Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
40 changes: 40 additions & 0 deletions rules/defense_evasion_suspicious_protected_process_execution.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
name: Suspicious protected process execution
id: a778295a-02f1-42d9-9c20-78346a7bc2c6
version: 1.0.0
description: |
Identifies unprivileged process spawning a child with protected integrity level. This
indicates an unusual behavior that is often associated with attempts to tamper with or
freeze endpoint protection components.
labels:
tactic.id: TA0005
tactic.name: Defense Evasion
tactic.ref: https://attack.mitre.org/tactics/TA0005/
technique.id: T1562
technique.name: Impair Defenses
technique.ref: https://attack.mitre.org/techniques/T1562/
subtechnique.id: T1562.001
subtechnique.name: Disable or Modify Tools
subtechnique.ref: https://attack.mitre.org/techniques/T1562/001
references:
- https://github.com/TwoSevenOneT/EDR-Freeze

condition: >
sequence
maxspan 1m30s
|spawn_process and
ps.token.integrity_level != 'SYSTEM' and
ps.exe not imatches
(
'?:\\Program Files\\*',
'?:\\Program Files(x86)\\*'
)
| by ps.uuid
|spawn_process and ps.is_protected| by ps.parent.uuid
action:
- name: kill

output: >
Suspicious protected process %2.ps.exe spawned by process %2.ps.parent.exe
severity: high

min-engine-version: 3.0.0
Loading