Raw Log...
2015 Mar 31 11:37:27 WinEvtLog: System: INFORMATION(1): Sysmon: Username: SYSTEM-NAME: SYSTEM-NAME: Process Create: UtcTime: 3/31/2015 06:37:27.465 PM ProcessGuid: {7531FA7E-E967-551A-0000-0010D2A58706} ProcessId: 5868 Image: C:\Folder\Folder\file.exe CommandLine: C:\Folder\Folder\file.exe User: DOMAIN\Username LogonGuid: {7531FA7E-E963-551A-0000-0020EB238706} LogonId: 0x68723eb TerminalSessionId: 1 IntegrityLevel: no level HashType: SHA1 Hash: 19AF48C6B036E722D74FA00C4E852774236D2F38 ParentProcessGuid: {7531FA7E-E965-551A-0000-0010038F8706} ParentProcessId: 476 ParentImage: C:\Folder\Folder\Parent.exe ParentCommandLine: "C:\Folder\Folder\Parent.exe"
Decoded...
**Phase 2: Completed decoding.
decoder: 'windows'
status: 'C:\Folder\Folder\file.exe'
dstuser: 'DOMAIN\Username'
url: '19AF48C6B036E722D74FA00C4E852774236D2F38'
extra_data: 'C:\Folder\Folder\Parent.exe'
**Phase 3: Completed filtering (rules).
Rule id: '100242'
Level: '12'
Description: 'Unauthorized Process Detected'
**Alert to be generated.
Rules...
<rule id="100241" level="0">
<if_sid>18100</if_sid>
<list field="url">rules/lists/filelist</list>
<description>Authorized Process</description>
</rule>
<rule id="100242" level="12">
<if_sid>18100</if_sid>
<list field="url" lookup="not_match_key">rules/lists/filelist</list>
<description>Unauthorized Process</description>
</rule>
CDB file contents...
19AF48C6B036E722D74FA00C4E852774236D2F38:file.exe
Goal:
I would like to monitor a system for expected behavior and receive alerts when unexpected behavior occurs. I have a list of SHA1 hashes of the executables as in the CDB file contents above. I simply want an alert when there are processes executed from this system outside of its baseline.
Issue:
I cannot get a MATCH to work in the CDB. Maybe its something simple and I've just been looking at this too long. I've commented out the 100242 rule and I cannot get 100241 to work.
Much of the documentation supports no file extensions on the cdb lists in the ossec.conf and in the rules.xml - although I can find examples where people have included extensions...
Maybe something silly I've overlooked? Please... someone slap some sense into me!!!
Thank you!