--- action: global title: Sysprep on AppData Folder status: experimental description: Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec) references: - https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets - https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b author: Florian Roth date: 2018/06/22 detection: selection: CommandLine: - '*\sysprep.exe *\AppData\*' - 'sysprep.exe *\AppData\*' condition: selection falsepositives: - False positives depend on scripts and administrative tools used in the monitored environment level: medium --- logsource: product: windows service: sysmon detection: selection: EventID: 1 --- logsource: product: windows service: security description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation' detection: selection: EventID: 4688