Files
sigma-rules/rules/windows/persistence_via_application_shimming.toml
T
2021-04-30 11:21:12 -08:00

65 lines
1.8 KiB
TOML

[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/04/14"
[rule]
author = ["Elastic"]
description = """
The Application Shim was created to allow for backward compatibility of software as the operating system codebase
changes over time. This Windows functionality has been abused by attackers to stealthily gain persistence and arbitrary
code execution in legitimate Windows processes.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.*"]
language = "eql"
license = "Elastic License v2"
name = "Potential Application Shimming via Sdbinst"
risk_score = 21
rule_id = "fd4a992d-6130-4802-9ff8-829b89ae801f"
severity = "low"
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Persistence"]
timestamp_override = "event.ingested"
type = "eql"
query = '''
process where event.type in ("start", "process_started") and process.name : "sdbinst.exe"
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1546"
reference = "https://attack.mitre.org/techniques/T1546/"
name = "Event Triggered Execution"
[[rule.threat.technique.subtechnique]]
id = "T1546.011"
reference = "https://attack.mitre.org/techniques/T1546/011/"
name = "Application Shimming"
[rule.threat.tactic]
id = "TA0003"
reference = "https://attack.mitre.org/tactics/TA0003/"
name = "Persistence"
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1546"
reference = "https://attack.mitre.org/techniques/T1546/"
name = "Event Triggered Execution"
[[rule.threat.technique.subtechnique]]
id = "T1546.011"
reference = "https://attack.mitre.org/techniques/T1546/011/"
name = "Application Shimming"
[rule.threat.tactic]
id = "TA0004"
reference = "https://attack.mitre.org/tactics/TA0004/"
name = "Privilege Escalation"