Skip to content

Commit 4bfcbea

Browse files
authored
[Rule Tuning] Unusual Network Activity from a Windows System Binary (#2509)
* [Rule Tuning] Unusual Network Activity from a Windows System Binary * Update defense_evasion_network_connection_from_windows_binary.toml
1 parent 748bdbf commit 4bfcbea

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

rules/windows/defense_evasion_network_connection_from_windows_binary.toml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint", "windows"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2022/12/14"
7+
updated_date = "2023/01/31"
88

99
[rule]
1010
author = ["Elastic"]
@@ -63,7 +63,13 @@ sequence by process.entity_id with maxspan=5m
6363
process.name : "MSBuild.exe" or
6464
process.name : "msdt.exe" or
6565
process.name : "mshta.exe" or
66-
process.name : "msiexec.exe" or
66+
(
67+
process.name : "msiexec.exe" and not
68+
dns.question.name : (
69+
"ocsp.digicert.com", "ocsp.verisign.com", "ocsp.comodoca.com", "ocsp.entrust.net", "ocsp.usertrust.com",
70+
"ocsp.godaddy.com", "ocsp.camerfirma.com", "ocsp.globalsign.com", "ocsp.sectigo.com", "*.local"
71+
)
72+
) or
6773
process.name : "msxsl.exe" or
6874
process.name : "odbcconf.exe" or
6975
process.name : "rcsi.exe" or

0 commit comments

Comments
 (0)