.xltx</TargetFilename>
  2258. <TargetFilename condition="end with">.xltm</TargetFilename>
  2259. <TargetFilename condition="end with">.xlsb</TargetFilename>
  2260. <TargetFilename condition="end with">.ppt</TargetFilename>
  2261. <TargetFilename condition="end with">.pptx</TargetFilename>
  2262. <TargetFilename condition="end with">.pptm</TargetFilename>
  2263. <TargetFilename condition="end with">.potx</TargetFilename>
  2264. <TargetFilename condition="end with">.potm</TargetFilename>
  2265. <TargetFilename condition="end with">.odt</TargetFilename>
  2266. <TargetFilename condition="end with">.ods</TargetFilename>
  2267. <TargetFilename condition="end with">.odp</TargetFilename>
  2268. <TargetFilename condition="end with">.pdf</TargetFilename>
  2269. <TargetFilename condition="end with">.rtf</TargetFilename>
  2270. </Rule>
  2271. <Rule name="Scripts and payloads" groupRelation="or">
  2272. <TargetFilename condition="end with">.aspx</TargetFilename>
  2273. <TargetFilename condition="end with">.bat</TargetFilename>
  2274. <TargetFilename condition="end with">.ps1</TargetFilename>
  2275. <TargetFilename condition="end with">.vbs</TargetFilename>
  2276. <TargetFilename condition="end with">.vba</TargetFilename>
  2277. <TargetFilename condition="end with">.hta</TargetFilename>
  2278. <TargetFilename condition="end with">.jar</TargetFilename>
  2279. <TargetFilename condition="end with">.js</TargetFilename>
  2280. <TargetFilename condition="end with">.cmd</TargetFilename>
  2281. <TargetFilename condition="end with">.sh</TargetFilename>
  2282. <TargetFilename condition="end with">.sct</TargetFilename>
  2283. <TargetFilename condition="end with">.lnk</TargetFilename>
  2284. </Rule>
  2285. <Rule name="other interesting files" groupRelation="or">
  2286. <TargetFilename condition="end with">.bin</TargetFilename>
  2287. <TargetFilename condition="end with">.iso</TargetFilename>
  2288. <TargetFilename condition="end with">.7z</TargetFilename>
  2289. <TargetFilename condition="end with">.msi</TargetFilename>
  2290. <TargetFilename condition="end with">.dmp</TargetFilename>
  2291. <TargetFilename condition="end with">.reg</TargetFilename>
  2292. </Rule>
  2293. </FileDelete>
  2294. </RuleGroup>
  2295. <!-- Event ID 24 == Clipboard change events, only captures text, not files - Includes -->
  2296. <!-- Default set to disabled due to privacy implications and potential data you leave for attackers, enable with care!-->
  2297. <RuleGroup groupRelation="or">
  2298. <ClipboardChange onmatch="include" />
  2299. </RuleGroup>
  2300. <!-- Event ID 25 == Process tampering events - Excludes -->
  2301. <RuleGroup groupRelation="or">
  2302. <ProcessTampering onmatch="exclude">
  2303. <Image condition="is">C:\Program Files\Mozilla Firefox\firefox.exe</Image>
  2304. <Image condition="is">C:\Program Files\Mozilla Firefox\updater.exe</Image>
  2305. <Image condition="is">C:\Program Files\Mozilla Firefox\default-browser-agent.exe</Image>
  2306. <Image condition="is">C:\Program Files\Mozilla Firefox\pingsender.exe</Image>
  2307. <Image condition="is">C:\Program Files\Git\cmd\git.exe</Image>
  2308. <Image condition="is">C:\Program Files\Git\mingw64\bin\git.exe</Image>
  2309. <Image condition="is">C:\Program Files\Git\mingw64\libexec\git-core\git.exe</Image>
  2310. <Image condition="is">C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe</Image>
  2311. <Rule groupRelation="and">
  2312. <Image condition="begin with">C:\Program Files (x86)\Microsoft\Edge\Application\</Image>
  2313. <Image condition="end with">\BHO\ie_to_edge_stub.exe</Image>
  2314. </Rule>
  2315. <Rule groupRelation="and">
  2316. <Image condition="begin with">C:\Program Files (x86)\Microsoft\Edge\Application\</Image>
  2317. <Image condition="end with">\identity_helper.exe</Image>
  2318. </Rule>
  2319. <Rule groupRelation="and">
  2320. <Image condition="begin with">C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\</Image>
  2321. <Image condition="contains">\MicrosoftEdge_X64_</Image>
  2322. </Rule>
  2323. <Image condition="is">C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\XDelta64\xdelta3.exe</Image>
  2324. <Image condition="contains">unknown process</Image>
  2325. <Image condition="is">C:\Program Files\Microsoft VS Code\Code.exe</Image>
  2326. <Image condition="is">C:\Windows\System32\wbem\WMIADAP.exe</Image>
  2327. </ProcessTampering>
  2328. </RuleGroup>
  2329. <!-- Event ID 26 == File Delete and overwrite events, does NOT save the file - Includes -->
  2330. <RuleGroup groupRelation="or">
  2331. <FileDeleteDetected onmatch="include">
