Hello
Furkan,
Below is a logtest result with the rule I provided and it works.
You can see rule
100111
triggered at phase 3.
Starting wazuh-logtest v4.9.1
Type one log per line
{"win":{"system":{"providerName":"Microsoft-Windows-Sysmon","providerGuid":"{5770385f-c22a-43e0-bf4c-06f5698ffbd9}","eventID":"8","version":"2","level":"4","task":"8","opcode":"0","keywords":"0x8000000000000000","systemTime":"2024-10-28T11:42:07.073670700Z","eventRecordID":"76553546","processID":"3596","threadID":"5832","channel":"Microsoft-Windows-Sysmon/Operational","computer":"************","severityValue":"INFORMATION","message":"\"CreateRemoteThread detected:\r\nRuleName: technique_id=T1055,technique_name=Process Injection\r\nUtcTime: 2024-10-28 11:42:07.065\r\nSourceProcessGuid: {118b8ff8-24ea-671f-0fe6-000000005800}\r\nSourceProcessId: 50964\r\nSourceImage: C:\\Windows\\System32\\rdpclip.exe\r\nTargetProcessGuid: {118b8ff8-24e7-671f-07e6-000000005800}\r\nTargetProcessId: 10616\r\nTargetImage: C:\\Windows\\System32\\csrss.exe\r\nNewThreadId: 64912\r\nStartAddress: 0xFFFFB68878B12EF0\r\nStartModule: -\r\nStartFunction: -\r\nSourceUser: *****\\*****\r\nTargetUser: NT AUTHORITY\\SYSTEM\""},"eventdata":{"ruleName":"technique_id=T1055,technique_name=Process Injection","utcTime":"2024-10-28 11:42:07.065","sourceProcessGuid":"{118b8ff8-24ea-671f-0fe6-000000005800}","sourceProcessId":"50964","sourceImage":"C:\\\\Windows\\\\System32\\\\rdpclip.exe","targetProcessGuid":"{118b8ff8-24e7-671f-07e6-000000005800}","targetProcessId":"10616","targetImage":"C:\\\\Windows\\\\System32\\\\csrss.exe","newThreadId":"64912","startAddress":"0xFFFFB68878B12EF0","sourceUser":"*****\\\\*****","targetUser":"NT AUTHORITY\\\\SYSTEM"}}}
**Phase 1: Completed pre-decoding.
full event: '{"win":{"system":{"providerName":"Microsoft-Windows-Sysmon","providerGuid":"{5770385f-c22a-43e0-bf4c-06f5698ffbd9}","eventID":"8","version":"2","level":"4","task":"8","opcode":"0","keywords":"0x8000000000000000","systemTime":"2024-10-28T11:42:07.073670700Z","eventRecordID":"76553546","processID":"3596","threadID":"5832","channel":"Microsoft-Windows-Sysmon/Operational","computer":"************","severityValue":"INFORMATION","message":"\"CreateRemoteThread detected:\r\nRuleName: technique_id=T1055,technique_name=Process Injection\r\nUtcTime: 2024-10-28 11:42:07.065\r\nSourceProcessGuid: {118b8ff8-24ea-671f-0fe6-000000005800}\r\nSourceProcessId: 50964\r\nSourceImage: C:\\Windows\\System32\\rdpclip.exe\r\nTargetProcessGuid: {118b8ff8-24e7-671f-07e6-000000005800}\r\nTargetProcessId: 10616\r\nTargetImage: C:\\Windows\\System32\\csrss.exe\r\nNewThreadId: 64912\r\nStartAddress: 0xFFFFB68878B12EF0\r\nStartModule: -\r\nStartFunction: -\r\nSourceUser: *****\\*****\r\nTargetUser: NT AUTHORITY\\SYSTEM\""},"eventdata":{"ruleName":"technique_id=T1055,technique_name=Process Injection","utcTime":"2024-10-28 11:42:07.065","sourceProcessGuid":"{118b8ff8-24ea-671f-0fe6-000000005800}","sourceProcessId":"50964","sourceImage":"C:\\\\Windows\\\\System32\\\\rdpclip.exe","targetProcessGuid":"{118b8ff8-24e7-671f-07e6-000000005800}","targetProcessId":"10616","targetImage":"C:\\\\Windows\\\\System32\\\\csrss.exe","newThreadId":"64912","startAddress":"0xFFFFB68878B12EF0","sourceUser":"*****\\\\*****","targetUser":"NT AUTHORITY\\\\SYSTEM"}}}'
**Phase 2: Completed decoding.
name: 'json'
win.eventdata.newThreadId: '64912'
win.eventdata.ruleName: 'technique_id=T1055,technique_name=Process Injection'
win.eventdata.sourceImage: 'C:\\Windows\\System32\\rdpclip.exe'
win.eventdata.sourceProcessGuid: '{118b8ff8-24ea-671f-0fe6-000000005800}'
win.eventdata.sourceProcessId: '50964'
win.eventdata.sourceUser: '*****\\*****'
win.eventdata.startAddress: '0xFFFFB68878B12EF0'
win.eventdata.targetImage: 'C:\\Windows\\System32\\csrss.exe'
win.eventdata.targetProcessGuid: '{118b8ff8-24e7-671f-07e6-000000005800}'
win.eventdata.targetProcessId: '10616'
win.eventdata.targetUser: 'NT AUTHORITY\\SYSTEM'
win.eventdata.utcTime: '2024-10-28 11:42:07.065'
win.system.channel: 'Microsoft-Windows-Sysmon/Operational'
win.system.computer: '************'
win.system.eventID: '8'
win.system.eventRecordID: '76553546'
win.system.keywords: '0x8000000000000000'
win.system.level: '4'
win.system.message: '"CreateRemoteThread detected:
RuleName: technique_id=T1055,technique_name=Process Injection
UtcTime: 2024-10-28 11:42:07.065
SourceProcessGuid: {118b8ff8-24ea-671f-0fe6-000000005800}
SourceProcessId: 50964
SourceImage: C:\Windows\System32\rdpclip.exe
TargetProcessGuid: {118b8ff8-24e7-671f-07e6-000000005800}
TargetProcessId: 10616
TargetImage: C:\Windows\System32\csrss.exe
NewThreadId: 64912
StartAddress: 0xFFFFB68878B12EF0
StartModule: -
StartFunction: -
SourceUser: *****\*****
TargetUser: NT AUTHORITY\SYSTEM"'
win.system.opcode: '0'
win.system.processID: '3596'
win.system.providerGuid: '{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'
win.system.providerName: 'Microsoft-Windows-Sysmon'
win.system.severityValue: 'INFORMATION'
win.system.systemTime: '2024-10-28T11:42:07.073670700Z'
win.system.task: '8'
win.system.threadID: '5832'
win.system.version: '2'
**Phase 3: Completed filtering (rules).
id: '100111'
level: '0'
description: 'False positive: Possible process injection activity detected from "C:\\Windows\\System32\\rdpclip.exe" on "C:\\Windows\\System32\\csrss.exe"'
groups: '['windows', 'sysmon']'
firedtimes: '1'
mail: 'False'
mitre.id: '['T1055.001']'
mitre.tactic: '['Defense Evasion', 'Privilege Escalation']'
mitre.technique: '['Dynamic-link Library Injection']'
Kindly restart the Wazuh manager after adding the rule.
Let me know how it goes.