Hello everyone — I need help with correlating two Windows events in Wazuh and I’m stuck. I’ll keep it short and give the details, the rules I’m using, and the exact problem.
Goal
Problem
I can’t compare the two fields because they have different key names (callerProcessID vs processId).
My idea was to update the decoder to add a new key (for example win.eventdata.processId) with the value of callerProcessID, but I cannot change the windows_eventchannel decoder (this is a managed/standard decoder). See related discussion: https://github.com/wazuh/wazuh/issues/3193 and https://groups.google.com/g/wazuh/c/i4oOe19YqME
Attachments
sysmon_eid1_detections.json (contains processId)
rule100100.json (contains callerProcessID)
Hi Federico — thanks a lot for the great answer, really appreciated!
A few questions — I made two changes on my side in correlation.sh script:
Added the wazuh_index password.
Increased the correlation timeframe from 30s → 240s.
After that the active response was triggered (logs below). I can also see the alert lines in alerts.json on the manager, but the alerts do not appear in the Wazuh dashboard.
— active response log—
2025-09-20 12:20:54 - [DEBUG] Running /var/ossec/active-response/bin/correlation.sh
2025-09-20 12:21:19 - [DEBUG] Waiting for input
2025-09-20 12:21:19 - [DEBUG] {"version":1,"origin":{"name":"node01","module":"wazuh-execd"},"command":"add","parameters":{"extra_args":[],"alert":{"timestamp":"2025-09-20T09:19:14.201+0000","rule":{"level":5,"description":"Google Chrome DPAPI decryption detected (Chrome secrets accessed) with caller id 10652.","id":"100600","firedtimes":5,"mail":false,"groups":["windows","dpapi"]},"agent":{"id":"001","name":"DESKTOP-LLOLL7R","ip":"192.168.1.30"},"manager":{"name":"WazuhSIEM"},"id":"1758359954.25429293","full_log":"{\"win\":{\"system\":{\"providerName\":\"Microsoft-Windows-Crypto-DPAPI\",\"providerGuid\":\"{89fe8f40-cdce-464e-8217-15ef97d4c7c3}\",\"eventID\":\"16385\",\"version\":\"0\",\"level\":\"4\",\"task\":\"64\",\"opcode\":\"0\",\"keywords\":\"0x2000000000000040\",\"systemTime\":\"2025-09-20T09:19:14.0344384Z\",\"eventRecordID\":\"3924\",\"processID\":\"668\",\"threadID\":\"752\",\"channel\":\"Microsoft-Windows-Crypto-DPAPI/Debug\",\"computer\":\"DESKTOP-LLOLL7R\",\"severityValue\":\"INFORMATION\",\"message\":\"\\\"DPAPIDefInformationEvent\\\"\"},\"eventdata\":{\"operationType\":\"SPCryptUnprotect\",\"dataDescription\":\"Google Chrome\",\"masterKeyGUID\":\"{031843ca-f346-4164-9a8a-2229c3e55527}\",\"flags\":\"1\",\"protectionFlags\":\"16\",\"returnValue\":\"0\",\"callerProcessStartKey\":\"2251799814192519\",\"callerProcessID\":\"10652\",\"callerProcessCreationTime\":\"134028335526122890\",\"plainTextDataSize\":\"32\"}}}","decoder":{"name":"windows_eventchannel"},"data":{"win":{"system":{"providerName":"Microsoft-Windows-Crypto-DPAPI","providerGuid":"{89fe8f40-cdce-464e-8217-15ef97d4c7c3}","eventID":"16385","version":"0","level":"4","task":"64","opcode":"0","keywords":"0x2000000000000040","systemTime":"2025-09-20T09:19:14.0344384Z","eventRecordID":"3924","processID":"668","threadID":"752","channel":"Microsoft-Windows-Crypto-DPAPI/Debug","computer":"DESKTOP-LLOLL7R","severityValue":"INFORMATION","message":"\"DPAPIDefInformationEvent\""},"eventdata":{"operationType":"SPCryptUnprotect","dataDescription":"Google Chrome","masterKeyGUID":"{031843ca-f346-4164-9a8a-2229c3e55527}","flags":"1","protectionFlags":"16","returnValue":"0","callerProcessStartKey":"2251799814192519","callerProcessID":"10652","callerProcessCreationTime":"134028335526122890","plainTextDataSize":"32"}}},"location":"EventChannel"},"program":"active-response/bin/correlation"}}
2025-09-20 12:21:19 - Matching Alerts found in the last 130s (hits: 1)
2025-09-20 12:21:19 - [DEBUG] Pushing alert to /var/ossec/queue/sockets/queue
— log from alerts.json —
{"timestamp":"2025-09-20T09:21:19.641+0000","rule":{"level":12,"description":"Correlation rule between events from rules 92032 and 100600","id":"100610","firedtimes":5,"mail":true,"groups":["windows","dpapi"]},"agent":{"id":"000","name":"WazuhSIEM"},"manager":{"name":"WazuhSIEM"},"id":"1758360079.26125353","full_log":"Matching process ID and caller Process ID in alerts with rule ID 92032 and 100600\n","decoder":{"name":"correlate_sysmon"},"data":{"caller_rule_id":"92032","callee_rule_id":"100600"},"location":"/var/ossec/active-response/bin/correlation.sh"}
Could you help me identify what might be wrong? Also, how can I print binary details from rule 92032 (image name, download path, PID, etc.) in the alert?
Best Regards,
--
You received this message because you are subscribed to a topic in the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/wazuh/3tDKZUgDScY/unsubscribe.
To unsubscribe from this group and all its topics, send an email to wazuh+un...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/86c174be-cad3-409d-b6e5-bd69de8a56e3n%40googlegroups.com.
![]() |
|