Files
hayabusa/rules/sigma/process_creation/win_control_panel_item.yml
itiB 83d891b2fa Feature/rm submodule (#312)
* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
2021-12-20 21:14:32 +09:00

44 lines
1.1 KiB
YAML

title: Control Panel Items
ruletype: Sigma
author: Kyaw Min Thein, Furkan Caliskan (@caliskanfurkan_)
date: 2020/06/22
description: Detects the malicious use of a control panel item
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
CommandLine: '*.cpl'
SELECTION_3:
CommandLine:
- '*\System32\\*'
- '*%System%*'
SELECTION_4:
Image: '*\reg.exe'
SELECTION_5:
CommandLine: '*add*'
SELECTION_6:
CommandLine:
- '*CurrentVersion\\Control Panel\\CPLs*'
condition: (SELECTION_1 and ((SELECTION_2 and not (SELECTION_3)) or (SELECTION_4
and SELECTION_5 and SELECTION_6)))
falsepositives:
- Unknown
id: 0ba863e6-def5-4e50-9cea-4dd8c7dc46a4
level: critical
logsource:
category: process_creation
product: windows
modified: 2020/11/28
references:
- https://attack.mitre.org/techniques/T1196/
- https://ired.team/offensive-security/code-execution/code-execution-through-control-panel-add-ins
status: experimental
tags:
- attack.execution
- attack.defense_evasion
- attack.t1218.002
- attack.t1196
- attack.persistence
- attack.t1546