You are a security analyst looking to improve threat detection on your endpoints. You already use Sysmon, particularly Event code 1 - process creation, to gain fidelity into programs starting on your systems, but you know there are other Sysmon events that you may want to utilize during your hunts. You're especially interested in digging more into situations where files have been created on a system, which could complement your existing hunt techniques and potentially also help you drive more automation.
Configuration needs to be performed to get the most out of your Sysmon events. You can access templates to help you get started, for example the Swift on Security configuration.
Run the following search. You can optimize it by specifying an index and adjusting the time range.
source="xmlwineventlog:microsoft-windows-sysmon/operational" EventCode=11 host=<hostname> process_name=<processname> | table file_create_time file_path process_name host | sort _time
|source="xmlwineventlog:microsoft-windows-sysmon/operational"||Search only for Sysmon operational data.|
|EventCode=11||Search for event code 11, files created on a system.|
|host=<hostname>||Search on a host you specify.|
|process_name=<processname>||Search for a process name you specify.|
| table file_create_time file_path process_name host
|Display the results in a table with columns in the order shown, sorted by time.|
Here is an example result, showing host ghoppy-1 running a process called setup.exe, with the resulting files created and their associated paths:
This event code can return an excessive number of false positives, depending on which directories and file types it monitors, so you'll need to investigate further to exclude benign results.
The content in this guide comes from a previously published blog, one of the thousands of Splunk resources available to help users succeed. In addition, these Splunk resources might help you understand and implement this use case:
- Use case: Visualizing processes and their parent/child relationships
- Use case: Monitoring a network for DNS exfiltration
- Blog: Process hunting with a process
Splunk OnDemand Services: Use these credit-based services for direct access to Splunk technical consultants with a variety of technical services from a pre-defined catalog. Most customers have OnDemand Services per their license support plan. Engage the ODS team at OnDemand-Inquires@splunk.