-
Notifications
You must be signed in to change notification settings - Fork 521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] SMB Connections via LOLBin or Untrusted Process #4218
Comments
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
TestingThe query that is used by the detection rule that we are testing in this issue:
This basically follows the following flow:
I mimicked the query from the tagged detection rule as follows:
I then ran the following reverse shell connection, making sure the chain is not divided between parent/child, but just a singular process.
This results in the following detection: ![]() So based on this analysis, I think this rule does not require tuning. I don't have a windows environment set up to mimic this actual detection rule. @w0rk3r might have this, and I can guide him through setting up an agent with a different artifact if desired. But based on this analysis, I think this should not cause any issues with the rule. |
Awesome LGTM! |
Link to Rule
https://github.com/elastic/detection-rules/blob/main/rules/windows/lateral_movement_direct_outbound_smb_connection.toml
Rule Tuning Type
Performance - Optimizing resource consumption and execution time of detection rules.
Description
event.type == "start"
untilevent.type == "end"
. We should tune this rule to address event aggregation issues where event.type for both will be aggregated within the same event if they fire within 5 seconds causing the sequence to potentially NOP.Example Data
No response
cc. @nicholasberlin
The text was updated successfully, but these errors were encountered: