598d29f811
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
35 lines
1.4 KiB
YAML
35 lines
1.4 KiB
YAML
title: ISO Image Mounted
|
|
id: 0248a7bc-8a9a-4cd8-a57e-3ae8e073a073
|
|
status: test
|
|
description: Detects the mount of an ISO image on an endpoint
|
|
references:
|
|
- https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore
|
|
- https://www.proofpoint.com/us/blog/threat-insight/threat-actor-profile-ta2719-uses-colorful-lures-deliver-rats-local-languages
|
|
- https://twitter.com/MsftSecIntel/status/1257324139515269121
|
|
- https://github.com/redcanaryco/atomic-red-team/blob/0f229c0e42bfe7ca736a14023836d65baa941ed2/atomics/T1553.005/T1553.005.md#atomic-test-1---mount-iso-image
|
|
author: Syed Hasan (@syedhasan009)
|
|
date: 2021-05-29
|
|
modified: 2023-11-09
|
|
tags:
|
|
- attack.initial-access
|
|
- attack.t1566.001
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
definition: 'The advanced audit policy setting "Object Access > Audit Removable Storage" must be configured for Success/Failure'
|
|
detection:
|
|
selection:
|
|
EventID: 4663
|
|
ObjectServer: 'Security'
|
|
ObjectType: 'File'
|
|
ObjectName|startswith: '\Device\CdRom'
|
|
filter_main_generic:
|
|
ObjectName:
|
|
- '\Device\CdRom0\autorun.ico'
|
|
- '\Device\CdRom0\setup.exe'
|
|
- '\Device\CdRom0\setup64.exe'
|
|
condition: selection and not 1 of filter_main_*
|
|
falsepositives:
|
|
- Software installation ISO files
|
|
level: medium
|