Possible ransomware activities
Last updated on:
In this page
About the rule
Rule Type
Advanced
Rule Description
Multiple file modifications are detected soon after a new process creation, typical of ransomware attacks.
Severity
Critical
Rule Requirement
Criteria
Action1:
actionname = "Process started"
Action2:
actionname = "File modified" AND USERNAME = Action1.USERNAME AND HOSTNAME = Action1.HOSTNAME AND PROCESSNAME = Action1.PROCESSNAME
| timewindow 15m
| groupby HOSTNAME
| groupby USERNAME
| groupby PROCESSNAME having COUNT >= 15
sequence:Action1 followedby Action2 within 5m
select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME,Action1.DOMAIN,Action1.ORIGINALFILENAME,Action1.PARENTPROCESSID,Action1.PROCESSID,Action1.PRODUCT_NAME,Action1.SECURITYID,Action2.timewindow.HOSTNAME,Action2.timewindow.MESSAGE,Action2.timewindow.USERNAME,Action2.timewindow.DOMAIN,Action2.timewindow.OBJECTNAME,Action2.timewindow.PROCESSNAME,Action2.timewindow.ACCESSLIST,Action2.timewindow.FILETYPE
Detection
Execution Mode
realtime
Log Sources
Windows


