Files
hayabusa/rules/Sigma/win_lolbin_execution_via_winget.yml
2021-11-14 11:00:56 +09:00

36 lines
1.3 KiB
YAML

title: Monitoring Winget For LOLbin Execution
author: Sreeman
date: 2020/21/04
description: Adversaries can abuse winget to download payloads remotely and execute
them without touching disk. Winget will be included by default in Windows 10 and
is already available in Windows 10 insider programs. The manifest option enables
you to install an application by passing in a YAML file directly to the client.
Winget can be used to download and install exe's, msi, msix files later.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
CommandLine: '*.*(?i)winget install (--m|-m).*'
condition: (SELECTION_1 and (SELECTION_2))
falsepositives:
- Admin activity installing packages not in the official Microsoft repo. Winget probably
won't be used by most users.
fields:
- CommandLine
id: 313d6012-51a0-4d93-8dfc-de8553239e25
level: medium
logsource:
category: process_creation
product: windows
modified: 2021/06/11
references:
- https://docs.microsoft.com/en-us/windows/package-manager/winget/install#local-install
status: experimental
tags:
- attack.defense_evasion
- attack.execution
- attack.t1059
yml_filename: win_lolbin_execution_via_winget.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation