Skip to content

Commit

Permalink
Update defense_evasion_elastic_memory_threat_prevented.toml
Browse files Browse the repository at this point in the history
  • Loading branch information
Samirbous authored Dec 18, 2024
1 parent a7be955 commit 4d45523
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ The second category is referred to as shellcode thread and is unique to Windows
- Investigate the process execution chain (parent process tree) for unknown processes. Examine their executable files for prevalence, whether they are located in expected locations, and if they are signed with valid digital signatures.
- Assess whether this behavior is prevalent in the environment by looking for similar occurrences across hosts :
- For shellcode alerts, the key for bucketing alerts is stored in the `Memory_protection.unique_key_v1` field.
- For Memory signature alerts are bucketed based on the signatures which hit `rule.name`.
- For Memory signature alerts, bucket based on the signatures which match `rule.name`.
- Examine the following fields if there are any matches on known Yara signatures:
- `process.Ext.memory_region.malware_signature.all_names`
- `Target.process.Ext.memory_region.malware_signature.all_names`
Expand Down

0 comments on commit 4d45523

Please sign in to comment.