  2332. <TargetFilename condition="contains all">C:\Program Files\Microsoft SQL Server;\Shared\ErrorDumps</TargetFilename>
  2333. <TargetFilename condition="contains all">C:\Program Files\Microsoft SQL Server;\DataDumps</TargetFilename>
  2334. <TargetFilename condition="contains all">C:\Program Files (X86)\Microsoft SQL Server\;Shared\ErrorDumps</TargetFilename>
  2335. <Rule groupRelation="and">
  2336. <TargetFilename condition="contains all">C:\PS-Transcripts\;PowerShell_transcript</TargetFilename>
  2337. <TargetFilename condition="contains">.txt</TargetFilename>
  2338. </Rule>
  2339. <Rule groupRelation="and">
  2340. <TargetFilename condition="begin with">C:\Program Files\Qualys\QualysAgent</TargetFilename>
  2341. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2342. </Rule>
  2343. <Rule groupRelation="and">
  2344. <TargetFilename condition="contains">\Downloads\</TargetFilename>
  2345. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2346. </Rule>
  2347. <Rule groupRelation="and">
  2348. <TargetFilename condition="contains">\Appdata\Local\Temp\</TargetFilename>
  2349. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2350. </Rule>
  2351. <Rule groupRelation="and">
  2352. <TargetFilename condition="contains">\Appdata\Local\Microsoft\Windows\INetCache\Content.Outlook\</TargetFilename>
  2353. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2354. </Rule>
  2355. <Rule groupRelation="and">
  2356. <TargetFilename condition="begin with">C:\ProgramData\Intel</TargetFilename>
  2357. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2358. </Rule>
  2359. <Rule groupRelation="and">
  2360. <TargetFilename condition="begin with">C:\ProgramData\Mozilla</TargetFilename>
  2361. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2362. </Rule>
  2363. <Rule groupRelation="and">
  2364. <TargetFilename condition="begin with">C:\ProgramData\chocolatey\logs</TargetFilename>
  2365. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2366. </Rule>
  2367. <Rule groupRelation="and">
  2368. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\DeviceSync</TargetFilename>
  2369. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2370. </Rule>
  2371. <Rule groupRelation="and">
  2372. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\PlayReady</TargetFilename>
  2373. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2374. </Rule>
  2375. <Rule groupRelation="and">
  2376. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\User Account Pictures</TargetFilename>
  2377. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2378. </Rule>
  2379. <Rule groupRelation="and">
  2380. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\Crypto\DSS\MachineKeys</TargetFilename>
  2381. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2382. </Rule>
  2383. <Rule groupRelation="and">
  2384. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys</TargetFilename>
  2385. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2386. </Rule>
  2387. <Rule groupRelation="and">
  2388. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\NetFramework\BreadcrumbStore</TargetFilename>
  2389. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2390. </Rule>
  2391. <Rule groupRelation="and">
  2392. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\Office\Heartbeat</TargetFilename>
  2393. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2394. </Rule>
  2395. <Rule groupRelation="and">
  2396. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\Windows\WER\ReportQueue</TargetFilename>
  2397. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2398. </Rule>
  2399. <Rule groupRelation="and">
  2400. <TargetFilename condition="begin with">C:\ProgramData\Microsoft\Windows\WER\Temp</TargetFilename>
  2401. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2402. </Rule>
  2403. <Rule groupRelation="and">
  2404. <TargetFilename condition="begin with">C:\Users\All Users\Intel</TargetFilename>
  2405. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2406. </Rule>
  2407. <Rule groupRelation="and">
  2408. <TargetFilename condition="begin with">C:\Users\All Users\Mozilla</TargetFilename>
  2409. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2410. </Rule>
  2411. <Rule groupRelation="and">
  2412. <TargetFilename condition="begin with">C:\Users\All Users\chocolatey\logs</TargetFilename>
  2413. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2414. </Rule>
  2415. <Rule groupRelation="and">
  2416. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\DeviceSync</TargetFilename>
  2417. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2418. </Rule>
  2419. <Rule groupRelation="and">
