On Fri, Apr 22, 2016 at 4:16 PM, Rob B <[email protected]> wrote:
> Hello All,
>
>    Does anyone have a decoder for Windows Defender floating around out
> there??
>
> Im having a heck of a time...   Here is the event channel event example if
> anyone is curious or can help:  (Win10 box)
>

The easiest way to provide log samples that can be turned into
decoders and rules is to turn on the logall option, and grab the logs
from /var/ossec/logs/archives/archives.log on the manager.

> Log Name:      Microsoft-Windows-Windows Defender/Operational
> Source:        Microsoft-Windows-Windows Defender
> Date:          4/22/2016 4:05:17 PM
> Event ID:      1116
> Task Category: None
> Level:         Warning
> Keywords:
> User:          SYSTEM
> Computer:      VICTIM0
> Description:
> Windows Defender has detected malware or other potentially unwanted
> software.
>  For more information please see the following:
> http://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Bagsu!rfn&threatid=2147694406&enterprise=0
>   Name: Trojan:Win32/Bagsu!rfn
>   ID: 2147694406
>   Severity: Severe
>   Category: Trojan
>   Path:
> containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe->(VFS:svchost.exe)
>   Detection Origin: Network share
>   Detection Type: Concrete
>   Detection Source: Real-Time Protection
>   User: frog
>   Process Name: C:\Windows\explorer.exe
>   Signature Version: AV: 1.217.2054.0, AS: 1.217.2054.0, NIS: 115.8.0.0
>   Engine Version: AM: 1.1.12603.0, NIS: 2.1.11804.0
>
> Event Xml:
> <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event";>
>   <System>
>     <Provider Name="Microsoft-Windows-Windows Defender"
> Guid="{11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78}" />
>     <EventID>1116</EventID>
>     <Version>0</Version>
>     <Level>3</Level>
>     <Task>0</Task>
>     <Opcode>0</Opcode>
>     <Keywords>0x8000000000000000</Keywords>
>     <TimeCreated SystemTime="2016-04-22T20:05:17.551083000Z" />
>     <EventRecordID>95</EventRecordID>
>     <Correlation ActivityID="{ECC2B320-F9A6-41AD-9F17-5C9EE24D3330}" />
>     <Execution ProcessID="2332" ThreadID="4540" />
>     <Channel>Microsoft-Windows-Windows Defender/Operational</Channel>
>     <Computer>VICTIM0</Computer>
>     <Security UserID="S-1-5-77" />
>   </System>
>   <EventData>
>     <Data Name="Product Name">%%827</Data>
>     <Data Name="Product Version">4.9.10586.0</Data>
>     <Data Name="Detection ID">{CAADD684-36C9-444B-8A6D-8CE537A93E40}</Data>
>     <Data Name="Detection Time">2016-04-22T20:04:40.369Z</Data>
>     <Data Name="Unused">
>     </Data>
>     <Data Name="Unused2">
>     </Data>
>     <Data Name="Threat ID">2147694406</Data>
>     <Data Name="Threat Name">Trojan:Win32/Bagsu!rfn</Data>
>     <Data Name="Severity ID">5</Data>
>     <Data Name="Severity Name">Severe</Data>
>     <Data Name="Category ID">8</Data>
>     <Data Name="Category Name">Trojan</Data>
>     <Data
> Name="FWLink">http://go.microsoft.com/fwlink/?linkid=37020&amp;name=Trojan:Win32/Bagsu!rfn&amp;threatid=2147694406&amp;enterprise=0</Data>
>     <Data Name="Status Code">1</Data>
>     <Data Name="Status Description">
>     </Data>
>     <Data Name="State">1</Data>
>     <Data Name="Source ID">3</Data>
>     <Data Name="Source Name">%%818</Data>
>     <Data Name="Process Name">C:\Windows\explorer.exe</Data>
>     <Data Name="Detection User">frog</Data>
>     <Data Name="Unused3">
>     </Data>
>     <Data
> Name="Path">containerfile:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe;file:_\\10.0.1.10\share\Malware_For_Demo\REAL_BAD_Malz2\Server.exe-&gt;(VFS:svchost.exe)</Data>
>     <Data Name="Origin ID">2</Data>
>     <Data Name="Origin Name">%%846</Data>
>     <Data Name="Execution ID">1</Data>
>     <Data Name="Execution Name">%%813</Data>
>     <Data Name="Type ID">0</Data>
>     <Data Name="Type Name">%%822</Data>
>     <Data Name="Pre Execution Status">0</Data>
>     <Data Name="Action ID">9</Data>
>     <Data Name="Action Name">%%887</Data>
>     <Data Name="Unused4">
>     </Data>
>     <Data Name="Error Code">0x00000000</Data>
>     <Data Name="Error Description">The operation completed successfully.
> </Data>
>     <Data Name="Unused5">
>     </Data>
>     <Data Name="Post Clean Status">0</Data>
>     <Data Name="Additional Actions ID">0</Data>
>     <Data Name="Additional Actions String">No additional actions
> required</Data>
>     <Data Name="Remediation User">
>     </Data>
>     <Data Name="Unused6">
>     </Data>
>     <Data Name="Signature Version">AV: 1.217.2054.0, AS: 1.217.2054.0, NIS:
> 115.8.0.0</Data>
>     <Data Name="Engine Version">AM: 1.1.12603.0, NIS: 2.1.11804.0</Data>
>   </EventData>
> </Event>
>
>
> Thanks!, Rob
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to