SigmaHQ / sigma

Main Sigma Rule Repository
Other
8.37k stars 2.2k forks source link

FN on Potentially Suspicious Findstr.EXE Execution #4495

Closed Tuutaans closed 1 year ago

Tuutaans commented 1 year ago

Rule UUID

ccb5742c-c248-4982-8c5c-5571b9275ad3

Example EventLog

OriginalFileName: FINDSTR.EXE CommandLine: findstr /i "defender" LogonGuid: {8b59c806-0f5b-6532-93bb-1c0000000000} LogonId: 0x1CBB93 TerminalSessionId: 2 IntegrityLevel: Medium Hashes: SHA1=FDC776E1297D6E6FB31F8EB0E85771D886A18DC2,MD5=804A6AE28E88689E0CF1946A6CB3FEE5,SHA256=B29BE6DA54121F5D9350C545ECECCE26F30A7F209CE0D9AAEA8E00C27DDA27A2,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F ParentProcessGuid: {8b59c806-0f86-6532-f800-00000000d400} ParentProcessId: 2944 ParentImage: C:\Windows\System32\cmd.exe ParentCommandLine: "C:\Windows\system32\cmd.exe"

Description

When executed 'tasklist.exe | findstr /i "defender"', findstr is spawned as the child process of cmd.exe. As a result "Potentially Suspicious Findstr.EXE Execution" rule doesn't work. tasklistfindstr

github-actions[bot] commented 1 year ago

Welcome @Tuutaans :wave:

It looks like this is your first issue on the Sigma rules repository!

The following repository accepts issues related to false positives or 'rule ideas'.

If you're reporting an issue related to the pySigma library please consider submitting it here

If you're reporting an issue related to the deprecated sigmac library please consider submitting it here

Thanks for taking the time to open this issue, and welcome to the Sigma community! :smiley:

nasbench commented 1 year ago

Hey @Tuutaans

Thanks for reporting this. This indeed seems like an oversight. Will provide a fix as soon as possible :)