SigmaHQ/rules/windows/process_creation/win_control_panel_item.yml
2019-11-12 23:12:27 +01:00

27 lines
651 B
YAML

title: Control Panel Items
id: 0ba863e6-def5-4e50-9cea-4dd8c7dc46a4
status: experimental
description: Detects the use of a control panel item (.cpl) outside of the System32 folder
reference:
- https://attack.mitre.org/techniques/T1196/
tags:
- attack.execution
- attack.t1196
- attack.defense_evasion
author: Kyaw Min Thein
date: 2019/08/27
level: critical
logsource:
product: windows
category: process_creation
detection:
selection:
CommandLine: '*.cpl'
filter:
CommandLine:
- '*\System32\\*'
- '*%System%*'
condition: selection and not filter
falsepositives:
- Unknown