Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_sysprep_appdata.yml
T

25 lines
863 B
YAML
Raw Normal View History

title: Sysprep on AppData Folder
2019-11-12 23:12:27 +01:00
id: d5b9ae7a-e6fc-405e-80ff-2ff9dcc64e7e
2021-11-27 11:33:14 +01:00
status: test
description: Detects suspicious sysprep process start with AppData folder as target (as used by Trojan Syndicasec in Thrip report by Symantec)
2021-11-27 11:33:14 +01:00
references:
2022-10-28 15:06:36 +02:00
- https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
- https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b
2023-02-01 11:14:59 +01:00
author: Florian Roth (Nextron Systems)
date: 2018-06-22
modified: 2021-11-27
2022-10-28 15:06:36 +02:00
tags:
- attack.execution
- attack.t1059
logsource:
2022-10-28 15:06:36 +02:00
category: process_creation
product: windows
detection:
2022-10-28 15:06:36 +02:00
selection:
Image|endswith: '\sysprep.exe'
CommandLine|contains: '\AppData\'
condition: selection
falsepositives:
2022-10-28 15:06:36 +02:00
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium