Skip to content

Latest commit

 

History

History
32 lines (25 loc) · 1.18 KB

MATCH-S00699.md

File metadata and controls

32 lines (25 loc) · 1.18 KB

Rules: Sysmon - RawAccessRead Event

Description

The RawAccessRead event detects when a process conducts reading operations from the drive using the \.\ denotation. This technique is often used by malware for data exfiltration of files that are locked for reading, as well as to avoid file access auditing tools. The event indicates the source process and target device.

Additional Details

Detail Value
Type Templated Match
Category Impact
Apply Risk to Entities device_hostname, user_username
Signal Name Sysmon - RawAccessRead Event
Summary Expression RawAccessRead Event on {{device_hostname}} with user: {{user_username}}
Score/Severity Static: 1
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0040, _mitreAttackTechnique:T1561, _mitreAttackTechnique:T1561.001, _mitreAttackTechnique:T1561.002

Vendors and Products

Fields Used

Origin Field
Normalized Schema device_hostname
Normalized Schema metadata_deviceEventId
Normalized Schema metadata_product
Normalized Schema metadata_vendor
Normalized Schema user_username