Merge pull request #1211 from zipa-original/win_persistence_telemetry

[OSCD] Added a rule to detect abusing windows telemetry for persistence
This commit is contained in:
yugoslavskiy 2021-01-06 00:20:51 +03:00 committed by GitHub
commit 29fe6e46d8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,30 @@
title: Registry Persistence Mechanism via Windows Telemetry
id: 73a883d0-0348-4be4-a8d8-51031c2564f8
description: Detects persistence method using windows telemetry
status: experimental
date: 2020/10/16
references:
- https://www.trustedsec.com/blog/abusing-windows-telemetry-for-persistence/
author: Lednyov Alexey, oscd.community
tags:
- attack.persistence
- attack.t1053.005
logsource:
category: registry_event
product: windows
definition: 'Requirements: Sysmon config that monitors \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController subkey of the HKLU hives'
detection:
selection:
TargetObject|contains|all:
- '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\'
- '\Command'
Details|contains: '.exe'
EventType: 'SetValue'
filter:
Details|contains:
- '\system32\CompatTelRunner.exe'
- '\system32\DeviceCensus.exe'
condition: selection and not filter
falsepositives:
- unknown
level: critical