  2420. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\PlayReady</TargetFilename>
  2421. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2422. </Rule>
  2423. <Rule groupRelation="and">
  2424. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\User Account Pictures</TargetFilename>
  2425. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2426. </Rule>
  2427. <Rule groupRelation="and">
  2428. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys</TargetFilename>
  2429. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2430. </Rule>
  2431. <Rule groupRelation="and">
  2432. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys</TargetFilename>
  2433. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2434. </Rule>
  2435. <Rule groupRelation="and">
  2436. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\NetFramework\BreadcrumbStore</TargetFilename>
  2437. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2438. </Rule>
  2439. <Rule groupRelation="and">
  2440. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Office\Heartbeat</TargetFilename>
  2441. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2442. </Rule>
  2443. <Rule groupRelation="and">
  2444. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Windows\WER\ReportArchive</TargetFilename>
  2445. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2446. </Rule>
  2447. <Rule groupRelation="and">
  2448. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Windows\WER\ReportQueue</TargetFilename>
  2449. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2450. </Rule>
  2451. <Rule groupRelation="and">
  2452. <TargetFilename condition="begin with">C:\Users\All Users\Microsoft\Windows\WER\Temp</TargetFilename>
  2453. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2454. </Rule>
  2455. <Rule groupRelation="and">
  2456. <TargetFilename condition="begin with">C:\Windows\Tasks</TargetFilename>
  2457. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2458. </Rule>
  2459. <Rule groupRelation="and">
  2460. <TargetFilename condition="begin with">C:\Windows\tracing</TargetFilename>
  2461. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2462. </Rule>
  2463. <Rule groupRelation="and">
  2464. <TargetFilename condition="begin with">C:\Windows\Registration\CRMLog</TargetFilename>
  2465. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2466. </Rule>
  2467. <Rule groupRelation="and">
  2468. <TargetFilename condition="begin with">C:\Windows\System32\Tasks</TargetFilename>
  2469. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2470. </Rule>
  2471. <Rule groupRelation="and">
  2472. <TargetFilename condition="begin with">C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys</TargetFilename>
  2473. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2474. </Rule>
  2475. <Rule groupRelation="and">
  2476. <TargetFilename condition="begin with">C:\Windows\System32\spool\drivers\color</TargetFilename>
  2477. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2478. </Rule>
  2479. <Rule groupRelation="and">
  2480. <TargetFilename condition="begin with">C:\Windows\SysWOW64\Tasks</TargetFilename>
  2481. <TargetFilename condition="contains any">.com;.bat;.exe;.reg;.ps1;.vbs;.vba;.lnk;.doc;.xls;.hta;.bin;.7z;.dll;.xla;.cmd;.sh;.lnk;.pptm;.scr;.msi;.sct</TargetFilename>
  2482. </Rule>
  2483. </FileDeleteDetected>
  2484. </RuleGroup>
  2485. <!-- Event ID 26 == File Delete and overwrite events - Excludes -->
  2486. <RuleGroup groupRelation="or">
  2487. <FileDeleteDetected onmatch="exclude">
  2488. <Image condition="contains all">\appdata\local\google\chrome\user data\swreporter\;software_reporter_tool.exe</Image>
  2489. <Image condition="is">C:\Program Files (x86)\Google\Chrome\Application\chrome.exe</Image>
  2490. <User condition="contains any">NETWORK SERVICE; LOCAL SERVICE</User>
  2491. </FileDeleteDetected>
  2492. </RuleGroup>
  2493. <RuleGroup groupRelation="or">
  2494. <CreateRemoteThread onmatch="include">
  2495. <SourceImage name="technique_id=T1055,technique_name=Process Injection" condition="begin with">C:\</SourceImage>
  2496. <SourceImage name="technique_id=T1055,technique_name=Process Injection" condition="begin with">\\</SourceImage>
  2497. </CreateRemoteThread>
  2498. </RuleGroup>
  2499. <RuleGroup groupRelation="or">
  2500. <FileDelete onmatch="exclude">
  2501. <Rule groupRelation="and">
  2502. <Image condition="is">C:\Windows\System32\svchost.exe</Image>
  2503. <TargetFilename condition="end with">.tmp</TargetFilename>
  2504. </Rule>
  2505. </FileDelete>
  2506. </RuleGroup>
  2507. </EventFiltering>
  2508. </Sysmon>