Skip to content

cloatre/sysmonMalProcFind

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

sysmonMalProcFind

The goal of this script is to make same checks as malprocfind plugin on logs generated by Sysmon.

The input is a csv file with time, processId, ParentCommandLine, ParentImage, process, CurrentDirectory, CommandLine, SecurityID, TerminalSessionID

The input file can be generated by Splunk.

  1. Inject sysmon into Splunk with a good parser

  2. Search in Splunk: index=sysmon-test | table _time, Computer, ProcessId, ParentCommandLine, ParentImage, process, CurrentDisrectory, CommandLine, SecurityID, TerminalSessionId

  3. Export result as csv File

  4. Run python2 mainLoic.py test.csv

It first search for usual exe of windows (like in Find Evil SANS Poster). Then it search for typosquating (to find for example scvhost.exe ou ssms.exe).

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages