Skip to content

Commit

Permalink
Updated rulesets
Browse files Browse the repository at this point in the history
  • Loading branch information
wagga40 committed May 20, 2021
1 parent 7fc8fd4 commit 6d36486
Show file tree
Hide file tree
Showing 4 changed files with 44 additions and 14 deletions.
2 changes: 1 addition & 1 deletion Readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ mv data.js gui/

Then you just have to open `index.html` in your favorite browser and click on a Mitre Att&ck category or an alert level.

:warning: **The mini-GUI was not build to handle big datasets**.
:warning: **The mini-GUI was not built to handle big datasets**.

### Forward SIGMA detected events

Expand Down
27 changes: 21 additions & 6 deletions rules/rules_windows_generic.json
Original file line number Diff line number Diff line change
Expand Up @@ -1392,6 +1392,21 @@
"SELECT * FROM logs WHERE (TargetImage LIKE \"%\\\\windows\\\\system32\\\\svchost.exe\" ESCAPE '\\' AND GrantedAccess = \"0x1f3fff\" AND (CallTrace LIKE \"%unknown%\" ESCAPE '\\'))"
]
},
{
"title": "Suspicious Shells Spawn by WinRM - DA853C87",
"description": "Detects suspicious shell spawn from WinRM host process",
"author": "Andreas Hunkeler (@Karneades), Markus Neis",
"tags": [
"attack.t1190",
"attack.initial_access",
"attack.persistence",
"attack.privilege_escalation"
],
"level": "critical",
"rule": [
"SELECT * FROM logs WHERE (EventID = \"4688\" AND Channel = \"Security\" AND ParentProcessName LIKE \"%\\\\wsmprovhost.exe\" ESCAPE '\\' AND (NewProcessName LIKE \"%\\\\cmd.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\sh.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\bash.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\powershell.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\schtasks.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\certutil.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\whoami.exe\" ESCAPE '\\' OR NewProcessName LIKE \"%\\\\bitsadmin.exe\" ESCAPE '\\'))"
]
},
{
"title": "LSASS Memory Dump - 3E605F84",
"description": "Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10",
Expand Down Expand Up @@ -7156,7 +7171,7 @@
{
"title": "Meterpreter or Cobalt Strike Getsystem Service Start - 2892E691",
"description": "Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service starting",
"author": "Teymur Kheirkhabarov, Ecco",
"author": "Teymur Kheirkhabarov, Ecco, Florian Roth",
"tags": [
"attack.privilege_escalation",
"attack.t1134",
Expand All @@ -7165,7 +7180,7 @@
],
"level": "high",
"rule": [
"SELECT * FROM logs WHERE ((EventID = \"4688\" AND Channel = \"Security\") AND (ParentProcessName LIKE \"%\\\\services.exe\" ESCAPE '\\' AND ((CommandLine LIKE \"%cmd%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%rundll32%\" ESCAPE '\\' AND CommandLine LIKE \"%.dll,a%\" ESCAPE '\\' AND CommandLine LIKE \"%/p:%\" ESCAPE '\\'))) AND NOT (CommandLine LIKE \"%MpCmdRun%\" ESCAPE '\\'))"
"SELECT * FROM logs WHERE ((EventID = \"4688\" AND Channel = \"Security\") AND (ParentProcessName LIKE \"%\\\\services.exe\" ESCAPE '\\' AND ((CommandLine LIKE \"%cmd%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%cmd.exe%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%rundll32%\" ESCAPE '\\' AND CommandLine LIKE \"%.dll,a%\" ESCAPE '\\' AND CommandLine LIKE \"%/p:%\" ESCAPE '\\'))) AND NOT (CommandLine LIKE \"%MpCmdRun%\" ESCAPE '\\'))"
]
},
{
Expand Down Expand Up @@ -8564,7 +8579,7 @@
{
"title": "Meterpreter or Cobalt Strike Getsystem Service Installation - 17FDA933",
"description": "Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation",
"author": "Teymur Kheirkhabarov, Ecco",
"author": "Teymur Kheirkhabarov, Ecco, Florian Roth",
"tags": [
"attack.privilege_escalation",
"attack.t1134",
Expand All @@ -8573,9 +8588,9 @@
],
"level": "critical",
"rule": [
"SELECT * FROM logs WHERE (Channel = \"System\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\'))",
"SELECT * FROM logs WHERE (Channel = \"Security\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))"
"SELECT * FROM logs WHERE (Channel = \"System\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\'))",
"SELECT * FROM logs WHERE (Channel = \"Security\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))"
]
},
{
Expand Down
27 changes: 21 additions & 6 deletions rules/rules_windows_sysmon.json
Original file line number Diff line number Diff line change
Expand Up @@ -1392,6 +1392,21 @@
"SELECT * FROM logs WHERE (EventID = \"10\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\" AND TargetImage LIKE \"%\\\\windows\\\\system32\\\\svchost.exe\" ESCAPE '\\' AND GrantedAccess = \"0x1f3fff\" AND (CallTrace LIKE \"%unknown%\" ESCAPE '\\'))"
