On Mon, Aug 1, 2016 at 9:11 AM, Craig <chmitch...@gmail.com> wrote:
> So, interesting. I guess that is my question. In my testing (using 2.9RC2),
> the decoder below won't recognize the log entry unless I keep the header
> from archives.log (you can see the output in my post above). If I remove the
> header, the decoder doesn't work. What version were you running with your
> testing of my log entry?
> <decoder name="Sysmon-EventID#1">
>   <type>windows</type>
>   <prematch>INFORMATION\(1\)</prematch>
>   <regex offset="after_prematch">Image: (\.*) \s*CommandLine: \.* \s*User:
> (\.*) \s*LogonGuid: \S* \s*LogonId: \S* \s*TerminalSessionId: \S*
> \s*IntegrityLevel: \.*HashType: \S* \s*Hash: (\S*) \s*ParentProcessGuid: \S*
> \s*ParentProcessID: \S* \s*ParentImage: (\.*) \s*ParentCommandLine:</regex>
>   <order>status,user,url,data</order>
> </decoder>
>
>

Try this: https://github.com/ossec/ossec-hids/pull/880

>
> On Monday, August 1, 2016 at 2:50:22 AM UTC-5, Jesus Linares wrote:
>>
>> It seems the output of ossec-logtest is cut in the previous post. I paste
>> it here again:
>>
>>
>> 2016 Jul 29 22:32:24 WinEvtLog: Microsoft-Windows-Sysmon/Operational:
>> INFORMATION(1): Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY:
>> Win7-x64-PC1.hackme.local: Process Create:  UtcTime: 2016-07-30 03:32:24.846
>> ProcessGuid: {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>> 3056  ParentImage: C:\Windows\explorer.exe  ParentCommandLine:
>> C:\Windows\Explorer.EXE
>>
>>
>>
>>
>> **Phase 1: Completed pre-decoding.
>>        full event: '2016 Jul 29 22:32:24 WinEvtLog:
>> Microsoft-Windows-Sysmon/Operational: INFORMATION(1):
>> Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY: Win7-x64-PC1.hackme.local:
>> Process Create:  UtcTime: 2016-07-30 03:32:24.846  ProcessGuid:
>> {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>> 3056  ParentImage: C:\Windows\explorer.exe  ParentCommandLine:
>> C:\Windows\Explorer.EXE'
>>        hostname: 'ip-10-0-0-10'
>>        program_name: '(null)'
>>        log: '2016 Jul 29 22:32:24 WinEvtLog:
>> Microsoft-Windows-Sysmon/Operational: INFORMATION(1):
>> Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY: Win7-x64-PC1.hackme.local:
>> Process Create:  UtcTime: 2016-07-30 03:32:24.846  ProcessGuid:
>> {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>> 3056  ParentImage: C:\Windows\explorer.exe  ParentCommandLine:
>> C:\Windows\Explorer.EXE'
>>
>>
>> **Phase 2: Completed decoding.
>>        decoder: 'windows'
>>        status: 'C:\Users\administrator\Desktop\svchost.exe'
>>        dstuser: 'HACKME\Administrator'
>>        url: 'C019D10F80409FC4C7D45EBFA48B0076'
>>        extra_data: 'C:\Windows\explorer.exe'
>>
>>
>> **Phase 3: Completed filtering (rules).
>>        Rule id: '184666'
>>        Level: '12'
>>        Description: 'Sysmon - Suspicious Process - svchost.exe'
>>
>> You can find decoders for all sysmon events here.
>>
>> Regards.
>>
>>
>>
>>
>>
>>
>> On Monday, August 1, 2016 at 9:46:31 AM UTC+2, Jesus Linares wrote:
>>>
>>> Hi Craig,
>>>
>>> the raw event is:
>>> 2016 Jul 29 22:32:24 WinEvtLog: Microsoft-Windows-Sysmon/Operational:
>>> INFORMATION(1): Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY:
>>> Win7-x64-PC1.hackme.local: Process Create:  UtcTime: 2016-07-30 03:32:24.846
>>> ProcessGuid: {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>>> 3056  ParentImage: C:\Windows\explorer.exe  ParentCommandLine:
>>> C:\Windows\Explorer.EXE
>>>
>>> but, OSSEC adds a header in archives.log:
>>>
>>> 2016 Jul 29 22:32:25 (WIN7-X64-PC1) 172.16.213.5->WinEvtLog 2016 Jul 29
>>> 22:32:24 WinEvtLog: Microsoft-Windows-Sysmon/Operational: INFORMATION(1):
>>> Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY: Win7-x64-PC1.hackme.local:
>>> Process Create:  UtcTime: 2016-07-30 03:32:24.846  ProcessGuid:
>>> {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>>> 3056  ParentImage: C:\Windows\explorer.exe  ParentCommandLine:
>>> C:\Windows\Explorer.EXE
>>>
>>>
>>> So, you must always use ossec-logtest without headers:
>>> 2016 Jul 29 22:32:24 WinEvtLog: Microsoft-Windows-Sysmon/Operational:
>>> INFORMATION(1): Microsoft-Windows-Sysmon: SYSTEM: NT AUTHORITY:
>>> Win7-x64-PC1.hackme.local: Process Create:  UtcTime: 2016-07-30 03:32:24.846
>>> ProcessGuid: {67C360F4-1FC8-579C-0000-001017F41E00}  ProcessId: 3988  Image:
>>> C:\Users\administrator\Desktop\svchost.exe  CommandLine:
>>> "C:\Users\administrator\Desktop\svchost.exe"   CurrentDirectory:
>>> C:\Users\administrator\Desktop\  User: HACKME\Administrator  LogonGuid:
>>> {67C360F4-1C55-579C-0000-00206BBC0600}  LogonId: 0x6bc6b  TerminalSessionId:
>>> 1  IntegrityLevel: High  Hashes: MD5=C019D10F80409FC4C7D45EBFA48B0076
>>> ParentProcessGuid: {67C360F4-1C57-579C-0000-001092EC0600}  ParentProcessId:
>>> 3056<sp
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to ossec-list+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to