Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.06 KB

LEGACY-S00063.md

File metadata and controls

35 lines (28 loc) · 1.06 KB

Rules: Potential malicious document executed

Description

A document was downloaded and opened followed shortly by an executable or dll download shortly thereafter

Additional Details

Detail Value
Type Match
Category Execution
Apply Risk to Entities device_hostname, device_ip, srcDevice_hostname, srcDevice_ip, user_username
Signal Name Potential malicious document executed
Summary Expression Suspicious download detected from IP: {{srcDevice_ip}}
Score/Severity Static: 2
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTechnique:T1204, _mitreAttackTechnique:T1204.002

Vendors and Products

Fields Used

Origin Field
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema metadata_deviceEventId
Normalized Schema metadata_product
Normalized Schema srcDevice_hostname
Normalized Schema srcDevice_ip
Normalized Schema threat_name
Normalized Schema user_username