mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 01:45:21 +00:00
Updated Eventvwr UAC evasion
This commit is contained in:
parent
7e180365ab
commit
10ee36f26c
@ -3,15 +3,23 @@ status: experimental
|
||||
description: Detects UAC bypass method using Windows event viewer
|
||||
reference:
|
||||
- https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
|
||||
- https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
methregistry:
|
||||
EventID: 13
|
||||
TargetObject: 'HKEY_USERS\*\mscfile\shell\open\command'
|
||||
condition: selection
|
||||
methprocess:
|
||||
EventID: 1
|
||||
ParentImage: '*\eventvwr.exe'
|
||||
filterprocess:
|
||||
Image: '*\mmc.exe'
|
||||
condition: methregistry or ( methprocess and not filterprocess )
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: critical
|
||||
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user