Product: NPE
Use-Case: Ransomware
Rules | Models | MITRE ATT&CK® TTPs | Event Types | Parsers |
---|---|---|---|---|
5 | 0 | 8 | 1 | 1 |
Event Type | Rules | Models |
---|---|---|
process-created | T1070 - Indicator Removal on Host ↳ A-Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected on this asset. ↳ Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected. T1003.001 - T1003.001 ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset ↳ NotPetya-Activity: NotPetya Ransomware Activity detected T1070.001 - Indicator Removal on Host: Clear Windows Event Logs ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset ↳ NotPetya-Activity: NotPetya Ransomware Activity detected T1218.011 - Signed Binary Proxy Execution: Rundll32 ↳ A-NotPetya-Activity: NotPetya Ransomware Activity detected on this asset ↳ NotPetya-Activity: NotPetya Ransomware Activity detected T1059.003 - T1059.003 ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1486 - Data Encrypted for Impact ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset T1490 - Inhibit System Recovery ↳ A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset |