CyberArkEPM - Uncommon Windows process started from System folder
| Id | 16b940d2-aaf8-4eaa-a5e1-05df5f5c3d43 |
| Rulename | CyberArkEPM - Uncommon Windows process started from System folder |
| Description | Detects when uncommon windows proccess is started from System folder. |
| Severity | Medium |
| Tactics | Execution DefenseEvasion |
| Techniques | T1204 T1036 |
| Required data connectors | CyberArkEPM |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 14d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMNewProcessStartetFromSystem.yaml |
| Version | 1.0.0 |
| Arm template | 16b940d2-aaf8-4eaa-a5e1-05df5f5c3d43.json |
let lb_period = 14d;
let q_time = 1h;
let sys_proc = CyberArkEPM
| where TimeGenerated between (ago(lb_period) .. ago(q_time))
| where EventSubType != 'AttackAttempt'
| where ActingProcessName has @'\'
| where ActingProcessName has_any ('System32', 'SysWOW64')
| summarize makeset(ActingProcessFileInternalName);
CyberArkEPM
| where TimeGenerated > ago(q_time)
| where EventSubType != 'AttackAttempt'
| where ActingProcessName has @'\'
| where ActingProcessName has_any ('System32', 'SysWOW64')
| where ActingProcessFileInternalName !in (sys_proc)
| extend AccountCustomEntity = ActorUsername
version: 1.0.0
requiredDataConnectors:
- connectorId: CyberArkEPM
dataTypes:
- CyberArkEPM
entityMappings:
- fieldMappings:
- identifier: Name
columnName: AccountCustomEntity
entityType: Account
tactics:
- Execution
- DefenseEvasion
relevantTechniques:
- T1204
- T1036
queryFrequency: 1h
severity: Medium
name: CyberArkEPM - Uncommon Windows process started from System folder
description: |
'Detects when uncommon windows proccess is started from System folder.'
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMNewProcessStartetFromSystem.yaml
query: |
let lb_period = 14d;
let q_time = 1h;
let sys_proc = CyberArkEPM
| where TimeGenerated between (ago(lb_period) .. ago(q_time))
| where EventSubType != 'AttackAttempt'
| where ActingProcessName has @'\'
| where ActingProcessName has_any ('System32', 'SysWOW64')
| summarize makeset(ActingProcessFileInternalName);
CyberArkEPM
| where TimeGenerated > ago(q_time)
| where EventSubType != 'AttackAttempt'
| where ActingProcessName has @'\'
| where ActingProcessName has_any ('System32', 'SysWOW64')
| where ActingProcessFileInternalName !in (sys_proc)
| extend AccountCustomEntity = ActorUsername
kind: Scheduled
queryPeriod: 14d
triggerOperator: gt
id: 16b940d2-aaf8-4eaa-a5e1-05df5f5c3d43