]
},
{
"title": "Suspicious Shells Spawn by WinRM - DA853C87",
"description": "Detects suspicious shell spawn from WinRM host process",
"author": "Andreas Hunkeler (@Karneades), Markus Neis",
"tags": [
"attack.t1190",
"attack.initial_access",
"attack.persistence",
"attack.privilege_escalation"
],
"level": "critical",
"rule": [
"SELECT * FROM logs WHERE (EventID = \"1\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\" AND ParentImage LIKE \"%\\\\wsmprovhost.exe\" ESCAPE '\\' AND (Image LIKE \"%\\\\cmd.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\sh.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\bash.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\powershell.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\schtasks.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\certutil.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\whoami.exe\" ESCAPE '\\' OR Image LIKE \"%\\\\bitsadmin.exe\" ESCAPE '\\'))"
]
},
{
"title": "LSASS Memory Dump - 3E605F84",
"description": "Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10",
Expand Down Expand Up @@ -7156,7 +7171,7 @@
{
"title": "Meterpreter or Cobalt Strike Getsystem Service Start - 2892E691",
"description": "Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service starting",
"author": "Teymur Kheirkhabarov, Ecco",
"author": "Teymur Kheirkhabarov, Ecco, Florian Roth",
"tags": [
"attack.privilege_escalation",
"attack.t1134",
Expand All @@ -7165,7 +7180,7 @@
],
"level": "high",
"rule": [
"SELECT * FROM logs WHERE ((EventID = \"1\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\") AND (ParentImage LIKE \"%\\\\services.exe\" ESCAPE '\\' AND ((CommandLine LIKE \"%cmd%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%rundll32%\" ESCAPE '\\' AND CommandLine LIKE \"%.dll,a%\" ESCAPE '\\' AND CommandLine LIKE \"%/p:%\" ESCAPE '\\'))) AND NOT (CommandLine LIKE \"%MpCmdRun%\" ESCAPE '\\'))"
"SELECT * FROM logs WHERE ((EventID = \"1\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\") AND (ParentImage LIKE \"%\\\\services.exe\" ESCAPE '\\' AND ((CommandLine LIKE \"%cmd%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%cmd.exe%\" ESCAPE '\\' AND CommandLine LIKE \"%/c%\" ESCAPE '\\' AND CommandLine LIKE \"%echo%\" ESCAPE '\\' AND CommandLine LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (CommandLine LIKE \"%rundll32%\" ESCAPE '\\' AND CommandLine LIKE \"%.dll,a%\" ESCAPE '\\' AND CommandLine LIKE \"%/p:%\" ESCAPE '\\'))) AND NOT (CommandLine LIKE \"%MpCmdRun%\" ESCAPE '\\'))"
]
},
{
Expand Down Expand Up @@ -8564,7 +8579,7 @@
{
"title": "Meterpreter or Cobalt Strike Getsystem Service Installation - 17FDA933",
"description": "Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation",
"author": "Teymur Kheirkhabarov, Ecco",
"author": "Teymur Kheirkhabarov, Ecco, Florian Roth",
"tags": [
"attack.privilege_escalation",
"attack.t1134",
Expand All @@ -8573,9 +8588,9 @@
],
"level": "critical",
"rule": [
"SELECT * FROM logs WHERE (Channel = \"System\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE ((EventID = \"6\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\") AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE (Channel = \"Security\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))"
"SELECT * FROM logs WHERE (Channel = \"System\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE ((EventID = \"6\" AND Channel = \"Microsoft-Windows-Sysmon/Operational\") AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))",
"SELECT * FROM logs WHERE (Channel = \"Security\" AND ((ImagePath LIKE \"%cmd%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%\\%COMSPEC\\%%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%cmd.exe%\" ESCAPE '\\' AND ImagePath LIKE \"%/c%\" ESCAPE '\\' AND ImagePath LIKE \"%echo%\" ESCAPE '\\' AND ImagePath LIKE \"%\\\\pipe\\\\%\" ESCAPE '\\') OR (ImagePath LIKE \"%rundll32%\" ESCAPE '\\' AND ImagePath LIKE \"%.dll,a%\" ESCAPE '\\' AND ImagePath LIKE \"%/p:%\" ESCAPE '\\')))"
]
},
{
Expand Down
2 changes: 1 addition & 1 deletion zircolite.py
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,7 @@ def avoidFiles(pathList, avoidFilesList):
EVTXList = [EVTXPath]
else:
quitOnError(f"{Fore.RED} [-] Unable to extract EVTX from submitted path")
FileList = avoidFiles(selectFiles(EVTXList, args.select), args.avoid) # Apply file filters in ths order "select" than "avoid"
FileList = avoidFiles(selectFiles(EVTXList, args.select), args.avoid) # Apply file filters in this order : "select" than "avoid"
if len(FileList) > 0:
for evtx in tqdm(FileList, colour="yellow"):
extractEvtx(evtx, args.tmpdir, evtx_dumpBinary)
Expand Down

0 comments on commit 6d36486

Please sign in to comment.