Files
blue-team-tools/rules/windows/process_creation/win_control_panel_item.yml
T

38 lines
1.0 KiB
YAML
Raw Normal View History

2019-08-27 14:55:55 +06:30
title: Control Panel Items
2019-11-12 23:12:27 +01:00
id: 0ba863e6-def5-4e50-9cea-4dd8c7dc46a4
2019-08-27 12:23:42 +02:00
status: experimental
2020-06-22 01:06:34 +03:00
description: Detects the malicious use of a control panel item
2019-11-12 23:12:27 +01:00
reference:
- https://attack.mitre.org/techniques/T1196/
2020-06-22 01:06:34 +03:00
- https://ired.team/offensive-security/code-execution/code-execution-through-control-panel-add-ins
2019-11-12 23:12:27 +01:00
tags:
- attack.execution
- attack.defense_evasion
- attack.t1218.002
- attack.t1196 # an old one
- attack.persistence
- attack.t1546
2020-06-22 01:06:34 +03:00
author: Kyaw Min Thein, Furkan Caliskan (@caliskanfurkan_)
date: 2020/06/22
modified: 2020/08/29
2019-08-27 14:55:55 +06:30
level: critical
logsource:
2019-11-12 23:12:27 +01:00
product: windows
category: process_creation
2019-08-27 14:55:55 +06:30
detection:
2020-06-22 01:06:34 +03:00
selection1:
2019-11-12 23:12:27 +01:00
CommandLine: '*.cpl'
filter:
CommandLine:
- '*\System32\\*'
- '*%System%*'
2020-06-22 01:06:34 +03:00
selection2:
CommandLine:
- '*reg add*'
selection3:
CommandLine:
- '*CurrentVersion\\Control Panel\\CPLs*'
condition: (selection1 and not filter) or (selection2 and selection3)
2019-08-27 14:55:55 +06:30
falsepositives:
2019-11-12 23:12:27 +01:00
- Unknown