I tried to edit the cdb list and local rules, I restarted wazuh-server but without success.
This is the event taken from the alerts.log file
Rule:
92910 (level 12) -> 'Explorer process was accessed by C:\\Program
Files (x86)\\Kaspersky Lab\\KES.11.11.0\\avp.exe, possible process
injection'
{"win":{"system":{"providerName":"Microsoft-Windows-Sysmon","providerGuid":"{5770385F-C22A-43E0-BF4C-06F5698FFBD9}","eventID":"10","version":"3","level":"4","task":"10","opcode":"0","keywords":"0x8000000000000000","systemTime":"2023-04-05T00:33:10.376336400Z","eventRecordID":"34970289","processID":"1896","threadID":"2624","channel":"Microsoft-Windows-Sysmon/Operational","computer":"DC-MI.essenza.local","severityValue":"INFORMATION","message":"\"Process
accessed:\r\nRuleName:
technique_id=T1055.001,technique_name=Dynamic-link Library
Injection\r\nUtcTime: 2023-04-05 00:33:10.376\r\nSourceProcessGUID:
{F8FB345F-2C06-6407-1C00-000000006000}\r\nSourceProcessId:
1552\r\nSourceThreadId: 5020\r\nSourceImage: C:\\Program Files
(x86)\\Kaspersky Lab\\KES.11.11.0\\avp.exe\r\nTargetProcessGUID:
{F8FB345F-DCD1-641A-911C-000000006000}\r\nTargetProcessId:
8832\r\nTargetImage: C:\\Windows\\Explorer.EXE\r\nGrantedAccess:
0x1F3FFF\r\nCallTrace:
C:\\Windows\\SYSTEM32\\ntdll.dll+9043a|C:\\Windows\\SYSTEM32\\wow64.dll+7184|C:\\Windows\\SYSTEM32\\wow64.dll+9c8b|C:\\Windows\\system32\\wow64cpu.dll+1dc5|C:\\Windows\\SYSTEM32\\wow64.dll+1236a|C:\\Windows\\SYSTEM32\\wow64.dll+122a2|C:\\Windows\\SYSTEM32\\ntdll.dll+18edb|C:\\Windows\\SYSTEM32\\ntdll.dll+18dbe|C:\\Windows\\SYSTEM32\\ntdll.dll+3c25c(wow64)|C:\\Windows\\SYSTEM32\\KERNELBASE.dll+16668(wow64)|UNKNOWN(000000002FA3ABDC)|UNKNOWN(000000002FA7831B)|UNKNOWN(000000002FA7860E)|UNKNOWN(000000002F9A9C71)|UNKNOWN(000000002F9A9F96)|UNKNOWN(000000002F9A8DD9)|UNKNOWN(000000002F94FFBE)|UNKNOWN(000000002EAF0EDC)|UNKNOWN(000000002EB641CF)|UNKNOWN(000000002EB65797)|UNKNOWN(000000002EB670CD)|UNKNOWN(000000002EB6A045)|UNKNOWN(000000002EB6A3D5)|UNKNOWN(000000002EA98A93)\r\nSourceUser:
NT AUTHORITY\\SYSTEM\r\nTargetUser:
ESSENZA\\rgueli\""},"eventdata":{"ruleName":"technique_id=T1055.001,technique_name=Dynamic-link
Library Injection","utcTime":"2023-04-05
00:33:10.376","sourceProcessGUID":"{F8FB345F-2C06-6407-1C00-000000006000}","sourceProcessId":"1552","sourceThreadId":"5020","sourceImage":"C:\\\\Program
Files (x86)\\\\Kaspersky
Lab\\\\KES.11.11.0\\\\avp.exe","targetProcessGUID":"{F8FB345F-DCD1-641A-911C-000000006000}","targetProcessId":"8832","targetImage":"C:\\\\Windows\\\\Explorer.EXE","grantedAccess":"0x1f3fff","callTrace":"C:\\\\Windows\\\\SYSTEM32\\\\ntdll.dll+9043a|C:\\\\Windows\\\\SYSTEM32\\\\wow64.dll+7184|C:\\\\Windows\\\\SYSTEM32\\\\wow64.dll+9c8b|C:\\\\Windows\\\\system32\\\\wow64cpu.dll+1dc5|C:\\\\Windows\\\\SYSTEM32\\\\wow64.dll+1236a|C:\\\\Windows\\\\SYSTEM32\\\\wow64.dll+122a2|C:\\\\Windows\\\\SYSTEM32\\\\ntdll.dll+18edb|C:\\\\Windows\\\\SYSTEM32\\\\ntdll.dll+18dbe|C:\\\\Windows\\\\SYSTEM32\\\\ntdll.dll+3c25c(wow64)|C:\\\\Windows\\\\SYSTEM32\\\\KERNELBASE.dll+16668(wow64)|UNKNOWN(000000002FA3ABDC)|UNKNOWN(000000002FA7831B)|UNKNOWN(000000002FA7860E)|UNKNOWN(000000002F9A9C71)|UNKNOWN(000000002F9A9F96)|UNKNOWN(000000002F9A8DD9)|UNKNOWN(000000002F94FFBE)|UNKNOWN(000000002EAF0EDC)|UNKNOWN(000000002EB641CF)|UNKNOWN(000000002EB65797)|UNKNOWN(000000002EB670CD)|UNKNOWN(000000002EB6A045)|UNKNOWN(000000002EB6A3D5)|UNKNOWN(000000002EA98A93)","sourceUser":"NT
AUTHORITY\\\\SYSTEM","targetUser":"ESSENZA\\\\test1"}}}
This is the custom cdb file:
"C:\\\\Program Files (x86)\\\\Kaspersky Lab\\\\KES.11.10.0\\\\avp.exe":Kaspersky_11
"C:\\\\Windows\\\\System32\\\\wsmprovhost.exe":Server_Manager
This is the custom rules from local_rules.xml
<group name="sysmon, sysmon_eid10_detections, windows">
<rule id="110001" level="0">
<if_sid>92910</if_sid>
<list field="win.eventdata.sourceImage" lookup="match_key">etc/lists/whitelist-process</list>
<description>Process $(win.eventdata.sourceImage) is permitted</description>
<mitre>
<id>T1003.001</id>
</mitre>
<group>whitelist_process</group>
</rule>
</group>
Thanks for support
Greetings