Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] Incorrect logic statement in detection search "Detect Renamed PSExec" #3009

Open
OberAlex opened this issue May 14, 2024 · 0 comments
Open
Labels
bug Something isn't working

Comments

@OberAlex
Copy link

Description:

The detection search "Detect Renamed PSExec" in the "Active Directory Lateral Movement" Analytic Story has an incorrect logic statement in its search query that results in all results being return with an "original_file_name=psexec.c".

Expected Result:

If process_name=psexec.exe or process_name=psexec64.exe and original_file_name=psexec.c then it shouldn't return the event. It should only return it if it doesn't equal both psexec.exe and psexec64.exe.

Actual Result:

In my case, my process_name was "PsExec.exe", which shouldn't be returned. But it was because it didn't satisfy both conditions of the OR statement. "PsExec.exe" does equal "psexec.exe" but it doesn't equal "psexec64.exe".

App version:

  • ESCU: 4.31.0
  • Splunk Security Essentials: 3.8.0

Suggested Fix:

Change this part of the query from...
(Processes.process_name!=psexec.exe OR Processes.process_name!=psexec64.exe)

to...

(Processes.process_name!=psexec.exe AND Processes.process_name!=psexec64.exe)

@OberAlex OberAlex added the bug Something isn't working label May 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant