Product: Sysmon
Use-Case: Ransomware
Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
5 | 0 | 13 | 3 | 14 |
Event Type | Rules | Models |
---|---|---|
app-login | T1078 - Valid Accounts ↳ Auth-Ransomware-Shost: User authentication or login from a known ransomware IP |
|
file-write | T1486 - Data Encrypted for Impact ↳ FA-EXT: A file has been written and is suspected of Ransomware on host |
|
process-created | T1059 - Command and Scripting Interperter ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1059.003 - T1059.003 ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1222 - File and Directory Permissions Modification ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1486 - Data Encrypted for Impact ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1490 - Inhibit System Recovery ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1070 - Indicator Removal on Host ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset ↳ A-Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected on this asset. T1003 - OS Credential Dumping ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset T1003.001 - T1003.001 ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset T1070.001 - Indicator Removal on Host: Clear Windows Event Logs ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset T1218 - Signed Binary Proxy Execution ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset T1218.011 - Signed Binary Proxy Execution: Rundll32 ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset |