Skip to content

Latte4Lab/EICAR-Detection-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”΅ EICAR Detection Lab

πŸ“– Overview

This lab demonstrates how Wazuh SIEM will alert us about detection of malware in one of our agent. There is a slight tweak on Wazuh SIEM's ossec.conf to make it able to take it logs from Windows Defender.


⚑ Attack Scenario

  • Attacker Machine: Windows Agent (Self attack)
  • Target Machine: Windows Agent (monitored by Wazuh Manager)
  • Manager: Ubuntu Server
  • SIEM Tool: Wazuh
  • Attack Tool: EICAR
  • Attack Goal: Spreading malware

πŸ›‘οΈ Documentation

  • Configuring the ossec.conf to enable it to take logs from Windows Defender.
<localfile>
  <log_format>eventchannel</log_format>
  <location>Security</location>
</localfile>
<localfile>
  <log_format>eventchannel</log_format>
  <location>Microsoft-Windows-Windows Defender/Operational</location>
</localfile>

ossec.conf changes

  • EICAR file creation (The malware)
 X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

EICAR File

  • Running the EICAR file Opening the EICAR file

  • Wazuh logs detects installation of potential malware on Windows Agent. Wazuh Logs

-Double check the logs with Windows Defender logs. Windows Defender Logs

βœ… Triggered Rules

  1. Rule 62123 - Installation of Potential Malware Rule 62123


πŸ“Œ Lessons Learned

  1. Wazuh SIEM can be configured to take logs from Anti Virus softwares
  2. Installation of Anti Virus software is a must to keep the devices safe from malwares.

About

This repo is to showcase the EICAR Detection test I did on my Homelab

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published