Sigma Templates
Selection of Sigma rules for use as guides or templates
Detection of Sysinternals Usage
description: Detects the usage of Sysinternals Tools
tags:
- attack.t1588.002
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: ' -accepteula'
condition: selection
falsepositives:
- Legitimate use of SysInternals toolsLSASS Dump Detection
description: LSASS memory dump creation using operating systems utilities.
tags:
- attack.credential_access
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains: 'lsass'
TargetFilename|endswith: 'dmp'
condition: selection
fields:
- ComputerName
- TargetFilename
falsepositives:
- Admin activity
level: highSuspicious Add Scheduled Task From User AppData Temp
Disable UAC Using Registry
Windows Defender Service Disabled
PowerShell Get-Clipboard Cmdlet Via CLI
User Account Hidden By Registry
Last updated
Was this helpful?

