From 021842eaa3151d3ecf8be2ca076f5a31da27b1af Mon Sep 17 00:00:00 2001 From: omkar72 Date: Sun, 25 Oct 2020 12:36:08 +0530 Subject: [PATCH] office test reg --- .../sysmon_office_test_regadd.yml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 rules/windows/registry_event/sysmon_office_test_regadd.yml diff --git a/rules/windows/registry_event/sysmon_office_test_regadd.yml b/rules/windows/registry_event/sysmon_office_test_regadd.yml new file mode 100644 index 000000000..6ecea6e0c --- /dev/null +++ b/rules/windows/registry_event/sysmon_office_test_regadd.yml @@ -0,0 +1,23 @@ +title: Office Application Startup - Office Test +id: 3d27f6dd-1c74-4687-b4fa-ca849d128d1c +status: experimental +description: Detects the addition of office test to registry that allows a user to specify an arbitrary DLL that will be executed every time an Office application is started +references: + - https://attack.mitre.org/techniques/T1137/002/ +author: omkar72 +tags: + - attack.persistence + - attack.t1137.002 +date: 2020/10/25 +logsource: + category: registry_event + product: windows +detection: + selection_registry: + TargetObject: + - 'HKEY_CURRENT_USER\Software\Microsoft\Office test\Special\Perf' + - 'HKEY_LOCAL_MACHINE\Software\Microsoft\Office test\Special\Perf' + condition: selection_registry +falsepositives: + - Unlikely +level: medium