From c46546a017bb9df2bb661edea45ce7471eaf62dd Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Sat, 22 Jul 2023 10:07:45 +0200 Subject: [PATCH] Add file_event_win_susp_windows_terminal_profile Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com> --- ...vent_win_susp_windows_terminal_profile.yml | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 rules/windows/file/file_event/file_event_win_susp_windows_terminal_profile.yml diff --git a/rules/windows/file/file_event/file_event_win_susp_windows_terminal_profile.yml b/rules/windows/file/file_event/file_event_win_susp_windows_terminal_profile.yml new file mode 100644 index 000000000..336a9fdbe --- /dev/null +++ b/rules/windows/file/file_event/file_event_win_susp_windows_terminal_profile.yml @@ -0,0 +1,21 @@ +title: Suspicious Windows Terminal Profile Modification +id: 9b64de98-9db3-4033-bd7a-f51430105f00 +status: experimental +description: Detects a modification of Windows Terminal Profile settings.json which may indicate persistence +references: + - https://github.com/redcanaryco/atomic-red-team/blob/74438b0237d141ee9c99747976447dc884cb1a39/atomics/T1547.015/T1547.015.md#atomic-test-1---persistence-by-modifying-windows-terminal-profile +author: frack113 +date: 2023/07/22 +tags: + - attack.persistence + - attack.t1547.015 +logsource: + product: windows + category: file_event +detection: + selection: + TargetFilename|endswith: '\AppData\Local\Packages\Microsoft.WindowsTerminal_8wekyb3d8bbwe\LocalState\settings.json' + condition: selection +falsepositives: + - Unknown +level: medium