heroui logo

Relevant Anti-Virus Signature Keywords In Application Log

Sigma Rules

View Source
Summary
The detection rule is designed to identify potentially malicious activity related to antivirus signatures within application logs on Windows systems. It specifically looks for events that include known virus signature names and various malware-related keywords understood to be indicative of malware activity or exploitation attempts. The set of keywords encompasses terms associated with backdoor access, ransomware, keyloggers, and various penetration testing tools, which could be used maliciously. The detection logic checks whether certain keywords exist within application log entries while simultaneously ensuring that none of the specified optional filters—such as certain legitimate application processes—are present. The rule is particularly useful for organizations that want to monitor the security of their endpoints by capturing suspicious antivirus events that warrant further investigation.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • Application Log
Created: 2017-02-19