Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.18 KB

MATCH-S00331.md

File metadata and controls

33 lines (26 loc) · 1.18 KB

Rules: MavInject Process Injection

Description

Detects process injection using the signed Windows tool Mavinject32.exe

Additional Details

Detail Value
Type Templated Match
Category Execution
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name MavInject Process Injection
Summary Expression Process injection indicator in command on host: {{device_hostname}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0004, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1055, _mitreAttackTechnique:T1055.001, _mitreAttackTechnique:T1055.003, _mitreAttackTechnique:T1055.009, _mitreAttackTechnique:T1218, _mitreAttackTechnique:T1218.013

Vendors and Products

Fields Used

Origin Field
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username