29 lines
710 B
YAML
29 lines
710 B
YAML
|
|
title: USB Device Plugged
|
|
author: Florian Roth
|
|
date: 2017/11/09
|
|
description: Detects plugged USB devices
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 2003
|
|
SELECTION_2:
|
|
EventID: 2100
|
|
SELECTION_3:
|
|
EventID: 2102
|
|
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3)
|
|
falsepositives:
|
|
- Legitimate administrative activity
|
|
id: 1a4bd6e3-4c6e-405d-a9a3-53a116e341d4
|
|
level: low
|
|
logsource:
|
|
product: windows
|
|
service: driver-framework
|
|
references:
|
|
- https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/
|
|
- https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/
|
|
status: experimental
|
|
tags:
|
|
- attack.initial_access
|
|
- attack.t1200
|
|
ruletype: SIGMA
|