SigmaHQ/rules/windows/registry_event/sysmon_wdigest_enable_uselogoncredential.yml
frack113 179bfa7d56 duplicate uuid 2dbd9d3d-9e27-42a8-b8df-f13825c6c3d5
- sysmon_susp_webdav_client_execution.yml
- sysmon_wdigest_enable_uselogoncredential.yml
2021-05-27 20:59:26 +02:00

23 lines
782 B
YAML

title: Wdigest Enable UseLogonCredential
id: d6a9b252-c666-4de6-8806-5561bbbd3bdc
description: Detects potential malicious modification of the property value of UseLogonCredential from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to enable clear-text credentials
status: experimental
date: 2019/09/12
modified: 2021/05/27
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.defense_evasion
- attack.t1112
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|endswith: 'WDigest\UseLogonCredential'
condition: selection
falsepositives:
- Unknown
level: high