SigmaHQ/rules/windows/registry_event/sysmon_susp_download_run_key.yml

28 lines
910 B
YAML
Raw Normal View History

2021-04-02 22:00:43 +00:00
title: Suspicious Run Key from Download
2020-06-10 14:32:30 +00:00
id: 9c5037d1-c568-49b3-88c7-9846a5bdc2be
status: experimental
description: Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories
references:
- https://app.any.run/tasks/c5bef5b7-f484-4c43-9cf3-d5c5c7839def/
author: Florian Roth
date: 2019/10/01
modified: 2020/09/06
2020-06-10 14:32:30 +00:00
tags:
- attack.persistence
- attack.t1060 # an old one
- attack.t1547.001
2020-06-10 14:32:30 +00:00
logsource:
category: registry_event
product: windows
detection:
selection:
2021-04-02 22:00:43 +00:00
Image|contains:
2020-11-20 05:01:43 +00:00
- '\Downloads\'
- '\Temporary Internet Files\Content.Outlook\'
- '\Local Settings\Temporary Internet Files\'
TargetObject|contains: '\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\'
2020-06-10 14:32:30 +00:00
condition: selection
falsepositives:
- Software installers downloaded and used by users
level: high