heroui logo

Threat Intel Hash Indicator Match

Elastic Detection Rules

View Source
Summary
The 'Threat Intel Hash Indicator Match' rule is designed to identify potential security threats by matching locally observed file hashes against known threat intelligence indicators. It leverages the data collected from various Elastic modules to detect incidents, specifically focusing on file-related events like antivirus alerts, process creation, library loads, and file operations that contain file hashes. The highlights of this rule include the use of queries to identify unsigned or suspicious executable files and services running under uncommon user accounts. Further investigation is suggested through the usage of tools like Osquery to extract relevant data like DNS cache entries, service information, and signed status of executables. The investigation process involves validating matched threats through external resources, analyzing the origins of those hashes, and assessing the broader impact on the environment. The rule operates within a 30-day window of threat intelligence data, emphasizing the importance of timely correlation of threat indicators. This helps in responding effectively to the detected threats, requiring detailed follow-up actions from incident response teams to isolate infected systems and mitigate future risks.
Categories
  • Endpoint
  • Windows
  • Cloud
  • Infrastructure
  • Other
Data Sources
  • File
  • Process
  • Network Traffic
  • Image
  • Script
Created: 2023-05-22