Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_tapinstall_execution.yml
T

31 lines
1.1 KiB
YAML
Raw Normal View History

2020-02-20 23:00:16 +01:00
title: Tap Installer Execution
2019-12-19 23:56:36 +01:00
id: 99793437-3e16-439b-be0f-078782cf953d
2021-11-27 11:33:14 +01:00
status: test
2020-01-19 22:34:16 +01:00
description: Well-known TAP software installation. Possible preparation for data exfiltration using tunneling techniques
references:
- https://community.openvpn.net/openvpn/wiki/ManagingWindowsTAPDrivers
2019-12-07 02:10:06 +01:00
author: Daniil Yugoslavskiy, Ian Davis, oscd.community
date: 2019-10-24
modified: 2023-12-11
2022-10-28 15:06:36 +02:00
tags:
- attack.exfiltration
- attack.t1048
2019-10-25 04:30:55 +02:00
logsource:
2022-10-28 15:06:36 +02:00
category: process_creation
product: windows
2019-10-25 04:30:55 +02:00
detection:
2022-10-28 15:06:36 +02:00
selection:
Image|endswith: '\tapinstall.exe'
filter_optional_avast:
Image|contains:
- ':\Program Files\Avast Software\SecureLine VPN\'
- ':\Program Files (x86)\Avast Software\SecureLine VPN\'
filter_optional_openvpn:
Image|contains: ':\Program Files\OpenVPN Connect\drivers\tap\'
filter_optional_protonvpn:
Image|contains: ':\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\'
condition: selection and not 1 of filter_optional_*
2019-10-25 04:30:55 +02:00
falsepositives:
- Legitimate OpenVPN TAP installation
2019-10-25 04:30:55 +02:00
level: medium