diff --git a/rules/windows/sysmon/sysmon_cmstp_execution.yml b/rules/windows/sysmon/sysmon_cmstp_execution.yml deleted file mode 100644 index 5bf2897cf..000000000 --- a/rules/windows/sysmon/sysmon_cmstp_execution.yml +++ /dev/null @@ -1,52 +0,0 @@ -action: global -title: CMSTP Execution -id: 9d26fede-b526-4413-b069-6e24b6d07167 -status: stable -description: Detects various indicators of Microsoft Connection Manager Profile Installer execution -tags: - - attack.defense_evasion - - attack.execution - - attack.t1191 # an old one - - attack.t1218.003 - - attack.g0069 - - car.2019-04-001 -author: Nik Seetharaman -date: 2018/07/16 -modified: 2020/08/28 -references: - - https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/ -detection: - condition: 1 of them -fields: - - CommandLine - - ParentCommandLine - - Details -falsepositives: - - Legitimate CMSTP use (unlikely in modern enterprise environments) -level: high ---- -logsource: - product: windows - service: sysmon -detection: - # Registry Object Add - selection2: - EventID: 12 - TargetObject: '*\cmmgr32.exe*' - EventType: 'CreateKey' - # Registry Object Value Set - selection3: - EventID: 13 - TargetObject: '*\cmmgr32.exe*' - # Process Access Call Trace - selection4: - EventID: 10 - CallTrace: '*cmlua.dll*' ---- -logsource: - category: process_creation - product: windows -detection: - # CMSTP Spawning Child Process - selection1: - ParentImage: '*\cmstp.exe'